Security and accuracy of fingerprint-based biometrics: A review

W Yang, S Wang, J Hu, G Zheng, C Valli - Symmetry, 2019 - mdpi.com
Biometric systems are increasingly replacing traditional password-and token-based
authentication systems. Security and recognition accuracy are the two most important …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Topographic design in wearable MXene sensors with in-sensor machine learning for full-body avatar reconstruction

H Yang, J Li, X Xiao, J Wang, Y Li, K Li, Z Li… - Nature …, 2022 - nature.com
Wearable strain sensors that detect joint/muscle strain changes become prevalent at human–
machine interfaces for full-body motion monitoring. However, most wearable devices cannot …

Security and privacy for the internet of medical things enabled healthcare systems: A survey

Y Sun, FPW Lo, B Lo - IEEE Access, 2019 - ieeexplore.ieee.org
With the increasing demands on quality healthcare and the raising cost of care, pervasive
healthcare is considered as a technological solutions to address the global health issues. In …

[HTML][HTML] Privacy concerns in smart cities

L Van Zoonen - Government Information Quarterly, 2016 - Elsevier
In this paper a framework is constructed to hypothesize if and how smart city technologies
and urban big data produce privacy concerns among the people in these cities (as …

Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification

M Todisco, H Delgado, N Evans - Computer Speech & Language, 2017 - Elsevier
Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have
stimulated a great deal of progress to develop spoofing countermeasures for automatic …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion

F Wang, P De Filippi - Frontiers in Blockchain, 2020 - frontiersin.org
After introducing key concepts and definitions in the field of digital identity, this paper will
investigate the benefits and drawbacks of existing identity systems on the road toward …

Evolution, current challenges, and future possibilities in ECG biometrics

JR Pinto, JS Cardoso, A Lourenço - Ieee Access, 2018 - ieeexplore.ieee.org
Face and fingerprint are, currently, the most thoroughly explored biometric traits, promising
reliable recognition in diverse applications. Commercial products using these traits for …