A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems

D Gümüşbaş, T Yıldırım, A Genovese… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …

Automated latent fingerprint identification system: A review

N Singla, M Kaur, S Sofat - Forensic science international, 2020 - Elsevier
Latent fingerprints are considered as one of the important evidences obtained from the site
of crime. The process of developing, acquiring, processing and matching of latent …

Exploiting Level 1 and Level 3 features of fingerprints for liveness detection

AA Alshdadi, R Mehboob, H Dawood… - … Signal Processing and …, 2020 - Elsevier
Fingerprint-based biometric systems are designed to authenticate and provide authorized
access to the users in various security applications. However, such systems can be …

Fingerprint pore matching using deep features

F Liu, Y Zhao, G Liu, L Shen - Pattern Recognition, 2020 - Elsevier
As a popular living fingerprint feature, sweat pore has been adopted to build robust high
resolution automated fingerprint recognition systems (AFRSs). Pore matching is an …

[Retracted] Image Classification Model Based on Deep Learning in Internet of Things

S Zou, W Chen, H Chen - Wireless Communications and …, 2020 - Wiley Online Library
In the environment of Internet of Things, the convolutional neural network (CNN) is an
important tool and method of image classification. However, the features that are extracted …

[PDF][PDF] Performances of proposed normalization algorithm for iris recognition.

Y Jusman, NS Cheok, K Hasikin - International Journal of Advances …, 2020 - academia.edu
A typical biometric recognition system mainly consists of four modules, acquisition and
detection of biometric characteristics, extraction of a feature set, representation of the …

Latent fingerprint database using reflected ultra violet imaging system

N Singla, M Kaur, S Sofat - Procedia Computer Science, 2020 - Elsevier
Latent fingerprint is considered as the key evidence during crime scene investigations.
Various powder and chemical methods are available for visualizing the latent fingerprints as …

[PDF][PDF] Palm print recognition using inner finger deep learning using neural network

YSDL Prasanna, RM Deepika - International Journal, 2020 - ijasret.com
Biometric systems based on touch less and less constrained palm print are being
increasingly studied since they allow a favorable trade-off between high-accuracy and high …

Fingerprint pores extraction by using automatic scale selection

D Agarwal, A Bansal - International Journal of Biometrics, 2020 - inderscienceonline.com
Extraction of fingerprint sweat pores is a critical step in those applications which are based
on highly secured features. Pores are varying in scale (size) and evenly distributed along …

Fast pore matching method based on core point alignment and orientation

H Khmila, IK Kallel, S Barhoumi… - … for Signal and …, 2020 - ieeexplore.ieee.org
Nowadays, high-resolution fingerprint images are more and more used in the fingerprint
recognition systems thanks to the recognition accuracy that they provide. Indeed, they offer …