Academic literature on the topic 'Biometric authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric authentication"

1

Jha, Abhishek, Ashish A, and Lalita Verma. "Biometric Authentication." YMER Digital 21, no. 05 (2022): 1041–49. http://dx.doi.org/10.37896/ymer21.05/b9.

Full text
Abstract:
Progresses in the field of Information Technology likewise make Information Security an indivisible piece of it. To manage security, Authentication assumes a significant part. This paper presents a survey on the biometric confirmation strategies and some future conceivable outcomes in this field. In biometrics, an individual should be distinguished in view of some trademark physiological boundaries. A wide assortment of frameworks requires solid individual acknowledgment plans to either affirm or decide the character of an individual mentioning their administrations. The motivation behind such
APA, Harvard, Vancouver, ISO, and other styles
2

Pagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.

Full text
Abstract:
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication). The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets com
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu, and Peiyuan Liu. "Review on EEG-Based Authentication Technology." Computational Intelligence and Neuroscience 2021 (December 24, 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.

Full text
Abstract:
With the rapid development of brain-computer interface technology, as a new biometric feature, EEG signal has been widely concerned in recent years. The safety of brain-computer interface and the long-term insecurity of biometric authentication have a new solution. This review analyzes the biometrics of EEG signals, and the latest research is involved in the authentication process. This review mainly introduced the method of EEG-based authentication and systematically introduced EEG-based biometric cryptosystems for authentication for the first time. In cryptography, the key is the core basis
APA, Harvard, Vancouver, ISO, and other styles
4

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digi
APA, Harvard, Vancouver, ISO, and other styles
5

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric
APA, Harvard, Vancouver, ISO, and other styles
6

Rohini, B.R., and G. Dr.Thippeswamy. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research - Granthaalayah 5, no. 4 RACSIT (2017): 47–52. https://doi.org/10.5281/zenodo.572294.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric
APA, Harvard, Vancouver, ISO, and other styles
7

Lakhera, Manmohan, and Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm." International Journal of Rough Sets and Data Analysis 5, no. 4 (2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.

Full text
Abstract:
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication system over a traditional one is that the person must physically be present at that place while recognizing him. So, it is essential to secure these biometrics by combining these with cryptography. In the proposed algorithm, the AES algorithm is used for securing the stored and transmitted biometric templat
APA, Harvard, Vancouver, ISO, and other styles
8

Rukhiran, Meennapa, Sorapak Pukdesree, and Paniti Netinant. "Biometric Cloud Services for Web-Based Examinations." International Journal of Information Technology and Web Engineering 17, no. 1 (2022): 1–25. http://dx.doi.org/10.4018/ijitwe.299022.

Full text
Abstract:
Biometric recognition may be used in conjunction with human authentication on a smartphone to improve accuracy, reliability, and simplicity, and to aid in fraud prevention and user authentication. While single biometric authentication addresses environmental degradation and sensor noise limitations, and the single point of failure scenario in biometric systems can result in more robust biometric systems, multimodal biometric authentication can improve the accuracy of identification and recognition. The purpose of this research is to propose a facial and speech authentication system that is clo
APA, Harvard, Vancouver, ISO, and other styles
9

Lateef Q.O, Lateef Q. O., and Akinyokun O. K. Akinyokun O.K. "Web-based Biometric Authentication System for Health tracking Application." International Journal of Advances in Engineering and Management 7, no. 1 (2025): 267–75. https://doi.org/10.35629/5252-0701267275.

Full text
Abstract:
As technology advances, passwordless authentication is becoming increasingly important for web applications, especially for secure and user-friendly login systems. Biometrics-based authentication offers a promising alternative to traditional password systems, providing greater security and convenience. However, its usability and effectiveness in real-world web applications, particularly in sectors requiring high security like health monitoring, require further investigation. While much of the current research has primarily focused on the security benefits of biometric systems, particularly on
APA, Harvard, Vancouver, ISO, and other styles
10

Rajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.

Full text
Abstract:
Biometrics refers to the automatic identification of a living person based on physiological or behavioural characteristics for authentication purpose. Among the existing biometric technologies are the face recognisation, fingerprint recognition, finger-geometry, hand geometry, iris recognition, vein recognition, voice recognition and signature recognition, Biometric method requires the physical presence of the person to be identified. This emphasizes its preference over the traditional method of identifying what you have such as, the use of password, a smartcard etc. Also, it potentially preve
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometric authentication"

1

Polon, Thomas. "Attestation-based remote biometric authentication." Connect to this title online, 2007. http://etd.lib.clemson.edu/documents/1181666383/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Breedt, Morné. "Integrating biometric authentication into multiple applications." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-08282007-135540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Salaiwarakul, Anongporn. "Verification of secure biometric authentication protocols." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1166/.

