H Chiroma - Journal of Artificial Intelligence and Systems, 2021 - iecscience.org
Deep Learning algorithms (DL) have been applied in different domains such as computer vision, image detection, robotics and speech processing, in most cases, DL demonstrated …
Among biometrics, iris and ocular recognition systems are the methods that recognize eye features in an image. Such iris and ocular regions must have a certain image resolution to …
L Deng, J Yang, S Yuan, H Zou… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
As an important biomarker for human identification, human gait can be collected at a distance by passive sensors without subject cooperation, which plays an essential role in …
Human fingerprint features extraction is important for building a fingerprint classification system. The extracted features must be unique and stable by remaining unchanged for the …
Z Shen, S Li, X Zhao, J Zou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Touch behavior biometric has been widely studied for continuous authentication on mobile devices, which provides a more secure authentication in an implicit process. However, the …
M Choi, S Lee, M Jo, JS Shin - Sensors, 2021 - mdpi.com
Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are …
A Barua, ZY Zhang, F Al-Turjman, X Yang - IEEE Access, 2020 - ieeexplore.ieee.org
In the past decades, cognitive computing and communication densely used in lots of networking areas. Current improvement in deep learning (DL) and big data analysis create …
G Chen, F Wang, X Yuan, Z Li… - IEEE/CAA Journal of …, 2020 - ieeexplore.ieee.org
The rise of the Internet and identity authentication systems has brought convenience to peopleʼ s lives but has also introduced the potential risk of privacy leaks. Existing biometric …
DWS Alausa, E Adetiba, JA Badejo, IE Davidson… - IEEE …, 2022 - ieeexplore.ieee.org
Information systems in organizations traditionally require users to remember their secret pins or (passwords), token, card number, or both to confirm their identities. However, the …