Results 21 to 30 of about 35,630 (203)

SEMBA: secure multi‐biometric authentication [PDF]

open access: yesIET Biometrics, 2019
Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non‐authorised distribution, reuse and so on. A widely investigated solution to such threats consists of processing the biometric signals under encryption, in order to avoid any leakage of information towards non ...
Barni M.   +3 more
openaire   +5 more sources

Conceivable security risks and authentication techniques for smart devices [PDF]

open access: yes, 2016
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue.
A. Arif   +56 more
core   +2 more sources

Soft Biometrics Authentication

open access: yesJournal of Information Technology Research, 2022
This manuscript presents the design of a new approach of human skin color authentication. Skin color is one of the most popular soft biometric modalities. Since a soft biometric modality alone cannot reliably authenticate an individual, this new system is designed to combine skin color results with other pure biometric modalities to increase ...
Abdou-Aziz Sobabe   +3 more
openaire   +1 more source

Privacy-Preserving Facial Recognition Using Biometric-Capsules [PDF]

open access: yes, 2020
Indiana University-Purdue University Indianapolis (IUPUI)In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based recognition ...
Phillips, Tyler S.
core   +1 more source

Mobiles and wearables: owner biometrics and authentication [PDF]

open access: yes, 2016
We discuss the design and development of HCI models for authentication based on gait and gesture that can be supported by mobile and wearable equipment.
BOTTONI, Paolo Gaspare   +3 more
core   +1 more source

A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks

open access: yesSensors, 2022
The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes.
Aseel Bedari, Song Wang, Wencheng Yang
doaj   +1 more source

PALM VEIN PATTERN BIOMETRIC AUTHENTICATION TECHNOLOGY

open access: yesВестник СибАДИ, 2017
The article considered biometric authentication system based on palm vein pattern recognition technology. The market of biometric systems, the problem of biometric authentication, and the principle of action steps in the process of user authentication ...
S. O. Baranov, D. B. Abramov
doaj   +1 more source

A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol

open access: yesIEEE Open Journal of the Computer Society, 2022
Biometric authentication is, over time, becoming an indispensable complementary component to traditional authentication methods that use passwords and tokens.
Quang Nhat Tran   +3 more
doaj   +1 more source

Pseudo Identities Based on Fingerprint Characteristics [PDF]

open access: yes, 2008
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton   +19 more
core   +3 more sources

TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS

open access: yesInformation and Telecommunication Sciences, 2023
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy