When machine learning meets security issues: A survey

Z Guan, L Bian, T Shang, J Liu - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Machine learning is one of the most prevalent techniques in recent decades which has been
widely applied in various fields. Among them, the applications that detect and defend …

[PDF][PDF] Automatic face recognition and detection using OpenCV, haar cascade and recognizer for frontal face

Z Arya, V Tiwari - Int. J. Eng. Res. Appl. www. ijera. com, 2020 - academia.edu
This research is based on real-time automatic frontal face recognition and detection using
OpenCV, Haar Cascade and recognizers. The recognizers used are Eigenface, Fisherface …

Automotive start-stop engine based on face recognition system

L William, A Winda, D Satrio, T Sofyan… - E3S web of …, 2019 - e3s-conferences.org
There are so many security devices such as code pin, dual control procedures, and ID card.
However, those devices have the potential to be lost, stolen or duplicated by someone. Due …

[PDF][PDF] Multimodal access control system combining RFID, fingerprint and facial recognition

M El Beqqal, M Azizi, JL Lanet - Indones. J. Electr. Eng …, 2020 - pdfs.semanticscholar.org
Monomodal biometry does not constitute an effective measure to meet the desired
performance requirements for large-scale applications, due to limitations such as noisy data …

The reliability and acceptance of biometric system in Bangladesh: Users perspective

S Siddique, M Yasmin, TB Taher, M Alam - arXiv preprint arXiv …, 2021 - arxiv.org
Biometric systems are the latest technologies of unique identification. People all over the
world prefer to use this unique identification technology for their authentication security. The …

3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine

A Bakshi, S Gupta, A Gupta, S Tanwar… - International Journal of …, 2020 - Wiley Online Library
In recent years, to solve the problem of face spoofing, momentous work has been done in
this field, but still, there is a need for establishing counter measures to the biometric spoofing …

Machine learning methods used in evaluations of secure biometric system components

B Arslan, M Ulker, S Sagiroglu - 2017 16th IEEE International …, 2017 - ieeexplore.ieee.org
This paper provides a comprehensive overview of theories, methodologies, techniques,
standards and frameworks of biometric systems. The studies conducted between 2007-2017 …

Rancang Bangun Sistem Presensi Menggunakan Deteksi Wajah dan Suhu Tubuh Berbasis Raspberry Pi

AW Widodo, AD Ratnasari, L Hakim… - Software …, 2023 - jurnal.poliwangi.ac.id
Upaya preventif dalam meminimalisir penyebaran virus Covid-19 terus dilakukan. Salah
satunya adalah dengan melakukan presensi dengan menggunakan metode tanpa kontak …

Investigating spoofing attacks for 3D cameras used in face biometrics

G Albakri, S AlGhowinem - … Systems and Applications: Proceedings of the …, 2019 - Springer
The unique features of human biometrics made it possible to benefit from these biometrics
and use them as authentication methods. On the other hand, fraudulent biometrics are …

[PDF][PDF] Fake Detection bei dem Fingerabdruck

T Hirschberg - 2017 - h-brs.de
Mit dem wachsenden Interesse an biometrischen Daten zur Authentisierung, steht auch die
Sicherheit dieser Verfahren auf dem Prüfstand. Dabei wird häufig der Fingerabdruck zur …