A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems

A Sundararajan, AI Sarwat, A Pons - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for
user authentication and identification. However, prior to engaging in WBS research, how …

Deep learning in biometrics: a survey

AB López - ADCAIJ: Advances in Distributed Computing and …, 2019 - torrossa.com
Deep learning has been established in the last few years as the gold standard for data
processing, achieving peak performance in image, text and audio understanding. At the …

Signature texture features extraction using GLCM approach in android studio

HA Dwaich, HA Abdulbaqi - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Signature Features Extraction is a method for deriving informative values of image signature
for indexing and signature identification. It is a dimensionality reduction of image data to be …

Multi-fingerprint unimodel-based biometric authentication supporting cloud computing

P Rajeswari, S Viswanadha Raju, AS Ashour… - Intelligent techniques in …, 2017 - Springer
Cloud computing is one of the emerging technologies that transfers network users to the
next level. Security is one of the critical challenges faced by cloud computing. Biometrics …

[图书][B] Advances in biometrics for secure human authentication and recognition

P Gupta, DR Kisku, JK Sing - 2014 - api.taylorfrancis.com
The uniqueness of the physiological and behavioral characteristics of human beings is used
to facilitate the identification or verification process, and it always results in correct …

[PDF][PDF] Template and database security in Biometrics systems: A challenging task

M Kaur, S Sofat, D Saraswat - International Journal of Computer …, 2010 - Citeseer
Security is a very important aspect in the biometric system. There are number attacks and
there remedial solutions discussed in the literature on different modules of biometrics system …

Towards the security evaluation of biometric authentication systems

M El-Abed, R Giot, B Hemery… - … International Journal of …, 2012 - hal.science
Despite the obvious advantages of biometric authentication systems over traditional security
ones (based on tokens or passwords), they are vulnerable to attacks which may …

The Effect of Vulnerability in Facial Biometric Authentication

D Madan, SE Hosseini, S Pervez - 2023 16th International …, 2023 - ieeexplore.ieee.org
The increasing importance of face recognition systems today, with applications ranging from
access controls to secure systems and electronic devices, has raised concerns about their …

Defending against advanced attack vectors on biometric and authentication systems

A Sandirakumaran, A Kulkarni - AIP Conference Proceedings, 2022 - pubs.aip.org
Since the beginning of the digital era, organizations have begun to adopt or move towards
digitization. Most of their day-to-day operations are based on biometric and other …

Phishing–the threat of internet banking

L Krejčířová, J Dvořák - Scientific papers of the University of Pardubice …, 2013 - dk.upce.cz
The attractiveness of Internet banking, the dynamics and the integration with e-business is
still growing. The current use of electronic banking is defined by cyberspace and abused in …