A multiple reversible watermarking technique for fingerprint authentication

VB Joshi, MS Raval, D Gupta, PP Rege… - Multimedia Systems, 2016 - Springer
The classical fingerprint recognition system can be compromised at the database and the
sensor. Therefore, to beef up security of the fingerprint recognition system, reversible …

Real‐time AdaBoost cascade face tracker based on likelihood map and optical flow

A Ranftl, F Alonso‐Fernandez, S Karlsson… - IET …, 2017 - Wiley Online Library
The authors present a novel face tracking approach where optical flow information is
incorporated into a modified version of the Viola–Jones detection algorithm. In the original …

[PDF][PDF] Finger knuckle identification using principal component analysis and nearest mean classifier

S Neware, K Mehta, AS Zadgaonkar - International Journal of …, 2013 - researchgate.net
The texture pattern produced by the finger knuckle bending is highly unique and makes the
surface a distinctive biometric identifier. This paper presents literature survey and …

Real-time iris recognition system for non-ideal iris images

NB Linsangan, AG Panganiban, PR Flores… - Proceedings of the …, 2019 - dl.acm.org
Biometrics is popular nowadays because of its very useful security applications. There are
different biometric technologies but iris recognition system was considered the most reliable …

Feature extraction and learning approaches for cancellable biometrics: A survey

W Yang, S Wang, J Hu, X Tao… - CAAI Transactions on …, 2024 - Wiley Online Library
Biometric recognition is a widely used technology for user authentication. In the application
of this technology, biometric security and recognition accuracy are two important issues that …

Reconocimiento facial por el método de eigenfaces

FGC Julián, MV Reyes… - Pistas …, 2018 - pistaseducativas.celaya.tecnm.mx
En este trabajo se presenta una aplicación de detección facial por Eigenfaces que usa
Microsoft Visual Studio con diversas herramientas de programación como C# y librerías de …

A proposed iris recognition model for authentication in mobile exams

A Shdaifat, R Obeidallah, G Ghazal… - … Journal of Emerging …, 2020 - learntechlib.org
Mobile learning is an extended version of e-learning. The revolution of handheld devices
had encouraged design courses to be compatible with different mobiles versions, brands …

Extraction of intersecting palm‐vein and palmprint features for cancellable identity verification

J Lee, BS Oh, KA Toh - CAAI Transactions on Intelligence …, 2024 - Wiley Online Library
A novel method based on the cross‐modality intersecting features of the palm‐vein and the
palmprint is proposed for identity verification. Capitalising on the unique geometrical …

Biometrics security concerns

N Dahiya, C Kant - 2012 Second International Conference on …, 2012 - ieeexplore.ieee.org
Biometrics is the utilization of biological characteristics (face, iris, and fingerprint) or
behavioral traits (signature, voice) for identity verification of an individual. Biometric …

Unlocking the potential of artificial intelligence in electrocardiogram biometrics: age-related changes, anomaly detection, and data authenticity in mobile health …

KE Mangold, RE Carter, KC Siontis… - … Heart Journal-Digital …, 2024 - academic.oup.com
Aims Mobile devices such as smartphones and watches can now record single-lead
electrocardiograms (ECGs), making wearables a potential screening tool for cardiac and …