Presentation attack detection for iris recognition system using NIR camera sensor

DT Nguyen, NR Baek, TD Pham, KR Park - Sensors, 2018 - mdpi.com
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris
recognition system has proven to be effective for achieving a high recognition accuracy and …

Visual speaker identification and authentication by joint spatiotemporal sparse coding and hierarchical pooling

JY Lai, SL Wang, AWC Liew, XJ Shi - Information Sciences, 2016 - Elsevier
Recent research shows that lip shape and lip movement contain abundant identity-related
information and can be used as a new kind of biometrics in speaker identification or …

Enhanced algorithm for bio metric based secret data hiding

M Kavitha, S Syedakbar, T Meenal… - IOP Conference …, 2021 - iopscience.iop.org
Distributed illustration is used for compression method. For a replacement given fingerprint
pictures, represent its patches in line with the wordbook by computing l0-minimization then …

Robust face recognition based on a new supervised kernel subspace learning method

A Khalili Mobarakeh, JA Cabrera Carrillo… - Sensors, 2019 - mdpi.com
Face recognition is one of the most popular techniques to achieve the goal of figuring out the
identity of a person. This study has been conducted to develop a new non-linear subspace …

A minutiae-based method to store and compare fingerprints

EA Alhamad, MSA Logmani… - International …, 2024 - inderscienceonline.com
Biometrics refers to certain physical or behavioural characteristics that are unique to every
person. Biometrics, including fingerprints, are used for the measurement and analysis of …

An indexing algorithm based on clustering of minutia cylinder codes for fast latent fingerprint identification

I Pérez-Sánchez, B Cervantes, MA Medina-Pérez… - IEEE …, 2021 - ieeexplore.ieee.org
Latent fingerprint identification is one of the leading forensic activities to clarify criminal acts.
However, its computational cost hinders the rapid decision making in the identification of an …

Invariant Feature Encoding for Contact Handprints Using Delaunay Triangulated Graph

AJ Mohamed Abdul Cader, J Banks, V Chandran - Applied Sciences, 2023 - mdpi.com
Contact-based biometric applications primarily use prints from a finger or a palm for a single
instance in different applications. For access control, there is an enrollment process using …

Introductory chapter: On fingerprint recognition

M Sarfraz - Biometric Systems, 2021 - books.google.com
The biometric phrase means life measurement in the Greek language [1]. That is any
technique used for measuring biological information for recognition goals called biometric …

Classification of live scanned fingerprints using histogram of gradient descriptor

F Saeed, M Hussain… - 2018 21st Saudi computer …, 2018 - ieeexplore.ieee.org
The processing time during fingerprint recognition is a main problem when the fingerprint
database is huge. Classifying fingerprints into subcategories is an effective way to restrict …

A new biometric-based security framework for cloud storage

I Nakouri, M Hamdi, TH Kim - 2017 13th International Wireless …, 2017 - ieeexplore.ieee.org
Cloud computing is a paradigm that is redrawing the information technology landscape by
outsourcing the computation and data storage services to public cloud service providers …