Authentication Using Biometrics: How to Prove Who You Are.

R Hummel, TW Bumpus, A Adcock… - … , Engineering & Policy …, 2021 - search.ebscohost.com
… As a result, the academic field of biometrics continues to spawn commercial endeavors.
This paper surveys some of the promising biometric measures and considers prospects for …

Futuristic person re-identification over internet of biometrics things (IoBT): Technical potential versus practical reality

NKS Behera, TK Behera, M Nappi, S Bakshi… - Pattern Recognition …, 2021 - Elsevier
… an overview of how person re-identification can be achieved over the Internet of Biometric
Things (IoBT) architecture by enabling technologies and protocols for multimodal biometric

Biometric technology and ethics: Beyond security applications

A North-Samardzic - Journal of Business Ethics, 2020 - Springer
… This article provides an overview of the nature of biometric technology and its applications.
… first to second generation and affordances. Next, the literature on biometric technology in …

An approach to develop the smart health using Internet of Things and authentication based on biometric technology

H Hamidi - Future generation computer systems, 2019 - Elsevier
… technology: function, emerging trends and vulnerability This paper gives an overall view
on various biometric technologies with their related challenges and vulnerability. …

Roadmap on signal processing for next generation measurement systems

DK Iakovidis, M Ooi, YC Kuang… - Measurement …, 2021 - iopscience.iop.org
… This roadmap presents a critical overview of the state-of-the-art methods and applications
aiming to highlight future challenges and research opportunities towards next generation

[PDF][PDF] State of the art in vascular biometrics

A Uhl - Handbook of Vascular Biometrics, 2020 - library.oapen.org
… Vascular biometrics exhibit certain advantages as compared to other biometric modalities
as we shall … See a chapter in this book for a recent overview of this type of methodology [8]. …

Touch-dynamics based behavioural biometrics on mobile devices–a review from a usability and performance perspective

E Ellavarason, R Guest, F Deravi… - ACM Computing …, 2020 - dl.acm.org
… ) and the emerging attacks on behavioural biometrics. In the next section, we highlight
open … off and privacy concerns related to the behavioural biometric data. Finally, in the “Discussion…

Representation learning and pattern recognition in cognitive biometrics: a survey

M Wang, X Yin, Y Zhu, J Hu - Sensors, 2022 - mdpi.com
biometrics with a categorization of biometric traits. This is an overview of the maturity of
wearable biometrics … Cognitive biometrics overlaps with wearable device-based biometrics from …

A novel session key generation and secure communication establishment protocol using fingerprint biometrics

A Sarkar, BK Singh - Handbook of Computer Networks and Cyber Security …, 2020 - Springer
… a cancelable fingerprint biometric based session key generation and secure communication
… An overview of the proposed protocol in cloud environment is also discussed in this chapter. …

Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication

K Suresh, R Pal, SR Balasundaram - Complex & Intelligent Systems, 2022 - Springer
… key pair generation is proposed using fingerprint biometrics and password. An overview
of generating a stable cryptographic key pair from fingerprint biometrics and password is …