DCCA and DMCCA framework for multimodal biometric system

S Deshmukh, A Abhyankar, S Kelkar - Multimedia Tools and Applications, 2022 - Springer
Deep networks have been successfully applied to unsupervised feature learning for single
modalities such as Text, Image, or Audio. Here, we present the Deep Network that learns …

[PDF][PDF] An Application-Oriented Taxonomy on Spoofing, Disguise and Countermeasures in Speaker Recognition

L Li, X Cheng, TF Zheng - APSIPA Transactions on Signal …, 2022 - nowpublishers.com
Speaker recognition aims to recognize the identity of the speaking person. After decades of
research, current speaker recognition systems have achieved rather satisfactory …

[HTML][HTML] The Data-Adaptive Fellegi-Sunter Model for Probabilistic Record Linkage: Algorithm Development and Validation for Incorporating Missing Data and Field …

X Li, H Xu, S Grannis - Journal of Medical Internet Research, 2022 - jmir.org
Background Quality patient care requires comprehensive health care data from a broad set
of sources. However, missing data in medical records and matching field selection are 2 real …

Quality assessment-based iris and face fusion recognition with dynamic weight

K Xiao, Y Tian, Y Lu, Y Lai, X Wang - The Visual Computer, 2022 - Springer
Image quality is one of the most crucial influence factors when conducting biometric image-
based human identification. However, it is not considered in most existing multi-biometric …

Privacy-Preserving Convolutional Neural Networks Using Homomorphic Encryption

T Wingarz, M Gomez-Barrero, C Busch… - … on Biometrics and …, 2022 - ieeexplore.ieee.org
Convolutional neural networks (CNNs) are most commonly used for handling complex
visual tasks. Due to the significant effort in training accurate machine learning models …

An effective orchestration for fingerprint presentation attack detection

YK Lee, J Jeong, D Kang - Electronics, 2022 - mdpi.com
Fingerprint presentation attack detection has become significant due to a wide-spread
usage of fingerprint authentication systems. Well-replicated fingerprints easily spoof the …

India's “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities

PR Tiwari, D Agarwal, P Jain, S Dasgupta… - … Conference on Financial …, 2022 - Springer
India's Aadhaar is the largest biometric identity system in history, designed to help deliver
subsidies, benefits, and services to India's 1.4 billion residents. The Unique Identification …

Face verification method and apparatus

C Son, KIM Deoksang, M Ko, SON Jinwoo… - US Patent …, 2022 - Google Patents
(57) ABSTRACT A face verification method and apparatus is disclosed. The face verification
method includes selecting a current verifi cation mode, from among plural verification …

Automatic identification fingerprint based on machine learning method

LT Nguyen, HT Nguyen, AD Afanasiev… - Journal of the Operations …, 2022 - Springer
The fingerprint identification technology has been developed and applied effectively to
security systems in financial transactions, personal information security, national security …

Person tracking by fusing posture data from uav video and wearable sensors

A Mukashev, LD Van, S Sharma… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
In this article, a novel framework that fuses the posture data taken by a drone (or unmanned
aerial vehicle, UAV) camera and the wearable sensors data recorded by smartwatches is …