Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

LiveNet: Improving features generalization for face liveness detection using convolution neural networks

YAU Rehman, LM Po, M Liu - Expert Systems with Applications, 2018 - Elsevier
Performance of face liveness detection algorithms in cross-database face liveness detection
tests is one of the key issues in face-biometric based systems. Recently, Convolution Neural …

Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS)

BB Gupta, V Prajapati, N Nedjah, P Vijayakumar… - Neural Computing and …, 2023 - Springer
Telecare medical information system (TMIS) is used to connect patients and doctors who are
at a different location from each other. The authentication of the user and system is very …

Biometrics and privacy-preservation: How do they evolve?

QN Tran, BP Turnbull, J Hu - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The emerging field of privacy-preserving biometrics is attracting significant attention, as a
paradigm that can address several of the key concerns in cryptographic authentication …

A complete user authentication and key agreement scheme using cancelable biometrics and PUF in multi-server environment

H Zhang, W Bian, B Jie, D Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the current development and popularization of biometrics recognition technology, our
biometrics and other identity information may be illegal bulk scalping, and there is the …

A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics

B Zahednejad, C Gao - Internet of Things, 2023 - Elsevier
Abstract As the Internet of Things (IoT) continues to grow, there is an increasing need for
secure and efficient authentication protocols for IoT devices. The design of IoT …

[PDF][PDF] Comprehensive study of biometric authentication systems, challenges and future trends

SS Harakannanavar, PC Renukamurthy… - International Journal of …, 2019 - researchgate.net
----------------------------------------------------------------------ABSTRACT----------------------------------------
--------------------Authentication is the key parameter to speak the truth of an attribute claimed …

A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - IEEE …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

Recent iris and ocular recognition methods in high-and low-resolution images: A survey

YW Lee, KR Park - Mathematics, 2022 - mdpi.com
Among biometrics, iris and ocular recognition systems are the methods that recognize eye
features in an image. Such iris and ocular regions must have a certain image resolution to …