U Gawande, Y Golhar - International Journal of Biometrics, 2018 - inderscienceonline.com
Biometric-based system is used for authentication of an individual and to counter the possible threats used for security purpose. A wide variety of systems require reliable …
In this study, the authors propose a novel approach for palm vein recognition relying on high dynamic range (HDR) imaging. Specifically, the authors speculate that the exploitation of …
F Wu, XY Jing, X Dong, R Hu, D Yue… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Multispectral images contain rich recognition information since the multispectral camera can reveal information that is not visible to the human eye or to the conventional RGB camera …
Renewable energy production is constantly growing worldwide, and some countries produce a relevant percentage of their daily electricity consumption through wind energy …
P Gupta, P Gupta - IEEE Transactions on Industrial Electronics, 2018 - ieeexplore.ieee.org
In this paper, a multibiometric system that fuses slap fingerprints, palm dorsal vein, and hand geometry for accurate person authentication is proposed. The proposed system …
Computational facial models that capture properties of facial cues related to aging and kinship increasingly attract the attention of the research community, enabling the …
C Li, J Xue, C Quan, J Yue, C Zhang - PloS one, 2018 - journals.plos.org
Biometric recognition technology based on eye-movement dynamics has been in development for more than ten years. Different visual tasks, feature extraction and feature …
RF Soliman, M Amin, FE Abd El-Samie - Optical and Quantum Electronics, 2018 - Springer
In a cancelable iris recognition technique, all enrollment patterns are masked using a transformation function, and the invertibility process for obtaining the original data should not …
GL Masala, P Ruiu, E Grosso - Computer and network security essentials, 2018 - Springer
Two important topics related to the cloud security are discussed in this chapter: the authentication of logical users accessing the cloud, and the security of data stored on public …