Full text
Abstract:
The thesis presents verification of biometric authentication protocols. ProVerif is used as the verification tool for verifying and analysing the protocols. The protocol are analysed in ProVerif model. Various attacks to the protocols are generated in order to verify whether the protocols hold their intended properties. We have selected three biometric authentication protocols and proposed a remote biometric authentication protocol for on-line banking. Each of which has different intended purposes and properties. The first protocol is generic authentication using biometric data. This protocol
APA, Harvard, Vancouver, ISO, and other styles
4

Aronsson, Erik. "Biometric Authentication and Penetration of Smartphones." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.

Full text
Abstract:
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognit
APA, Harvard, Vancouver, ISO, and other styles
5

Breedt, Morne. "Integrating biometric authentication into multiple applications." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/27605.

Full text
Abstract:
The Internet has grown from its modest academic beginnings into an important, global communication medium. It has become a significant, intrinsic part of our lives, how we distribute information and how we transact. It is used for a variety of purposes, including: banking; home shopping; commercial trade - using EDI (Electronic Data Interchange); and to gather information for market research and other activities. Owing to its academic origins, the early developers of the Internet did not focus on security. However, now that it has rapidly evolved into an extensively used, global commercial tra
APA, Harvard, Vancouver, ISO, and other styles
6

Bansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hitchcock, David C. "Evaluation and combination of biometric authentication systems." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Poon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.

Full text
Abstract:
The idea of merging biometrics technology with cryptography brought interesting possibilities in enhancing the security and privacy of biometrics systems. Conventional systems generally require large databases, which represent a security risk and raise privacy concerns. Biometric encryption is a method devised to hide biometric features along with a cryptographic key, which could remove the need for such biometric databases. The Fuzzy Vault scheme is one of the promising candidates for biometric encryption. This thesis analyzes the scheme and attempts to provide solutions to problems impeding
APA, Harvard, Vancouver, ISO, and other styles
9

Merati, A. "Multi-modal biometric authentication with cohort-based normalization." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Balisane, Hewa. "Human gait analysis for biometric identification and authentication." Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539385.

Full text
Abstract:
The study of biometrics is concerned with any human physiological or behavioural characteristic which is universal, unique and measurable. Biometric systems operate by acquiring biometric data from individuals, extracting feature sets from data and comparing this feature with the enrolment set in a database. The aIm of this research is to compare the performance of gait-based user recognition of children with adults. Existing analyses techniques in gait-based recognition using wearable sensors for adults are applied to gait analyses in children. This is the first known study to be conducted on
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometric authentication"

1

Tistarelli, Massimo, Josef Bigun, and Anil K. Jain, eds. Biometric Authentication. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47917-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cantoni, Virginio, Dimo Dimov, and Massimo Tistarelli, eds. Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, David, and Anil K. Jain, eds. Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maltoni, Davide, and Anil K. Jain, eds. Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b99174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith-Creasey, Max. Continuous Biometric Authentication Systems. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-49071-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Stan Z., Zhenan Sun, Tieniu Tan, Sharath Pankanti, Gérard Chollet, and David Zhang, eds. Advances in Biometric Person Authentication. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schuckers, Michael E. Computational Methods in Biometric Authentication. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-202-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Stan Z., Jianhuang Lai, Tieniu Tan, Guocan Feng, and Yunhong Wang, eds. Advances in Biometric Person Authentication. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b104239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vielhauer, Claus. Biometric User Authentication for it Security. Springer US, 2006. http://dx.doi.org/10.1007/0-387-28094-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

W, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometric authentication"

1

Samangooei, Sina, and Mark S. Nixon. "On Semantic Soft-Biometric Labels." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dimov, Dimo T., and Virginio Cantoni. "Appearance-Based 3D Object Approach to Human Ears Recognition." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cantoni, Virginio, Dimo T. Dimov, and Atanas Nikolov. "3D Ear Analysis by an EGI Representation." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tistarelli, Massimo, Enrico Grosso, and Didier Meuwly. "Biometrics in Forensic Science: Challenges, Lessons and New Technologies." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Manolova, Agata, Nikolay Neshov, Stanislav Panev, and Krasimir Tonchev. "Facial Expression Classification Using Supervised Descent Method Combined With PCA and SVM." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manolova, Agata, Stanislav Panev, and Krasimir Tonchev. "Human Gaze Tracking With An Active Multi-Camera System." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nestorov, Dobrin, and Detelina Georgieva. "Effect of Handwriting Changes on the Possibilities for Computerized Handwriting Examination." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Boyadzieva, Desislava, and Georgi Gluhchev. "Neural Network and kNN Classifiers for On-Line Signature Verification." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guan, Yu, Xingjie Wei, Chang-Tsun Li, and Yosi Keller. "People Identification and Tracking Through Fusion of Facial and Gait Features." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nugrahaningsih, Nahumi, and Marco Porta. "Pupil Size as a Biometric Trait." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric authentication"

