[PDF][PDF] Biometric authentication: A review

D Bhattacharyya, R Ranjan… - … Journal of u-and e …, 2009 - biometrie-online.net
Advances in the field of Information Technology also make Information Security an
inseparable part of it. In order to deal with security, Authentication plays an important role …

[PDF][PDF] Recent advances in multimedia information system security

S Lian, D Kanellopoulos, G Ruffo - Informatica, 2009 - informatica.si
Recent Advances in Multimedia Information System Security Page 1 Informatica 33 (2009) 3–24
3 Recent Advances in Multimedia Information System Security Shiguo Lian France Telecom …

A study of users' acceptance and satisfaction of biometric systems

M El-Abed, R Giot, B Hemery… - 44th Annual 2010 IEEE …, 2010 - ieeexplore.ieee.org
Biometric authentication methods are being increasingly used for many types of
applications. Since such methods necessitate humans to interact with a device, effective …

Information Security Methods—Modern Research Directions

A Shelupanov, O Evsyutin, A Konev, E Kostyuchenko… - Symmetry, 2019 - mdpi.com
In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main
areas of research is information security. The work is carried out by a scientific group under …

[PDF][PDF] Trends in Biometric Authentication: A review

RM Ibrahim, MM Elkelany, A Ake, MI El-Afifi - vol, 2023 - njccs.journals.ekb.eg
Data security has come a long way since the inception of passwords and knowledge-based
authentication. Due to the constantly growing risk of the spoofing, changing data protection …

Актуальные направления развития методов и средств защиты информации

АА Шелупанов, ОО Евсютин, АА Конев… - … систем управления и …, 2017 - cyberleninka.ru
Представлены некоторые результаты работ, связанные с различными аспектами
фундаментальных, прикладных научных исследований и реализацией …

Unconstrained and contactless hand geometry biometrics

A de-Santos-Sierra, C Sánchez-Avila, GB Del Pozo… - Sensors, 2011 - mdpi.com
This paper presents a hand biometric system for contact-less, platform-free scenarios,
proposing innovative methods in feature extraction, template creation and template …

Implementation of artificial neural network: Back propagation method on face recognition system

R Mukhaiyar, R Safitri - 2019 16th International Conference on …, 2019 - ieeexplore.ieee.org
Face recognition is commonly applied to recognize an authorized personal in accessing
secured personal information. Each personal owns a specific trait/feature on their face. Many …

[PDF][PDF] Biometric authentication: A review

SR Kodituwakku - International Journal of Trend in Research and …, 2015 - academia.edu
Advances in the field of Information Technology make Information Security an inseparable
part of life. In order to deal with security, Authentication, access control and auditing play …

Biometric privacy through hand geometry-a survey

K Přihodová, M Hub - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Reliable authentication is a key factor in ensuring data security. Information systems
requiring a high level of data security do not use passwords that are considered to be too …