We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 230 results
  1. An Effective Multimodal Biometric System Based on Textural Feature Descriptor

    Abstract

    In recent years the upsurge of contemporary technical assets results in the augmented prerequisite of precise and robust security systems....

    Neeru Bala, Rashmi Gupta, Anil Kumar in Pattern Recognition and Image Analysis
    Article 01 September 2022
  2. HDL-PI: hybrid DeepLearning technique for person identification using multimodal finger print, iris and face biometric features

    Due of its uniqueness, biometric technologies are employed for security and access control in today’s digital world. Global demand for biometric...

    Sharad B. Jadhav, N. K. Deshmukh, V. T. Humbe in Multimedia Tools and Applications
    Article 29 December 2022
  3. Multimodal biometric decision fusion security technique to evade immoral social networking sites for minors

    Online Social Networks (OSNs) are quickly becoming the most popular platform, with practically everyone using them on a daily basis. Recent...

    Shalini P, Shankaraiah in Applied Intelligence
    Article 12 May 2022
  4. Social behavioral biometric multimodal union to evade fake account creation in Facebook

    In the present world scenario, people spend most of their time browsing on Social Networking Site (SNS) such as Facebook, Twitter, WhatsApp etc.,...

    Shalini P, Shankaraiah in Multimedia Tools and Applications
    Article 02 May 2022
  5. An enhanced fuzzy vault to secure the fingerprint templates

    Fingerprint-based biometric systems have significant advantages over the conventional authentication systems, which are based on passwords and...

    Vivek Singh Baghel, Surya Prakash, Ity Agrawal in Multimedia Tools and Applications
    Article 13 August 2021
  6. A Multi-server Authentication Scheme Based on Fuzzy Extractor

    Biometrics have been widely used in various authentication occasions, especially in the Internet field. However, the security of biometrics has...
    Wang Cheng, Lin You, Gengran Hu in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  7. Protection of online images against theft using robust multimodal biometric watermarking and T-norms

    Online image theft is a severe concern faced by many photographers. It occurs when someone uses the photo they took accidentally or deliberately...

    **cy J. Fernandez, Nithyanandam P. in Multimedia Tools and Applications
    Article 07 November 2023
  8. FinCaT: a novel approach for fingerprint template protection using quadrant map** via non-invertible transformation

    The employment of various technologies for secured human authentication in the recent years has led to rapid expansion of biometric-based...

    Eain Ul Sehar, Arvind Selwal, Deepika Sharma in Multimedia Tools and Applications
    Article 13 February 2023
  9. A Diabetic Retinopathy Classification and Analysis Towards the Development of a Computer-Aided Medical Decision Support System

    Recent advances in digital image analysis have improved diagnostic procedures and given healthcare experts vital information. Previously,...

    Mohammad Aknan, Salmoli Chandra, ... Smaranika Mohapatra in SN Computer Science
    Article 12 October 2023
  10. Block - XOR based cancellable template protection scheme for multi-instance iris biometric system

    An iris recognition framework within the secured authentication infrastructure is an outstanding, reliable and broadly accepted biometric. It has...

    Shehla Rafiq, Arvind Selwal in Multimedia Tools and Applications
    Article 17 March 2022
  11. A novel biometric crypto system based on cryptographic key binding with user biometrics

    Cryptography plays a significant role in ensuring data security and confidentiality. The security provided by a crypto system mainly depends on the...

    Rajesh Asthana, Gurjit Singh Walia, Anjana Gupta in Multimedia Systems
    Article 11 March 2021
  12. Multi-modal biometric system using finger knuckle image and retina image with template security using PolyU and DRIVE database

    A wide variety of security applications like computers, laptops, mobile phones, ATM machines, physical access control to property etc. are using...

    Pratap Patil, Sudhir Jagtap in International Journal of Information Technology
    Article 21 July 2020
  13. Anisotropic differential concavity codes for palmprint representation

    The straight excitatory filters such as Gabor filters and Modified finite Radon transform can not include the vital and inherent curvature...

    Pawan Dubey, Tirupathiraju Kanumuri, ... Prashant Kumar Jain in Multimedia Tools and Applications
    Article 12 September 2023
  14. A survey on data-driven iris spoof detectors: state-of-the-art, open issues and future perspectives

    In the modern era of computing, the iris-based biometric systems are gaining significant attention for secured and automatic human authentication....

    Palak Verma, Arvind Selwal, Deepika Sharma in Multimedia Tools and Applications
    Article 10 October 2022
  15. One factor cancellable fingerprint scheme based on novel minimum hash signature and secure extended feature vector

    To solve the problems of privacy preserving and biometric template protection, the one-factor fingerprint biometric authentication scheme based on...

    Hengjian Li, **yu Wang in Multimedia Tools and Applications
    Article 23 February 2022
  16. Cancelable fingerprint template protection based on random quantization and improved bloom filter

    Improving privacy and security in biometric systems requires addressing vulnerabilities in existing cancelable fingerprint templates based on bloom...

    Md Sabuj Khan, Hengjian Li, ... Chuan Zhao in Multimedia Tools and Applications
    Article 04 July 2024
  17. Biometric cryptosystems: a comprehensive survey

    Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and cryptosystem, where biometric provides authentication and...

    Prabhjot Kaur, Nitin Kumar, Maheep Singh in Multimedia Tools and Applications
    Article 30 September 2022
  18. Efficient palmprint biometric identification systems using deep learning and feature selection methods

    Over the past two decades, several studies have paid great attention to biometric palmprint recognition. Recently, most methods in literature adopted...

    Selma Trabelsi, Djamel Samai, ... Abdelmalik Taleb-Ahmed in Neural Computing and Applications
    Article Open access 14 March 2022
  19. Security system based on hand geometry and palmprint for user authentication in E-correction system

    This paper develops a secure multimodal fusion system to authenticate the users of E-correction systems in educational institutions. The system is...

    Hosnia. M. M. Ahmed, D. L. Elsheweikh, S. A. Shaban in International Journal of Information Technology
    Article 13 September 2023
  20. Cancellable biometrics based on the index-of-maximum hashing with random sparse binary encoding

    The wide deployment of biometrics has prompted enormous security and privacy concerns regarding biometric template protection. Cancellable biometrics...

    Jihyeon Kim, Jaewoo Park, ... Andrew Beng ** Teoh in Multimedia Tools and Applications
    Article 02 January 2024
Did you find what you were looking for? Share feedback.