Results 61 to 70 of about 2,062 (252)
Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection [PDF]
This is an electronic version of the paper presented at the Spanish Workshop on Biometrics 2007, SWB-07 held in Girona (Spain)A review of the state-of-the-art in direct and indirect attacks to fingerprint and iris automatic recognition security systems ...
Fiérrez, Julián +2 more
core
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls.
AA Ahmed +7 more
core +1 more source
This study presents a versatile approach to harnessing miscible aqueous domains, enabling liquid‐in‐liquid compartmentalization using a barrier formed in situ rather than bulk immiscibility. The barrier forms upon the complexation of multifunctional nanoparticles and ligands at the contact boundary of aqueous phases.
Seyyed Alireza Hashemi +7 more
wiley +1 more source
CNN Patch--Based Voting for Fingerprint Liveness Detection
Biometric identification systems based on fingerprints are vulnerable to attacks that use fake replicas of real fingerprints. One possible countermeasure to this issue consists in developing software modules capable of telling the liveness of an input image and, thus, of discarding fakes prior to the recognition step.
TOOSI, AMIRHOSEIN +2 more
openaire +3 more sources
Biometrics in ABC: counter-spoofing research [PDF]
Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC.
Chen, Lulu, Ferryman, James, Wei, Hong
core
Filter Design and Performance Evaluation for Fingerprint Image Segmentation
Fingerprint recognition plays an important role in many commercial applications and is used by millions of people every day, e.g. for unlocking mobile phones.
Gottschlich, Carsten +2 more
core +2 more sources
xxxx. ABSTRACT Glioblastoma (GBM) remains one of the most lethal brain cancers, with median survival rarely exceeding 15 months after diagnosis. Interleukin‐12 (IL‐12) is a potent immunostimulatory cytokine capable of reshaping the tumor microenvironment (TME), yet its clinical translation is hindered by systemic toxicity and short half‐life. RNA‐based
Fatima Hameedat +11 more
wiley +1 more source
Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley +1 more source
Lightweight CNN with wavelet-attention for fingerprint liveness detection
Fingerprint authentication has been extensively employed as a biometric method in diverse applications, including smartphones and embedded systems. Despite its advantages, this technology is susceptible to spoofing attacks using materials such as gelatin,
I Gede Teguh Satya Dharma +1 more
doaj +1 more source
Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform
Biometric systems have been actively emerging in various industries in the past few years and continue to provide higher-security features for access control systems. Many types of unimodal biometric systems have been developed.
Yang Xin +7 more
doaj +1 more source

