With the rapid growth of wearable computing and increasing demand for mobile authentication scenarios, voiceprint-based authentication has become one of the prevalent …
Y Xie, F Li, Y Wu, H Chen, Z Zhao… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
With the rapid development of mobile devices and the fast increase of sensitive data, secure and convenient mobile authentication technologies are desired. Except for traditional …
Y Xie, F Li, Y Wu, Y Wang - IEEE Transactions on Dependable …, 2023 - ieeexplore.ieee.org
With the rapid development of mobile devices and the fast increase of sensitive data, secure and convenient mobile authentication technologies are desired. Except for traditional …
R Zhang, Z Yan, X Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Voiceprint Authentication as a Service (VAaS) offers great convenience due to ubiquity, generality, and usability. Despite its attractiveness, it suffers from user voiceprint leakage …
Biometric radiographs have gained importance in recent times owing to the rise in crime and disaster incidents. In recent times, authentication and identification of a person has become …
Recently, a new set of biometric traits, called medical biometrics, have been explored for human identity verification. This study introduces a novel framework for recognizing human …
F Kao - US Patent 10,032,011, 2018 - Google Patents
Aspects of the subject disclosure may include, for example, generating a digital certificate responsive to an authentication of a user according to a dynamic biometric process …
B Yan, R Zhang, Z Yan - … on Trust, Security and Privacy in …, 2022 - ieeexplore.ieee.org
Voiceprint authentication is a promising approach for user authentication due to its low acquisition cost and non-contact characteristics. However, most of existing voiceprint …
T Konishi, M Choi, B Shizuki - … of the International Conference on Mobile …, 2024 - dl.acm.org
This paper presents a system that authenticates users solely based on the action of grasping a door handle. The system authenticates users by utilizing the differences in frequency …