Results 21 to 30 of about 220,603 (181)

Chat biometrics

open access: yesIET Biometrics, 2018
On‐line social platforms implement moderation mechanisms to filter out unwanted content and to take action against possible cases of verbal aggression and abuse, sexual harassment, and such. In this study, the authors investigate chat biometrics, the identification of users from their verbal behaviour on a social platform.
Rıdvan Salih Kuzu, Albert Ali Salah
openaire   +3 more sources

A Review of Facial Biometrics Security for Smart Devices

open access: yesComputers, 2018
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted to implement different forms of biometrics, from finger, hand, and signature to voice, retina, and iris.
Mary Grace Galterio   +2 more
doaj   +1 more source

Encryption Technology based on Human Biometrics

open access: yes上海师范大学学报. 自然科学版, 2017
The research progress of encryption technologies based on human biometrics is reviewed in this paper.The technologies that utilize human biometrics to make information encryption and identity authentication,and the technologies which combine biometrics ...
Wei Yang   +3 more
doaj   +1 more source

An Investigation of Biometric Authentication in the Healthcare Environment

open access: yesArray, 2020
A vast amount of growth has taken place in the field of biometrics and in the healthcare industry. Biometrics provides the ability to identify individuals based on their physical and behavioral characteristics.
Janelle Mason   +5 more
doaj   +1 more source

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

Face presentation attack detection. A comprehensive evaluation of the generalisation problem

open access: yesIET Biometrics, 2021
Face recognition technology is now mature enough to reach commercial products, such as smart phones or tablets. However, it still needs to increase robustness against imposter attacks.
Artur Costa‐Pazo   +4 more
doaj   +1 more source

Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition With Privacy Protection

open access: yesIEEE Access, 2021
Computationally efficient, accurate, and privacy-preserving data storage and retrieval are among the key challenges faced by practical deployments of biometric identification systems worldwide.
Pawel Drozdowski   +4 more
doaj   +1 more source

In-ear EEG biometrics for feasible and readily collectable real-world person authentication

open access: yes, 2017
The use of EEG as a biometrics modality has been investigated for about a decade, however its feasibility in real-world applications is not yet conclusively established, mainly due to the issues with collectability and reproducibility.
Goverdovsky, Valentin   +2 more
core   +1 more source

Beyond biometrics

open access: yesProcedia Computer Science, 2010
AbstractThroughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including their advantages, disadvantages, and guidelines
openaire   +2 more sources

Ear Biometrics Based on Geometrical Feature Extraction

open access: yesELCVIA Electronic Letters on Computer Vision and Image Analysis, 2005
Biometrics identification methods proved to be very efficient, more natural and easy for users than traditional methods of human identification. In fact, only biometrics methods truly identify humans, not keys and cards they posses or passwords they ...
Michal Choras
doaj   +1 more source

Home - About - Disclaimer - Privacy