K Okereafor, I Ekong, IO Markson… - JMIR Biomedical …, 2020 - biomedeng.jmir.org
Biometric systems use scanners to verify the identity of human beings by measuring the patterns of their behavioral or physiological characteristics. Some biometric systems are …
SM Taylor, M De Leeuw - Ai & Society, 2021 - Springer
The design of collaborative robotics, such as driver-assisted operations, engineer a potential automation of decision-making predicated on unobtrusive data gathering of human users …
Biometrics are distinct physiological characteristics used to describe individuals. Compared to the traditional access control methods such as passwords and Person Identification …
D Apgar, MR Abid - 2021 IEEE 12th Annual Information …, 2021 - ieeexplore.ieee.org
Spoofing attacks represent a major threat to facial recognition systems. There are many types of attacks that can be carried out, ranging from 2D photo attacks to 3D mask attacks …
Background: Rhythm, brain, and body are closely linked. Humans can synchronize their movement to auditory rhythms in ways that can improve the regularity of movement while …
K Okereafor, R Djehaiche - International Journal of Simulation …, 2020 - researchgate.net
The challenges faced by organizations in effectively carrying out digital forensic operations have been identified to include poor capacity and defective Information and …
A Kuznetsov, S Fedotov, M Bagmut - Digital Transformation: 13th PLAIS …, 2021 - Springer
Modern technologies of authentication and authorization of access play a significant role in ensuring the protection of information in various practical applications. We consider the most …
KU Okereafor, OE Osuagwu, C Onime - IJSSST, 2018 - academia.edu
Despite their advantages over password-based and token-based authentication, Biometric Authentication Systems (BAS) are not perfect. They are particularly vulnerable to spoofing …
HW Noh, JY Sim, CG Ahn, Y Ku - Biosensors, 2021 - mdpi.com
Most biometric authentication technologies commercialized in various fields mainly rely on acquired images of structural information, such as fingerprints, irises, and faces. However …