We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,008 results
  1. Improved biometric authentication using surf based variational Bayesian extreme learning machine

    Over the last decade, biometric authentication systems have significantly progressed and in the upcoming years, their domain specific application is...

    Prerna Aggarwal, Niyati Baliyan, Saumya Bansal in International Journal of Information Technology
    Article 18 April 2024
  2. Ensemble recognition model with optimal training for multimodal biometric authentication

    Biometric security methods deploy any type of biometric recognition for safety purposes. Different from unimodal biometric system that uses single...

    K. Pavan Kumar, P. E. S. N. Krishna Prasad, ... M. Jogendra Kumar in Multimedia Tools and Applications
    Article 08 March 2024
  3. A cancelable biometric authentication scheme based on geometric transformation

    In digital identification technologies, fingerprint-based biometric systems are extensively utilized for authentication. Fingerprint authentication...

    Vivek H. Champaneria, Sankita J. Patel, Mukesh A. Zaveri in Multimedia Tools and Applications
    Article 20 June 2024
  4. Continuous Biometric Authentication Systems An Overview

    This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from...
    Max Smith-Creasey in SpringerBriefs in Computer Science
    Book 2024
  5. Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix

    Due to the rapid growth in the field of information transmission techniques, billions of data are transmitted through variant authentication...

    Fatma A. Hossam Eldein Mohamed, Walid El-Shafai in Multimedia Tools and Applications
    Article 06 January 2024
  6. Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic map**

    The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric...

    Walid El-Shafai, A. El-Mesady, F. M. Kamal in Multimedia Tools and Applications
    Article 02 July 2024
  7. Deep learning-powered multimodal biometric authentication: integrating dynamic signatures and facial data for enhanced online security

    The significant increase in online activities in the wake of recent global events has underlined the importance of biometric person authentication on...

    Serkan Salturk, Nihan Kahraman in Neural Computing and Applications
    Article Open access 15 April 2024
  8. Robust Rabin Cryptosystem Biometric Privacy Preserving Authentication Technique for IoT Enabled Devices Over Cloud

    With the advent of growing technologies and digitalization, smart factories and healthcare systems in the cloud are more focused towards task-driven...

    Devishree Naidu, Niranjan K. Ray in SN Computer Science
    Article 28 May 2024
  9. Authentication-based multimodal biometric system using exponential water wave optimization algorithm

    The biometric system relies on a single biometric identifier which could not meet the desired performance required for personal identification....

    Vensila C, A. Boyed Wesley in Multimedia Tools and Applications
    Article 15 February 2023
  10. Performance Evaluation of Biometric Authentication Using Fragment Jaya Optimizer-Based Deep CNN with Multi-kernel SVM

    The earlier research clearly indicated that the bimodal authentication system has more efficiency than unimodal and multimodal. This is due to the...

    N. Umasankari, B. Muthukumar, C. Shanmuganathan in SN Computer Science
    Article 27 March 2024
  11. BAMCloud: a cloud based Mobile biometric authentication framework

    There has been an exponential increase in the number of users switching to mobile banking. Therefore, various countries are adopting biometric...

    Kashish Ara Shakil, Farhana Javed Zareen, ... Suraiya Jabin in Multimedia Tools and Applications
    Article 26 July 2022
  12. Secure deep multimodal biometric authentication using online signature and face features fusion

    In Indian banking systems, signatures and faces are the two traits of biometrics that are used for personal identification. The automation of this...

    Manas Singhal, Kshitij Shinghal in Multimedia Tools and Applications
    Article 07 September 2023
  13. A novel technique for fingerprint template security in biometric authentication systems

    The deployment of biometrics spans over almost every application that incorporates user authentication. Fingerprint biometrics in particular is by...

    Afeeza Ali, Vivek Singh Baghel, Surya Prakash in The Visual Computer
    Article 08 December 2022
  14. Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems

    We study the problem of biometric-based authentication with template privacy. Typical schemes addressing this problem, such as Fuzzy Vaults (...
    Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian in Computer Security – ESORICS 2023
    Conference paper 2024
  15. A Novel Biometric Authentication Based on Blockchain and Watermarking

    After analysing the security threats and solution of existing authentication systems, this paper proposes a biometric authentication based on...
    Conference paper 2024
  16. Implementation of quaternion mathematics for biometric security

    Cancellable biometrics is an important trend in biometric security systems, allowing for intentional distortions or variations in the original...

    Fatma Khallaf, Walid El-Shafai, ... Fathi E. Abd El-Samie in Multimedia Tools and Applications
    Article 12 February 2024
  17. A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system

    Telemedicine Information System (TMIS) is a platform for data communication and exchange between patients and medical servers via the Internet....

    **ao-Ying Zhai, Jian Wang in Multimedia Tools and Applications
    Article 06 May 2022
  18. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

    Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it...
    Lin Li, Chao Chen, ... Yang **ang in Computer Security – ESORICS 2023
    Conference paper 2024
  19. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric

    The study of chaotic constructions and their associated cryptographic frameworks has sparked a lot of research interest in recent years. Latest...

    Chandrashekhar Meshram, Rabha W. Ibrahim, ... Sharad Kumar Barve in The Journal of Supercomputing
    Article 12 March 2022
Did you find what you were looking for? Share feedback.