Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has …
KW Tse, K Hung - IET Biometrics, 2022 - Wiley Online Library
Diverse applications are used on mobile devices. Because of the increasing dependence on information systems, immense amounts of personal and sensitive data are stored on mobile …
Biometric security is the cornerstone of modern identity verification and authentication systems, where the integrity and reliability of biometric samples is of paramount importance …
D Apgar, MR Abid - 2021 IEEE 12th Annual Information …, 2021 - ieeexplore.ieee.org
Spoofing attacks represent a major threat to facial recognition systems. There are many types of attacks that can be carried out, ranging from 2D photo attacks to 3D mask attacks …
A Keresh, P Shamoi - arXiv preprint arXiv:2406.13860, 2024 - arxiv.org
Face recognition systems are increasingly used in biometric security for convenience and effectiveness. However, they remain vulnerable to spoofing attacks, where attackers use …
M Aydin, M Taskiran, N Kahraman… - … on Innovations in …, 2023 - ieeexplore.ieee.org
Face recognition systems, which are used for access control, security surveillance, and mobile payments, are popular in recent years among biometric systems with their ability to …
SR Chavan, SS Sherekar… - 2021 International …, 2021 - ieeexplore.ieee.org
Face recognition is one of the most successful application & has recently gain popularity with significant attention. Extensive research has been done in recognising the identity of the …
B Bhavana, N Raheja - 2022 Seventh International Conference …, 2022 - ieeexplore.ieee.org
The world is abundant with digital products in which selecting, searching and buying products for the users is harder. Recommendation system helps the users to overcome this …
A Kuznetsov, S Fedotov, M Bagmut - Digital Transformation: 13th PLAIS …, 2021 - Springer
Modern technologies of authentication and authorization of access play a significant role in ensuring the protection of information in various practical applications. We consider the most …