1

Chaudhari, Archana Y., Jagannath Kulkarni, Ujjwala Dube, Atharva Ghorpade, Shivam Sakore, and Anil Kumar Gupta. "A Biometric Authentication System By Embedding Biometrics in QR Codes." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Argaw, Naomi, Diwas Pandey, and Scott Wallace. "Biometric Authentication via Electrocardiogram Traces." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vishnu Praba, B., R. Vinothini, M. Jayarathna, Kavitha Subramani, and P. Sravanthi. "Virtual AI Mouse With Biometric Authentication." In 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2024. http://dx.doi.org/10.1109/ickecs61492.2024.10617264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Özgür, Hafızullah, and Yunus Emre Selçuk. "Authentication in ATM/ITM Machines using Iris Recognition Biometrics." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131901.

Full text
Abstract:
Biometric identification is a method that encompasses many types of authentication systems, including iris features and characteristics. The behaviour of the tiny pixels in a person’s iris and pupil can be extracted and uniquely used for authentication in ATM/ITM machines. In this study, achieving higher accuracy and success is the goal. We have found out that the Daugman algorithm can enable the implementation of iris biometrics in a faster and more accurate way compared to other algorithms. This will allow ATM/ITM users can comfortably access their accounts and make transactions without the
APA, Harvard, Vancouver, ISO, and other styles
5

"Biometric authentication." In 2014 4th International Conference on Image Processing Theory, Tools and Applications (IPTA). IEEE, 2014. http://dx.doi.org/10.1109/ipta.2014.7001977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sarangaraja, A. P., D. Rajagopalan, A. Vignesh, and P. Mohamed Fathimal. "Secret Sharing Scheme with Fingerprint Authentication." In International Research Conference on IOT, Cloud and Data Science. Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-u6em0l.

Full text
Abstract:
Medical imaging is very important in medical diagnosis. X-rays, ultrasound images, CT scans, brain pictures, and patient mri images are examples of images that contain sensitive information. However, poor communication channels and loopholes in hospital and medical centre storage systems risk accessing these images by unauthorised individuals who utilise them for nefarious purposes other than diagnostics. Image encryption is a common strategy for enhancing the integrity of communication and storage channels for protecting medical images from unauthorized access. This task proposes a biometrics
APA, Harvard, Vancouver, ISO, and other styles
7

Talabi, A. A., O. B. Longe, A. A. Muhammad, and K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.

Full text
Abstract:
This increasing inter-connectivity of systems and dependence on computer and internet-based networks has made Cybersecurity related risks management issues major considerations in designing, developing and managing identity systems. Thus, this paper investigates Cybersecurity and related risk management challenges in Identity Management Systems by undertaking a comparative analysis of different biometric traits. The analysis proved that biometric-based multimodal systems are more secure than uni-modal systems with high accuracy rates. Also, it produced minimal false acceptance and false reject
APA, Harvard, Vancouver, ISO, and other styles
8

S, Pranathi, A. N. Mukunda Rao, Sandhya H. R, Inchara P. N, Kanakareddy B, and G. Karthik Devadiga. "Multimodal Biometric Authentication." In 2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES). IEEE, 2023. http://dx.doi.org/10.1109/icsses58299.2023.10199423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garg, Rishabh, Anisha Arora, Saurabh Singh, and Shipra Saraswat. "Biometric Authentication using Soft Biometric Traits." In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2018. http://dx.doi.org/10.1109/pdgc.2018.8745766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Soares, Laura R., Lucas Bastos, Bruno Martins, et al. "A Continuous Heart-Based Biometric Authentication for Healthcare Internet of Things." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.233062.

Full text
Abstract:
The rapid spread of connected objects in healthcare environments, i.e. Healthcare Internet of Things (HIoT), has motivated concerns on data privacy. Thus, security mechanisms are required to restrict access to such data. Biometrics, measurements, and calculations related to human characteristics can be collected from the target biosignal (e.g., electrocardiogram - ECG) and employed for authentication. This work investigates a continuous heart-based biometric authentication system for HIoT. We propose a system to provide authentication mechanisms mainly targeted at preserving users’ privacy and
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric authentication"

1

Klosterman, Andrew J., and Gregory R. Ganger. Secure Continuous Biometric-Enhanced Authentication. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada382238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, 2020. http://dx.doi.org/10.34074/ocds.086.

Full text
Abstract:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!