Continuous multimodal biometric authentication schemes: a systematic review

R Ryu, S Yeom, SH Kim, D Herbert - IEEE Access, 2021 - ieeexplore.ieee.org
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …

A scoping review of qualitative research methods used with people in prison

P Abbott, M DiGiacomo, P Magin… - International Journal of …, 2018 - journals.sagepub.com
Researchers undertaking qualitative interview and focus group research with people in
prison must consider the research methods they use, given the ethical and practical …

Biometric authentication and image encryption for image security in cloud framework

V Kakkad, M Patel, M Shah - Multiscale and Multidisciplinary Modeling …, 2019 - Springer
Cloud computing is a major blooming technology which has numerous applications in
today's market and is rightly so hyped. Images are a major part of today's internet data traffic …

Extracting human attributes using a convolutional neural network approach

HA Perlin, HS Lopes - Pattern Recognition Letters, 2015 - Elsevier
Extracting high level information from digital images and videos is a hard problem frequently
faced by the computer vision and machine learning communities. Modern surveillance …

A biometric authentication model using hand gesture images

S Fong, Y Zhuang, I Fister, I Fister - Biomedical engineering online, 2013 - Springer
A novel hand biometric authentication method based on measurements of the user's
stationary hand gesture of hand sign language is proposed. The measurement of hand …

The identification of living persons on images: A literature review

D Gibelli, Z Obertová, S Ritz-Timme, P Gabriel, T Arent… - Legal medicine, 2016 - Elsevier
Personal identification in the forensic context commonly concerns unknown decedents.
However, recently there has been an increase in cases which require identification of living …

A survey on soft biometrics for human identification

A Abdelwhab, S Viriri - Machine Learning and Biometrics, 2018 - books.google.com
The focus has been changed to multi-biometrics due to the security demands. The ancillary
information extracted from primary biometric (face and body) traits such as facial …

Method and system for tracking an object in a defined area

N Danielsson, A Hansson - US Patent 10,839,228, 2020 - Google Patents
A method and system for tracking objects in a defined area compares image data of a
detected object to profiles of persons that have entered the defined area to find the best …

WiAi-ID: Wi-Fi-Based Domain Adaptation for Appearance-Independent Passive Person Identification

Y Liang, W Wu, H Li, F Han, Z Liu, P Xu… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Wi-Fi signal-based person identification has become a hot research topic due to the
widespread deployment of Wi-Fi devices and the fact that these approaches are noncontact …

A comprehensive study of document security system, open issues and challenges

RA Khan, SA Lone - Multimedia Tools and Applications, 2021 - Springer
The privacy and security of identity documents like Passports, PAN cards, Driving License as
well as other important personal documents like academic degree certificates are now at an …