Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack

Y Usoltsev, B Lodonova, A Shelupanov, A Konev… - Information, 2022 - mdpi.com
Machine learning algorithms based on neural networks are vulnerable to adversarial
attacks. The use of attacks against authentication systems greatly reduces the accuracy of …

Generation of an EDS Key Based on a Graphic Image of a Subject's Face Using the RC4 Algorithm

A Semenkov, D Bragin, Y Usoltsev, A Konev… - Information, 2021 - mdpi.com
Modern facial recognition algorithms make it possible to identify system users by their
appearance with a high level of accuracy. In such cases, an image of the user's face is …

Multimodal Deep Learning Based Score Level Fusion Using Face and Fingerprint

K Shinde, C Kayte - … Conference on Advances in Computer Vision …, 2023 - atlantis-press.com
In the previous decade, biometrics referred to the automatic recognition of persons based on
their physiological or behavioural traits but unimodal biometrics have their limitations. Due to …

Face, Finger Print and Iris Biological Characters Using Feature Level Fusion Based Multimodal Biometric Systems

M Shivakumar, CM Patil - Journal of Computational and …, 2018 - ingentaconnect.com
Biometric systems (BS) helps to reorganization of individual person based on the biological
traits like ears, veins, signatures, voices, typing styles, gaits, and etc. As, the Uni-modal BS …

[PDF][PDF] Generation of an EDS Key Based on a Graphic Image of a Subject's Face Using the RC4 Algorithm. Information 2021, 12, 19

A Semenkov, D Bragin, Y Usoltsev, A Konev… - 2021 - researchgate.net
Modern facial recognition algorithms make it possible to identify system users by their
appearance with a high level of accuracy. In such cases, an image of the user's face is …

[PDF][PDF] Multi-Modal Biometric: Bi-Directional Empirical Mode Decomposition with Hilbert-Hung Transformation

CM Patil, S Mahadevappa, P KumarS - International Journal of …, 2019 - academia.edu
Biometric systems (BS) helps in reorganization of individual person based on the biological
traits like ears, veins, signatures, voices, typing styles, gaits, etc. As, the Uni-modal BS does …

Two-phase authentication and encryption algorithm for mobile users

C Avram, R Miron, D Radu… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
From the multitude of problems regarding the security of distributed communication systems,
composed of mobile and fixed networks, the present work focuses on some modern …