Bio-Hash Secured Hardware e-Health Record System

MM Sravani, SA Durai - IEEE Transactions on Biomedical …, 2023 - ieeexplore.ieee.org
Dual securing strategy for all-hardware e-Health Record System is designed and developed
for improved security and reduced Hardware Execution Time (HET). A compact novel …

Advances in fingerprint technology

R Patel, S Ramalingam - Biometric-Based Physical and Cybersecurity …, 2019 - Springer
Fingerprint technology has evolved immensely since its initial use in the 1800s when it was
used solely to assist with crime investigations. It is now used as a convenience replacing …

Improving the Performance of Multimodal Biometric Recognition Using Machine Learning Techniques in Comparison with K-fold Cross Validation

B Mahalakshmi, D Beulah David - International Conference on …, 2023 - Springer
This paper proposes an intelligent computational multimodal biometric recognition
technique to automatically authenticate face and fingerprint (FP) images using machine …

Enhanced Hybrid Component-Based Face Recognition

AM Gumede, S Viriri, MV Gwetu - … 27-29, 2017, Proceedings, Part I 9, 2017 - Springer
This paper presents a hybrid component-based face recognition. Can face recognition be
enhanced by recognizing individual facial components: forehead, eyes, nose, cheeks …

[PDF][PDF] A Novel Review on Biometric System Based on Digital Signal Processing

DJ Uppari - Citeseer
Biometric system is a device used to identify the individual based on physiological or
behavior characteristics. The unique identification can be measured either through …

[PDF][PDF] Journal Homepage:-www. journalijar. com

A Pugazhendhi, DS Sekar - academia.edu
In modern days, the security process using the biometric system is a fast improving, efficient
and reliable system. Biometric relates to the utilization of the physiological or behavioral …

A Biometric Approach to Prevent False Use of IDs

R Patel - 2019 - uhra.herts.ac.uk
What is your username? What is your password? What is your PIN number? These are
some of the commonly used key questions users need to answer accurately in order to verify …

[PDF][PDF] Anovel BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONMENTS

AIN PERVASIVE - academia.edu
The paradigm of embedding computing devices in our surrounding environment has gained
more interest in recent days. Along with contemporary technology comes challenges, the …

[引用][C] A survey on unimodal, multimodal biometrics and its fusion techniques

AS Raju, V Udayashankara - International Journal of Engineering and Technology …, 2018

[引用][C] Journal of Biometrics & Biostatistics