A review of biometric technology along with trends and prospects

JA Unar, WC Seng, A Abbasi - Pattern recognition, 2014 - Elsevier
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …

[PDF][PDF] Biometric authentication: A review

D Bhattacharyya, R Ranjan… - … Journal of u-and e …, 2009 - biometrie-online.net
Advances in the field of Information Technology also make Information Security an
inseparable part of it. In order to deal with security, Authentication plays an important role …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

DCT-based iris recognition

DM Monro, S Rakshit, D Zhang - IEEE transactions on pattern …, 2007 - ieeexplore.ieee.org
This paper presents a novel iris coding method based on differences of discrete cosine
transform (DCT) coefficients of overlapped angular patches from normalized iris images. The …

Behavioural biometrics: a survey and classification

RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …

A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing

Y Wang, J Hu, D Phillips - IEEE Transactions on Pattern …, 2007 - ieeexplore.ieee.org
In this paper, we have proposed a fingerprint orientation model based on 2D Fourier
expansions (FOMFE) in the phase plane. The FOMFE does not require prior knowledge of …

Keystroke dynamics for user authentication

Y Zhong, Y Deng, AK Jain - 2012 IEEE computer society …, 2012 - ieeexplore.ieee.org
In this paper we investigate the problem of user authentication using keystroke biometrics. A
new distance metric that is effective in dealing with the challenges intrinsic to keystroke …

Developments in the human machine interface technologies and their applications: a review

HP Singh, P Kumar - Journal of medical engineering & technology, 2021 - Taylor & Francis
Human-machine interface (HMI) techniques use bioelectrical signals to gain real-time
synchronised communication between the human body and machine functioning. HMI …

Multi-objective optimization for modular granular neural networks applied to pattern recognition

P Melin, D Sánchez - Information Sciences, 2018 - Elsevier
A new method for Modular Neural Network optimization based on a Multi-objective
Hierarchical Genetic Algorithm is proposed in this paper. The modular neural network using …

User identity verification via mouse dynamics

C Feher, Y Elovici, R Moskovitch, L Rokach… - Information Sciences, 2012 - Elsevier
Identity theft is a crime in which hackers perpetrate fraudulent activity under stolen identities
by using credentials, such as passwords and smartcards, unlawfully obtained from …