Human-computer authentication is a continuously important topic where besides security also the aspects of usability must be taken into consideration. Biometric authentication …
Background Recognition is an essential function of human beings. Humans easily recognize a person using various inputs such as voice, face, or gesture. In this study, we mainly focus …
Risk based authentication has been advocated as complement to traditional authentication mechanisms in order to raise the bar against attackers in possession of stolen credentials …
P Drozdowski, C Rathgeb, BA Mokroß… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The growing scale and number of biometric deployments around the world necessitates research into technologies which facilitate fast identification queries and high discriminative …
This paper proposes a novel finger knuckle patterns (FKP) based biometric recognition system that utilizes multi-scale bank of binarized statistical image features (B-BSIF) due to …
S Alwahaishi, J Zdrálek - 2020 IEEE International Conference …, 2020 - ieeexplore.ieee.org
Advances in the field of Information and Communication Technology and the importance of securing information make identifying and authenticating individuals a corner stone in the …
T Murakami, K Takahashi - arXiv preprint arXiv:2010.08238, 2020 - arxiv.org
LDP (Local Differential Privacy) has recently attracted much attention as a metric of data privacy that prevents the inference of personal data from obfuscated data in the local model …
CO Akanbi, IK Ogundoyin, JO Akintola… - Nigerian Journal of …, 2020 - ajol.info
Security of lives and properties remains a trending issue of optimal concern in the recent times. It is one of the major issues posing challenges to governments, establishments and …
M Cornacchia, F Papa, B Sapio - Technology Analysis & Strategic …, 2020 - Taylor & Francis
Voice biometric systems are going to be increasingly used in real-life scenarios, in substitution of or in combination with other ways to verify a person's claimed identity. This …