Iris authentication utilizing co-occurrence matrices and textile features

D Triantafyllou, G Stavropoulos… - … Conference on Speech …, 2019 - ieeexplore.ieee.org
Biometric features have attracted great attention for numerous security applications. Border
control, forensics, access control, banking are a few examples where biometrics …

[PDF][PDF] A review on advancements in biometrics

S Jain, S Gupta, RK Thenua - Int J Electron Comput Sci Eng, 2012 - researchgate.net
Biometrics is an automated method of recognizing a person based on physiological or
behavioral characteristics. Biometric recognition technology relies upon the physiological …

Intelligent biometric information fusion using support vector machine

R Singh, M Vatsa, A Noore - Soft computing in image processing: recent …, 2007 - Springer
Biometrics is the process of verifying or identifying an individual using the person's
physiological and behavioral characteristics such as face, fingerprint, iris, signature, and …

[图书][B] Automated biometrics: Technologies and systems

DD Zhang - 2013 - books.google.com
Biometrics-based authentication and identification are emerging as the most reliable method
to authenticate and identify individuals. Biometrics requires that the person to be identified …

[PDF][PDF] A Survey of Biometric Key-Binding Biocrypto-System Using Different Techniques

N Tantubay, J Bharti - Int J Emer Tech, 2020 - researchgate.net
In Data Secrecy, cryptography acting most significant role for data security, most importantly
Data Confidentiality. But the security of any cryptographic algorithm is depended on its …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

[图书][B] Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication

L Bock - 2020 - books.google.com
Work with common biometrics such as face, fingerprint, and iris recognition for business and
personal use to ensure secure identification and authentication for fintech, homes, and …

[PDF][PDF] Towards an integrated biometric technique

R Singhal, N Singh, P Jain - International Journal of Computer …, 2012 - Citeseer
ABSTRACT A biometric system is basically a pattern recognition system. Biometrics based
user authentication system serve as a reliable means for meeting the challenges in today‟ s …

[PDF][PDF] Biometric recognition: A modern era for security

V Dhir, A Singh, R Kumar, G Singh - International Journal of …, 2010 - academia.edu
Many varieties of systems require some reliable recognition system that gives the identity of
a person. There are many applications that need the identity of a person to operate such as …

Biometrics–The promise versus the practice

N Clarke, S Furnell - Computer Fraud & Security, 2005 - Elsevier
The term biometrics has been hard to escape recently, with numerous articles being
published discussing the advantages and disadvantages of the technology. Much of this …