To see the other types of publications on this topic, follow the link: Biometric verification.

Journal articles on the topic 'Biometric verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometric verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Srivastava, Prateek, and Rohit Srivastava. "A Multimodal Based Approach for Face and Unique Mark Based Combination for Confirmation of Human." International Journal of Business Analytics 6, no. 3 (2019): 16–28. http://dx.doi.org/10.4018/ijban.2019070102.

Full text
Abstract:
Biometric processes are utilized for recognition and distinguishing a person for different applications. The procedure is made possible by utilizing single biometric highlight or a mix of biometric highlights. In the event that the distinguishing proof is finished by utilizing a solitary biometric highlight (confront, iris, finger, palm, and so forth) then the framework is called unimodal, and if a combnation of biometrics are utilized then it is called multimodal. In a multimodal framework compared to the different downsides of a unimodal framework (noisy data, multiple vectors and so forth)
APA, Harvard, Vancouver, ISO, and other styles
2

Mudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.

Full text
Abstract:
In recent years large number of emerging automated applications faces the need to have recognition abilities of persons using their own self biometrics, before they can access the applications services. Nowadays, Biometric recognition is used, it can be used as automatic identification or automatic verification of persons based on their physiological or behavioral characteristics. There are no perfect biometric measurements;each biometry has its advantages and limitations. Each biometry requires specific vital identity to answer the identification or verification question. The suitability of a
APA, Harvard, Vancouver, ISO, and other styles
3

Jadhav, Angarika, and Prof N. M. Shahane. "Privacy Preserving Biometric Verification." International Journal of Engineering Research 3, no. 1 (2014): 6–8. http://dx.doi.org/10.17950/ijer/v3s1/102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ramana N., Venkata, S. Anu H. Nair, and K. P. Sanal Kumar. "Modified Firefly Optimization with Deep Learning based Multimodal Biometric Verification Model." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (2022): 99–107. http://dx.doi.org/10.17762/ijritcc.v10i1s.5798.

Full text
Abstract:
Biometric security has become a main concern in the data security field. Over the years, initiatives in the biometrics field had an increasing growth rate. The multimodal biometric method with greater recognition and precision rate for smart cities remains to be a challenge. By comparison, made with the single biometric recognition, we considered the multimodal biometric recognition related to finger vein and fingerprint since it has high security, accurate recognition, and convenient sample collection. This article presents a Modified Firefly Optimization with Deep Learning based Multimodal B
APA, Harvard, Vancouver, ISO, and other styles
5

Medjahed, Chahreddine, Abdellatif Rahmoun, Christophe Charrier, and Freha Mezzoudj. "A deep learning-based multimodal biometric system using score fusion." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65. http://dx.doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work propos
APA, Harvard, Vancouver, ISO, and other styles
6

Chahreddine, Medjahed, Rahmoun Abdellatif, Charrier Christophe, and Mezzoudj Freha. "A deep learning-based multimodal biometric system using score fusion." International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65–80. https://doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work propos
APA, Harvard, Vancouver, ISO, and other styles
7

Joseph, Annie Anak, Alex Ng Ho Lian, Kuryati Kipli, et al. "Person Verification Based on Multimodal Biometric Recognition." Pertanika Journal of Science and Technology 30, no. 1 (2021): 161–83. http://dx.doi.org/10.47836/pjst.30.1.09.

Full text
Abstract:
Nowadays, person recognition has received significant attention due to broad applications in the security system. However, most person recognition systems are implemented based on unimodal biometrics such as face recognition or voice recognition. Biometric systems that adopted unimodal have limitations, mainly when the data contains outliers and corrupted datasets. Multimodal biometric systems grab researchers’ consideration due to their superiority, such as better security than the unimodal biometric system and outstanding recognition efficiency. Therefore, the multimodal biometric system bas
APA, Harvard, Vancouver, ISO, and other styles
8

Juluri, Samatha, and Madhavi G. "SecureSense: Enhancing Person Verification through Multimodal Biometrics for Robust Authentication." Scalable Computing: Practice and Experience 25, no. 2 (2024): 1040–54. http://dx.doi.org/10.12694/scpe.v25i2.2524.

