User Authentication System Based on Baseline-corrected ECG for Biometrics.

GH Choi, JH Jung, HM Moon… - … Automation & Soft …, 2019 - search.ebscohost.com
Recently, ECG-based user authentication technology, which is strong against forgery and
falsification, has been actively studied compared to fingerprint and face authentication. It is …

An improved framework for biometric Database's privacy

A El-Yahyaoui, F Omary - International Journal of …, 2021 - search.proquest.com
Security and privacy are huge challenges in biometric systems. Biometrics are sensitive data
that should be protected from any attacker and especially attackers targeting the …

Biometric authentication systems: security concerns and solutions

N Bhartiya, N Jangid, S Jannu - 2018 3rd international …, 2018 - ieeexplore.ieee.org
Biometrics is a measure of unique and permanent physical or behavioral traits of an
individual. As they are unique, they are more reliable in verifying a claimed identity. The …

[PDF][PDF] New approach for detecting leakage of internal information; using emotional recognition technology

HJ Lee, MW Park, JH Eom… - KSII Transactions on …, 2015 - koreascience.kr
Currently, the leakage of internal information has emerged as one of the most significant
security concerns in enterprise computing environments. Especially, damage due to internal …

Understanding user perspective in a university setting to improve biometric authentication adoption

A Patrick, A Burris, S Das, N Noah - Proceedings of the 9th Mexican …, 2022 - dl.acm.org
Personal devices have become equipped with more sophisticated security methods through
biometric authentication, which does not require users to memorize passwords and is …

[PDF][PDF] Face recognition using principle component analysis and linear discriminant analysis: comparative study

SB Dabhade, MM Kazi, YS Rode… - … national conference on …, 2013 - academia.edu
I am extremely happy to know that Technology Education Research Integrated Institutions
(TERII) is organiz. ing the 2oe National Conference on Advancements in the Era of Multi …

Speaker Recognition using Marathi (Varhadi) Language

NS Bansod, SB Dadhade… - 2014 International …, 2014 - ieeexplore.ieee.org
In this paper, we used Mel Frequency Cepstral Coefficients (MFCC) and Linear Prediction
Coding (LPC) used for features extractions. We applied these two techniques for …

Threats models on biometri systems: A comparative study

DH Nabil, B Karima, K Mouloud… - … Aspects of Social …, 2012 - ieeexplore.ieee.org
Several biometric threats systems models have been proposed to facilitate the design,
implementation and validation techniques for securing these systems. Some models classify …

The scheme of 3-level authentication mechanism for preventing internal information leakage

SP Cheon, JM Kang, MW Park… - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
In this paper, we proposed 3-level authentication technique to prevent internal information
leakage in network system. When system authenticates users, it requires user's ID&P/W …

Image Acquisition for Biometric: Face Recognition

SB Dabhade, NS Bansod, YS Rode, NP Bhosale… - 2022 - books.google.com
Biometrics is mostly used for authentication purposes in security. Due to the covid-19
pandemic situation, nowadays distance-based authentication systems are more focused …