E Fourati, W Elloumi, A Chetouani - Multimedia Tools and Applications, 2020 - Springer
Despite the rapid growth of face recognition-based biometrics for both authentication and identification, the security of face biometric systems against presentation attacks (also called …
Breath sounds have been shown as a potential biometric in personal identification and verification. In this article, we show that by combining signals captured by motion sensors on …
M Rane, T Latne, U Bhadade - ICDSMLA 2019: Proceedings of the 1st …, 2020 - Springer
Human identification systems based on biometrics are used in many applications to increase the security level. There are different biometric traits which are used in various …
The Encyclopedia of Image Processing presents a vast collection of well-written articles covering image processing fundamentals (eg color theory, fuzzy sets, cryptography) and …
P Byahatti, MS Shettar - IOP conference series: materials science …, 2020 - iopscience.iop.org
Deployment of biometric systems in the applications of real world includes the most of unimodal biometric systems. Unimodal biometric system based on the information collected …
B Aldjia, B Leila - … on Recent Advances in Mathematics and …, 2021 - ieeexplore.ieee.org
In this paper, a new multi-modal biometric identification system is proposed using a Convolutional neural network (CNN), in which we make an early fusion (sensor level fusion) …
E Fourati, W Elloumi… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Face recognition-based authentication techniques can be easily spoofed using various types of attack. Consistent counter-measures need to meet certain requirements, mainly …
W Elloumi, A Chetouani, TB Charrada, E Fourati - Deep biometrics, 2020 - Springer
Despite the fact that face recognition systems have improved significantly, the main concern of these systems remains its security against presentation attacks, so-called spoofing …
O HAMDI, MA CHALOUF… - e-Health Security …, 2024 - books.google.com
To ensure continuous patient monitoring, e-health systems enable healthcare professionals to remotely access medical servers to consult patient medical information. The use of …