Results 1 to 10 of about 330,040 (283)

Biometrics for Internet-of-Things Security: A Review

open access: yesSensors, 2021
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment.
Wencheng Yang   +2 more
exaly   +4 more sources

Biometrics [PDF]

open access: greenInternational Journal of Orthodontia and Oral Surgery (1919), 1919
n ...
Robert H. Lowie
openalex   +4 more sources

Beyond Biometrics [PDF]

open access: yesProcedia Computer Science, 2010
Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images.
Ailon   +22 more
core   +5 more sources

Smartphone and Smartwatch-Based Biometrics Using Activities of Daily Living

open access: yesIEEE Access, 2019
Smartphones and smartwatches, which include powerful sensors, provide a readily available platform for implementing and deploying mobile motion-based behavioral biometrics.
Gary M Weiss, Thaier Hayajneh
exaly   +2 more sources

Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2018
The role of soft biometrics to enhance person recognition systems in unconstrained scenarios has not been extensively studied. Here, we explore the utility of the following modalities: gender, ethnicity, age, glasses, beard, and moustache.
Fernando Alonso-fernandez   +2 more
exaly   +2 more sources

A survey on biometric cryptosystems and cancelable biometrics [PDF]

open access: yesEurasip Journal on Information Security, 2011
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics.
Christian Rathgeb
exaly   +3 more sources

Ear Biometrics Based on Geometrical Feature Extraction

open access: yesElectronic Letters on Computer Vision and Image Analysis, 2005
Biometrics identification methods proved to be very efficient, more natural and easy for users than traditional methods of human identification. In fact, only biometrics methods truly identify humans, not keys and cards they posses or passwords they ...
Michal Choras
exaly   +3 more sources

Authentication of Smartphone Users Using Behavioral Biometrics [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2016
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in particular, have become more than personal assistants. These devices have provided new avenues for consumers to play, work, and socialize whenever and wherever they want ...
Abdulaziz Alzubaidi, Jugal Kalita
exaly   +2 more sources

The ear as a biometric

open access: yes, 2007
It is more than 10 years since the first tentative experiments in ear biometrics were conducted and it has now reached the “adolescence” of its development towards a mature biometric.
Arbab-Zavar, B.   +2 more
core   +7 more sources

A Review of Facial Biometrics Security for Smart Devices

open access: yesComputers, 2018
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted to implement different forms of biometrics, from finger, hand, and signature to voice, retina, and iris.
Mary Grace Galterio   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy