H Choi, J Park, J Kim, Y Jung - Telematics and Informatics, 2020 - Elsevier
The widespread diffusion of mobile devices has led to a new method of value transfer that retains the features of mobile devices: mobile payments. Many researchers have …
In Ambient Intelligence (AmI), the activity a user is engaged in is an essential part of the context, so its recognition is of paramount importance for applications in areas like sports …
Recognizing people by their ear has recently received significant attention in the literature. Several reasons account for this trend: first, ear recognition does not suffer from some …
The way people walk is a strong correlate of their identity. Several studies have shown that both humans and machines can recognize individuals just by their gait, given that proper …
K Niinuma, U Park, AK Jain - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems …
Biometric identity verification refers to technologies used to measure human physical or behavioral characteristics, which offer a radical alternative to passports, ID cards, driving …
A Kumar, C Ravikanth - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
This paper investigates a new approach for personal authentication using fingerback surface imaging. The texture pattern produced by the finger knuckle bending is highly …
Biometric verification systems are currently being deployed in numerous large-scale and everyday applications. It is hence of the utmost importance to protect the privacy of the …
S Yoon, J Feng, AK Jain - IEEE transactions on pattern analysis …, 2012 - ieeexplore.ieee.org
The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that …