Results 21 to 30 of about 220,603 (181)
On‐line social platforms implement moderation mechanisms to filter out unwanted content and to take action against possible cases of verbal aggression and abuse, sexual harassment, and such. In this study, the authors investigate chat biometrics, the identification of users from their verbal behaviour on a social platform.
Rıdvan Salih Kuzu, Albert Ali Salah
openaire +3 more sources
A Review of Facial Biometrics Security for Smart Devices
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted to implement different forms of biometrics, from finger, hand, and signature to voice, retina, and iris.
Mary Grace Galterio +2 more
doaj +1 more source
Encryption Technology based on Human Biometrics
The research progress of encryption technologies based on human biometrics is reviewed in this paper.The technologies that utilize human biometrics to make information encryption and identity authentication,and the technologies which combine biometrics ...
Wei Yang +3 more
doaj +1 more source
An Investigation of Biometric Authentication in the Healthcare Environment
A vast amount of growth has taken place in the field of biometrics and in the healthcare industry. Biometrics provides the ability to identify individuals based on their physical and behavioral characteristics.
Janelle Mason +5 more
doaj +1 more source
Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario +2 more
core +2 more sources
Face presentation attack detection. A comprehensive evaluation of the generalisation problem
Face recognition technology is now mature enough to reach commercial products, such as smart phones or tablets. However, it still needs to increase robustness against imposter attacks.
Artur Costa‐Pazo +4 more
doaj +1 more source
Computationally efficient, accurate, and privacy-preserving data storage and retrieval are among the key challenges faced by practical deployments of biometric identification systems worldwide.
Pawel Drozdowski +4 more
doaj +1 more source
In-ear EEG biometrics for feasible and readily collectable real-world person authentication
The use of EEG as a biometrics modality has been investigated for about a decade, however its feasibility in real-world applications is not yet conclusively established, mainly due to the issues with collectability and reproducibility.
Goverdovsky, Valentin +2 more
core +1 more source
AbstractThroughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including their advantages, disadvantages, and guidelines
openaire +2 more sources
Ear Biometrics Based on Geometrical Feature Extraction
Biometrics identification methods proved to be very efficient, more natural and easy for users than traditional methods of human identification. In fact, only biometrics methods truly identify humans, not keys and cards they posses or passwords they ...
Michal Choras
doaj +1 more source