Full text
Abstract:
Biometrics provide enhanced security and convenience compared to conventional methods of individual authentication. A more robust and effective method of individual authentication has emerged due to recent advancements in multimodal biometrics. Unimodal systems offer lower security and lack the robustness found in multimodal biometric systems. The research paper introduces a novel approach, employing multiple biometric modalities, including face, fingerprint, and iris, to authenticate users in a multimodal biometric system. The paper proposes the ”Secure Sense” framework, which combines multip
APA, Harvard, Vancouver, ISO, and other styles
9

Tiwari, Shrikant, and Sanjay Kumar Singh. "Newborn Verification Using Headprint." Journal of Information Technology Research 5, no. 2 (2012): 15–30. http://dx.doi.org/10.4018/jitr.2012040102.

Full text
Abstract:
Missing, swapping, mixing, and illegal adoption of newborns is a worldwide challenge and research done to resolve this issue is minimal and least reported in the literature. Most of the biometric systems developed are for adults and very few of them address the issue of newborn identification. The headprint of a newborn is an important source of data for passive recognition, as they are non cooperative users of biometrics. The objective of this paper is to demonstrate the concept of using headprint recognition for verification of newborns. The main contributions of the research are: (1) The pr
APA, Harvard, Vancouver, ISO, and other styles
10

Jabin, Suraiya, and Farhana Javed Zareen. "Biometric signature verification." International Journal of Biometrics 7, no. 2 (2015): 97. http://dx.doi.org/10.1504/ijbm.2015.070924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rajvanshi, Saumya, Shiv Chauhan, and Savneet Kaur. "A New Wave in Biometric System: Systematic Study." CGC International Journal of Contemporary Technology and Research 4, no. 2 (2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice rec
APA, Harvard, Vancouver, ISO, and other styles
12

Marwa, A. Elshahed. "Personal identity verification based ECG biometric using non-fiducial features." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3007–13. https://doi.org/10.11591/ijece.v10i3.pp3007-3013.

Full text
Abstract:
Biometrics was used as an automated and fast acceptable technology for human identification and it may be behavioral or physiological traits. Any biometric system based on identification or verification modes for human identity. The electrocardiogram (ECG) is considered as one of the physiological biometrics which impossible to mimic or stole. ECG feature extraction methods were performed using fiducial or non-fiducial approaches. This research presents an authentication ECG biometric system using non-fiducial features obtained by Discrete Wavelet Decomposition and the Euclidean Distance techn
APA, Harvard, Vancouver, ISO, and other styles
13

Mushtaque, Ahmed. "BIOMETRICS SYSTEM ACKNOWLEDGEMNT BASED ON DATA FUSION." International Journal of Research – Granthaalayah 4, no. 3 (2017): 85–91. https://doi.org/10.5281/zenodo.847003.

Full text
Abstract:
In these days lot of systems have need an efficient and reliable biometrics recognition system. By considering the importance of biometric systems in global world, in this paper we are discussing the importance of a new era of verification. Applications of Biometric systems in accordance to Data fusion and what is the future of biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
14

N, Nithiya. "Automatic License Checking Using Fingerprint." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3440–42. https://doi.org/10.22214/ijraset.2025.68994.

Full text
Abstract:
Driving license verification framework is a serious issue in many countries. therefore, the biometric based driving license verification framework is employed because it's exceedingly simple and beneficial to screen. Biometrics suggests approximation regarding mortal traits. Biometrics proof (or reasonable countersign) is utilized in programming as a type of ID and access control. It's also used to perceive individuals in groups that are in perception. Biometric identifiers are also visible, quantifiable characteristics used to marker and characterize individuals. Biometric identifiers are con
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors 23, no. 7 (2023): 3566. http://dx.doi.org/10.3390/s23073566.

Full text
Abstract:
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced
APA, Harvard, Vancouver, ISO, and other styles
16

Gupta, Ms Neha. "A New Wave in Biometric System: Systematic Study incorporated with Artificial Intelligence." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33563.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometric like face recognition, finger print recognition, ir is recognition and behavioral biometrics like signature recognition and voice re
APA, Harvard, Vancouver, ISO, and other styles
17

Elshahed, Marwa A. "Personal identity verification based ECG biometric using non-fiducial features." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3007. http://dx.doi.org/10.11591/ijece.v10i3.pp3007-3013.

