L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication …
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Y Perwej, K Haq, F Parwej, M Mumdouh… - International Journal of …, 2019 - researchgate.net
There is no suspicion that IoT has added a new dimension to the living being by the link between smart objects. Thus making the link among any media and anything at any place …
As a biometric modality, palmprints have been largely under-utilized, but they offer some advantages over fingerprints and facial biometrics. Recent improvements in imaging …
A data augmentation methodology is presented and applied to generate a large dataset of off-axis iris regions and train a low-complexity deep neural network. Although of low …
This article presents a detailed discussion of various aspects of watermarking technologies on applications ranging from the embedding of marks in the pictorial information on paper to …
EC Ketola, M Barankovich, S Schuckers… - Sensors, 2022 - mdpi.com
Commercial use of biometric authentication is becoming increasingly popular, which has sparked the development of EEG-based authentication. To stimulate the brain and capture …
Mobile devices, such as smartphones and tablets, are frequently used for creation and transmission of private and sensitive messages and files. While personal identification …
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the …