A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …

Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …

Enhanced multimodal biometric recognition approach for smart cities based on an optimized fuzzy genetic algorithm

V Rajasekar, B Predić, M Saracevic, M Elhoseny… - Scientific Reports, 2022 - nature.com
Biometric security is a major emerging concern in the field of data security. In recent years,
research initiatives in the field of biometrics have grown at an exponential rate. The …

Feature encoding and selection for Iris recognition based on variable length black hole optimization

TOQ Saraf, N Fuad, NSAM Taujuddin - Computers, 2022 - mdpi.com
Iris recognition as a biometric identification method is one of the most reliable biometric
human identification methods. It exploits the distinctive pattern of the iris area. Typically …

Automatic fuzzy genetic algorithm in clustering for images based on the extracted intervals

D Phamtoan, T Vovan - Multimedia Tools and Applications, 2021 - Springer
This research proposes the method to extract the characteristics of images to become the
intervals. These intervals are used to build the automatic fuzzy genetic algorithm for images …

Fuzzy clustering algorithm for outlier-interval data based on the robust exponent distance

D Phamtoan, K Nguyenhuu, T Vovan - Applied Intelligence, 2022 - Springer
The outlier elements of a data are ones that differs significantly from others. For many
reasons, we have to face with outlier elements in data analysis for the different fields …

Deep rule-based classifier for finger knuckle pattern recognition system

A Attia, Z Akhtar, NE Chalabi, S Maza, Y Chahir - Evolving Systems, 2021 - Springer
In this paper, we proposed a novel finger knuckle pattern (FKP) based personal
authentication system using multilayer deep rule based (DRB) classifier. The presented …

[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction

R Ryu, S Yeom, D Herbert, J Dermoudy - ICT Express, 2023 - Elsevier
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …

A novel path planning method for aerial UAV based on improved genetic algorithm

H Liu - 2023 Third International Conference on Artificial …, 2023 - ieeexplore.ieee.org
In the actual flight mission of modern drones, the range of obstacles in the sensor detection
environment will be deviated, and the control system will also have control errors when …

Enhanced biometric recognition for secure authentication using iris preprocessing and hyperelliptic curve cryptography

V Rajasekar, J Premalatha… - … and mobile computing, 2020 - Wiley Online Library
Biometrics combined with cryptography can be employed to solve the conceptual and
factual identity frauds in digital authentication. Biometric traits are proven to provide …