Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid, A Ibrahim… - Mathematics, 2022 - mdpi.com
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

Deep learning algorithms based fingerprint authentication: systematic literature review

H Chiroma - Journal of Artificial Intelligence and Systems, 2021 - iecscience.org
Deep Learning algorithms (DL) have been applied in different domains such as computer
vision, image detection, robotics and speech processing, in most cases, DL demonstrated …

Recent iris and ocular recognition methods in high-and low-resolution images: A survey

YW Lee, KR Park - Mathematics, 2022 - mdpi.com
Among biometrics, iris and ocular recognition systems are the methods that recognize eye
features in an image. Such iris and ocular regions must have a certain image resolution to …

Gaitfi: Robust device-free human identification via wifi and vision multimodal learning

L Deng, J Yang, S Yuan, H Zou… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
As an important biomarker for human identification, human gait can be collected at a
distance by passive sensors without subject cooperation, which plays an essential role in …

Comparative analysis of fingerprint features extraction methods

M Mua'ad, ZA Alqadi, K Aldebei - Journal of Hunan University Natural …, 2021 - jonuns.com
Human fingerprint features extraction is important for building a fingerprint classification
system. The extracted features must be unique and stable by remaining unchanged for the …

IncreAuth: Incremental learning based behavioral biometric authentication on smartphones

Z Shen, S Li, X Zhao, J Zou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Touch behavior biometric has been widely studied for continuous authentication on mobile
devices, which provides a more secure authentication in an implicit process. However, the …

Keystroke dynamics-based authentication using unique keypad

M Choi, S Lee, M Jo, JS Shin - Sensors, 2021 - mdpi.com
Authentication methods using personal identification number (PIN) and unlock patterns are
widely used in smartphone user authentication. However, these authentication methods are …

Cognitive intelligence for monitoring fractured post-surgery ankle activity using channel information

A Barua, ZY Zhang, F Al-Turjman, X Yang - IEEE Access, 2020 - ieeexplore.ieee.org
In the past decades, cognitive computing and communication densely used in lots of
networking areas. Current improvement in deep learning (DL) and big data analysis create …

NeuroBiometric: An eye blink based biometric authentication system using an event-based neuromorphic vision sensor

G Chen, F Wang, X Yuan, Z Li… - IEEE/CAA Journal of …, 2020 - ieeexplore.ieee.org
The rise of the Internet and identity authentication systems has brought convenience to
peopleʼ s lives but has also introduced the potential risk of privacy leaks. Existing biometric …

Contactless palmprint recognition system: a survey

DWS Alausa, E Adetiba, JA Badejo, IE Davidson… - IEEE …, 2022 - ieeexplore.ieee.org
Information systems in organizations traditionally require users to remember their secret pins
or (passwords), token, card number, or both to confirm their identities. However, the …