AI-powered biometrics for Internet of Things security: A review and future vision

AI Awad, A Babu, E Barka, K Shuaib - Journal of Information Security and …, 2024 - Elsevier
Biometrics is a set of advanced technologies that use the physical or behavioral
characteristics of individuals to provide reliable access control. With the rapid development …

Red fluorescent carbon dot powder for accurate latent fingerprint identification using an artificial intelligence program

XY Dong, XQ Niu, ZY Zhang, JS Wei… - ACS applied materials …, 2020 - ACS Publications
Development and comparison of the latent fingerprints (LFPs) are two major studies in
detection and identification of LFPs, respectively. However, integrated research studies on …

Online finger-knuckle-print verification for personal authentication

L Zhang, L Zhang, D Zhang, H Zhu - Pattern recognition, 2010 - Elsevier
Biometric based personal authentication is an effective method for automatically
recognizing, with a high confidence, a person's identity. By observing that the texture pattern …

Periocular biometrics in the visible spectrum

U Park, RR Jillela, A Ross… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The term periocular refers to the facial region in the immediate vicinity of the eye. Acquisition
of the periocular biometric is expected to require less subject cooperation while permitting a …

A survey on touch dynamics authentication in mobile devices

PS Teh, N Zhang, ABJ Teoh, K Chen - Computers & Security, 2016 - Elsevier
There have been research activities in the area of keystroke dynamics biometrics on
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …

Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

Deepprivacy2: Towards realistic full-body anonymization

H Hukkelås, F Lindseth - … of the IEEE/CVF winter conference …, 2023 - openaccess.thecvf.com
Abstract Generative Adversarial Networks (GANs) are widely adapted for anonymization of
human figures. However, current state-of-the-art limit anonymization to the task of face …

A comparative study of palmprint recognition algorithms

D Zhang, W Zuo, F Yue - ACM computing surveys (CSUR), 2012 - dl.acm.org
Palmprint images contain rich unique features for reliable human identification, which makes
it a very competitive topic in biometric research. A great many different low resolution …

[HTML][HTML] An investigation of biometric authentication in the healthcare environment

J Mason, R Dave, P Chatterjee, I Graham-Allen… - Array, 2020 - Elsevier
A vast amount of growth has taken place in the field of biometrics and in the healthcare
industry. Biometrics provides the ability to identify individuals based on their physical and …

Security in next generation mobile payment systems: A comprehensive survey

W Ahmed, A Rasool, AR Javed, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Cash payment is still king in several markets, accounting for more than 90% of the payments
in almost all the developing countries. The usage of mobile phones is pretty ordinary in this …