Results 11 to 20 of about 35,630 (203)

A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification

open access: yesIEEE Access, 2019
In order to overcome the difficulty of password management and improve the usability of authentication systems, biometric authentication has been widely studied and has attracted special attention in both academia and industry.
Zhang Rui, Zheng Yan
doaj   +3 more sources

Multimodal Biometric Authentication Systems Using Convolution Neural Network Based on Different Level Fusion of ECG and Fingerprint

open access: yesIEEE Access, 2019
A multimodal biometric system integrates information from more than one biometric modality to improve the performance of each individual biometric system and make the system robust to spoof attacks. In this paper, we propose a secure multimodal biometric
Mohamed Hammad, Yashu Liu, Kuanquan Wang
doaj   +3 more sources

Keystroke Dynamics based Hybrid Nanogenerators for Biometric Authentication and Identification using Artificial Intelligence. [PDF]

open access: yesAdv Sci (Weinh), 2021
Maharjan P   +9 more
europepmc   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

NOISE RESISTANCE OF REMOTE AUTHENTICATION VIA LTE NETWORK

open access: yesInformation and Telecommunication Sciences, 2020
Background. LTE networks support a wide range of applications and services. These networks provide high-quality mobile services and have increased transmission rates and often used for remote biometric authentication, but the influence of noise and ...
Andrii Astrakhantsev   +2 more
doaj   +1 more source

RFID Authentication System Based on User Biometric Information

open access: yesApplied Sciences, 2022
Traditional authentication technologies usually perform identity authentication based on user information verification (e.g., entering the password) or biometric information (e.g., fingerprints). However, there are security risks when applying only these
Yuanmu Huang   +5 more
doaj   +1 more source

Hand-Based Biometric System Using Convolutional Neural Networks

open access: yesActa Informatica Pragensia, 2020
Today, data security is an increasingly hot topic, and thus also the security and reliability of end-user identity verification, i.e. authentication. In recent years, banks began to substitute password authentication by more secure ways of authentication
Katerina Prihodova, Miloslav Hub
doaj   +1 more source

The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction

open access: yesICT Express, 2023
Biometric authentication systems may suffer from decreasing recognition performance due to varying environmental conditions and sample ageing, which cause intra-class variability.
Riseul Ryu   +3 more
doaj   +1 more source

Object Selection as a Biometric

open access: yesEntropy, 2022
The use of eye movement as a biometric is a new biometric technology that is now in competition with many other technologies such as the fingerprint, face recognition, ear recognition and many others.
Joyce Tlhoolebe, Bin Dai
doaj   +1 more source

Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics [PDF]

open access: yes, 2006
The issue of reliable authentication is of increasing importance in modern society. Corporations, businesses and individuals often wish to restrict access to logical or physical resources to those with relevant privileges.
Maple, Carsten, Schetinin, Vitaly
core   +2 more sources

Home - About - Disclaimer - Privacy