Fingerprint feature extraction with artificial neural network and image processing methods

M Szymkowski, K Saeed - Advances in Soft and Hard Computing, 2019 - Springer
Fingerprints are often claimed as the safest measurable human trait. As one can observe
they are commonly used in many different solutions. Nowadays they are applied for instance …

Biometrics based on deep learning: A survey

BZ Kamil, DA Abdullah, HR Hatem - International Journal of …, 2024 - ijnaa.semnan.ac.ir
Biometrics is concerned with the identification and verification of people using their
physiological and behavioral characteristics which are enduring and distinctive and these …

Automotive start–stop engine based on fingerprint recognition system

P Rivandi, A Winda, D Satrio… - E3S web of …, 2019 - e3s-conferences.org
Automated vehicle security system plays an important rule in nowadays advance automotive
technology. One of the methods which can be applied for a security system is based on …

Dinâmica da digitação aplicada a autenticação periódica de usuários em ambientes virtuais de aprendizagem

MAS Cruz, JC Duarte… - Revista Brasileira de …, 2017 - milanesa.ime.usp.br
A autenticação de usuário nos ambientes virtuais de aprendizagem (AVAs) existentes é, em
geral, pontual e intrusiva, ocorrendo no momento em que o usuário se conecta ao …

Text mining to discover design features for cybersecurity tools: The case of password management systems

Y Alshboul, W Odat - Proceedings of the 2021 5th International …, 2021 - dl.acm.org
Username and password are the most common authentication approach used today in
cybersecurity. Most people have more than one online account protected by passwords …

Missing person tracking system

A Besra, AJ Ahmed, S Priyadarshini - Proceeding of Fifth International …, 2021 - Springer
In this paper, we propose a Missing Person Tracking System. It'sa web-based application for
the police investigation team to track the missing person. This system, therefore, was to …

Design And Implementation Of A Block Chain Enabled E-Voting With IoT

SJ Anand, SV Priya, C Dineshkumar… - … on Smart Structures …, 2023 - ieeexplore.ieee.org
This study presents a comprehensive five-year analysis of a pioneering Blockchain-enabled
E-Voting system, augmented with Internet of Things (IoT) integration. The research focused …

On Solving Fingerprint Cryptography Using Heptagonal Fuzzy Numbers and Cipher

S Kavitha, K Selvakumari - 2024 Ninth International …, 2024 - ieeexplore.ieee.org
Fingerprint is a unique pattern developed inside of the hand. It helps to identify a person and
secure a lock for personal devices or data. This impression was processed in ways such as …

[HTML][HTML] 基于用户行为特征的低能耗身份认证

林梦琪, 张晓梅 - Software Engineering and Applications, 2022 - hanspub.org
目前, 移动设备中传统的身份认证如密码, 指纹等方式存在安全性低, 易被破解等风险,
不能完全保护使用者的隐私. 本文提出基于用户行为特征的持续身份认证方案 …

Criminal Background Check Program with Fingerprint

N Chumuang, M Ketcham, A Sawatnatee - Advances in Intelligent …, 2019 - Springer
Fingerprint recognition is one of the most widely used methods of biometrics. This method
relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing …