Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

Privacy at work: A review and a research agenda for a contested terrain

DP Bhave, LH Teo, RS Dalal - Journal of Management, 2020 - journals.sagepub.com
Privacy in the workplace is a pivotal concern for employees and employers. Employees
expect to be in control of the personal information and access they provide to the …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - IEEE Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication

M Frank, R Biedert, E Ma, I Martinovic… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification

M Haghighat, S Zonouz, M Abdel-Mottaleb - Expert Systems with …, 2015 - Elsevier
In biometric identification systems, the biometric database is typically stored in a trusted
server, which is also responsible for performing the identification process. However, a …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

A review of biometric technology along with trends and prospects

JA Unar, WC Seng, A Abbasi - Pattern recognition, 2014 - Elsevier
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …

[HTML][HTML] A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Insights into materials, physics, and applications in flexible and wearable acoustic sensing technology

Z Lin, S Duan, M Liu, C Dang, S Qian… - Advanced …, 2024 - Wiley Online Library
Sound plays a crucial role in the perception of the world. It allows to communicate, learn,
and detect potential dangers, diagnose diseases, and much more. However, traditional …