Results 31 to 40 of about 35,630 (203)
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
Soft Smart Biopatch for Continuous Authentication‐Enabled Cardiac Biometric Systems
Biometric locking systems offer a seamless integration of an individual's physiological characteristics with secure authentication. However, they suffer from limitations such as false positive and negative authentication, environmental interference, and ...
Sung Hoon Lee +9 more
doaj +1 more source
Biometric Authentication System
Abstract: Biometric authentication systems have gained significant interest due to their reliable and practical authentication options. These systems utilize physiological or behavioral traits, like fingerprints, face recognition, and speech patterns, to confirm a person's identity.
Ashish Basare +2 more
openaire +1 more source
Cancelable Multimodal Biometrics Based on Chaotic Maps
Biometric authentication systems raise certain concerns with regard to security, violation of privacy, and storage issues of biometric templates. This paper proposes a protection approach of biometric templates storage in a multimodal biometric system ...
Sanaa Ghouzali +3 more
doaj +1 more source
A New Biometric Template Protection using Random Orthonormal Projection and Fuzzy Commitment
Biometric template protection is one of most essential parts in putting a biometric-based authentication system into practice. There have been many researches proposing different solutions to secure biometric templates of users.
A Teoh +11 more
core +1 more source
The scientific study of privacy-preserving biometrics, represented by the palmprint, face, and iris, has grown tremendously. That being said, there has not been much attention paid to the proper preservation, transmission, and authentication of biometric
Ying Qin, Bob Zhang
doaj +1 more source
eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices [PDF]
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten ...
Jassim, Sabah A. +3 more
core +1 more source
Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud
Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological
Ferrett, Terry +3 more
core +1 more source
Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A current area
O. I. Bokova +4 more
doaj +1 more source
An Efficient Android-Based Multimodal Biometric Authentication System With Face and Voice
Multimodal biometric authentication method can conquer the defects of the unimodal biometric authentication technology. In this paper, we design and develop an efficient Android-based multimodal biometric authentication system with face and voice ...
Xinman Zhang +4 more
doaj +1 more source

