A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection

U Sumalatha, KK Prakasha, S Prabhu… - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary technological landscape, biometrics, encompassing the analysis of
biological data, have gained significance. Biometrics is a methodology that utilize unique …

[HTML][HTML] Supervised machine learning tools and PUF based internet of vehicles authentication framework

PK Sadhu, J Eickholt, VP Yanambaka, A Abdelgawad - Electronics, 2022 - mdpi.com
The recent advancement of the Internet of Things (IoT) in the fields of smart vehicles and
integration empowers all cars to join to the internet and transfer sensitive traffic information …

Detection of malicious cloud bandwidth consumption in cloud computing using machine learning techniques

D Veeraiah, R Mohanty, S Kundu… - Computational …, 2022 - Wiley Online Library
The Internet of Things, sometimes known as IoT, is a relatively new kind of Internet
connectivity that connects physical objects to the Internet in a way that was not possible in …

[HTML][HTML] Efficient key exchange using identity-based encryption in multipath TCP environment

AS Almuflih, K Popat, VV Kapdia, MRNM Qureshi… - Applied Sciences, 2022 - mdpi.com
Across the globe, wireless devices with Internet facilities such as smartphones and tablets
have become essential assets for communication and entertainment alike for everyday life …

[HTML][HTML] Blockchain-based biometric identity management

SHG Salem, AY Hassan, MS Moustafa, MN Hassan - Cluster Computing, 2023 - Springer
In recent years, face biometrics recognition systems are a wide space of a computer usage
which is mostly employed for security purpose. The main purpose of the face biometrics …

[HTML][HTML] An efficient confidence interval-based dual-key fuzzy vault scheme for operator authentication of autonomous unmanned aerial vehicles

J Choi, J Lee, A Kim - Applied Sciences, 2023 - mdpi.com
The fuzzy vault is an innovative way to share secret keys, combining traditional cryptography
with biometrics and biometric template protection. This method forms the basis for the …

A Minutiae Selection Algorithm (MSA) for efficient palmprint matching using Histograms of Differences (HoDs)

AB Mehmood, IA Taj, M Ghafoor - Expert Systems with Applications, 2023 - Elsevier
Palmprints have gained enormous popularity in the biometric industry recently. Due to the
large amount of information provided by the palmprints and their forensic value, many large …

Performance Improvement of Multibiometric Authentication System Using Score Level Fusion with Ant Colony Optimization

E Balraj, T Abirami - Wireless Communications and Mobile …, 2022 - Wiley Online Library
Biometric systems are widely used by many organisations to protect the data from anomaly
users. Unimodal biometric systems have many problems like noisy data, nonversatility, and …

Security protection mechanism in cloud computing authorization model using machine learning techniques

PK Tiwari, K Kannan, D Veeraiah… - Wireless …, 2022 - Wiley Online Library
Because of the vast number of applications and the ambiguity in application methods,
handwritten character recognition has garnered widespread recognition and increased …

Secure information collection and energy efficiency in heterogeneous sensor networks using machine learning with the internet of things

Y Misra, AK Srivastava, AJ Ahmad… - Wireless …, 2022 - Wiley Online Library
Regarding the preservation of human life, this is one of the secondary research goals that
the WSN strives to achieve. There have been the development and testing of a number of …