Smart logistics based on the internet of things technology: an overview

Y Ding, M Jin, S Li, D Feng - International Journal of Logistics …, 2021 - Taylor & Francis
Smart logistics is an effective way to meet the challenges of fast-changing customer
expectations, take opportunities brought by new technologies, and facilitate new business …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Gait lateral network: Learning discriminative and compact representations for gait recognition

S Hou, C Cao, X Liu, Y Huang - European conference on computer vision, 2020 - Springer
Gait recognition aims at identifying different people by the walking patterns, which can be
conducted at a long distance without the cooperation of subjects. A key challenge for gait …

Demographic bias in biometrics: A survey on an emerging challenge

P Drozdowski, C Rathgeb, A Dantcheva… - … on Technology and …, 2020 - ieeexplore.ieee.org
Systems incorporating biometric technologies have become ubiquitous in personal,
commercial, and governmental identity management applications. Both cooperative (eg …

50 years of biometric research: Accomplishments, challenges, and opportunities

AK Jain, K Nandakumar, A Ross - Pattern recognition letters, 2016 - Elsevier
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …

A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Feature extraction methods for palmprint recognition: A survey and evaluation

L Fei, G Lu, W Jia, S Teng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Palmprint processes a number of unique features for reliable personal recognition.
However, different types of palmprint images contain different dominant features. Instead …