[HTML][HTML] Using deep learning techniques and genetic-based feature extraction for presentation attack mitigation

J Jenkins, K Roy, J Shelton - Array, 2020 - Elsevier
Biometric authentication systems are becoming more prevalent for commercial use with
computers and smart devices. Biometric systems also have several vulnerable points that …

WebID+ biometrics with permuted disposable features

T Richardson, J Shelton, Y Eady, K Kyei… - Proceedings of the 2022 …, 2022 - dl.acm.org
For networked communications, cyber security and authentication are critical components.
This work deals with the issue of security and authentication as it relates to features of the …

[HTML][HTML] Biometric Authentication for the Mitigation of Human Risk on a Social Network

A Jackson, K Kyei, Y Eady, B Dowtin… - Human Factors in …, 2024 - books.google.com
The increasing reliance on digital systems in today's interconnected world has brought
about a corresponding surge in cyber threats, making cybersecurity a critical concern. While …