Full text
Abstract:
Biometrics was used as an automated and fast acceptable technology for human identification and it may be behavioral or physiological traits. Any biometric system based on identification or verification modes for human identity. The electrocardiogram (ECG) is considered as one of the physiological biometrics which impossible to mimic or stole. ECG feature extraction methods were performed using fiducial or non-fiducial approaches. This research presents an authentication ECG biometric system using non-fiducial features obtained by Discrete Wavelet Decomposition and the Euclidean Distance techn
APA, Harvard, Vancouver, ISO, and other styles
18

Yu, Likun. "Risk Analysis Research on SMS Verification Code and Biometric Recognition Technology." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 139–44. http://dx.doi.org/10.54097/0h7ev354.

Full text
Abstract:
This paper delves into the ongoing transformation in the domain of digital identity security. It specifically focuses on the paradigm shift from traditional methods of authentication, such as passwords and text message verification codes, towards the use of biometric recognition technology. By scrutinizing the inherent weaknesses linked with the utilization of text message verification codes, the paper underlines the demand for more trustworthy and secure solutions for authentication. Following this, biometric authentication is thoroughly examined, with a highlight on its unique features, the
APA, Harvard, Vancouver, ISO, and other styles
19

Senthil Kumar, S. "Multimodal Biometric Technology Using Fuzzy Logic Decision and Fuzzy Inference System." Asian Journal of Computer Science and Technology 5, no. 2 (2016): 1–4. http://dx.doi.org/10.51983/ajcst-2016.5.2.1772.

Full text
Abstract:
In this research paper I discuss about the challenges to implement secure personal identification protocols with biometric technology are increasing and the need for accurate human identification is higher than ever. Single modality biometric systems have to contend with a variety of problems such as noisy data, intra class variations, non-universality, spoof attacks, and distinctiveness. Some of these limitations can be addressed by deploying multimodal biometric systems that integrate multiple biometric modalities in a single scan to alleviate the challenges of a unimodal system. Performance
APA, Harvard, Vancouver, ISO, and other styles
20

S. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Full text
Abstract:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different
APA, Harvard, Vancouver, ISO, and other styles
21

Uhl, Andreas. "Footprint-based biometric verification." Journal of Electronic Imaging 17, no. 1 (2008): 011016. http://dx.doi.org/10.1117/1.2892674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Vetter, Ron. "Authentication by Biometric Verification." Computer 43, no. 2 (2010): 28–29. http://dx.doi.org/10.1109/mc.2010.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mahajan, Dr Rana S. "Biometry based Exam Door Verification System with SMS Alert." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29837.

Full text
Abstract:
In the dominion of educational institutions, the security and integrity of examinations are of paramount importance. Traditional methods of verifying student identities using photo ID cards and signatures have proven inadequate in the face of evolving challenges related to impersonation, cheating, and unauthorized access to examination halls. To address these concerns, this project introduces a novel Biometry-Based Exam Door Verification System with SMS Alert, employing STM32 microcontroller technology for advanced security and real-time notifications. The system leverages biometric data, spec
APA, Harvard, Vancouver, ISO, and other styles
24

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digi
APA, Harvard, Vancouver, ISO, and other styles
25

Akhilesh Singh and Dr. Mayur Rahul. "Comparative Review of Earlier Research on Multimodal Biometric Authentication Using Ear and Palm Print." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 09 (2024): 2286–90. http://dx.doi.org/10.47392/irjaeh.2024.0312.

Full text
Abstract:
Biometric authentication systems have gained prominence due to their ability to provide secure and reliable identity verification. Among various biometric traits, ear and palmprint recognition have shown significant potential due to their unique and stable features. This review paper explores the integration of ear and palmprint biometrics in a multimodal authentication system, examining their individual characteristics, advantages, challenges, and the synergistic benefits of their combination. We also discuss recent advancements, methodologies, and future directions in multimodal biometric au
APA, Harvard, Vancouver, ISO, and other styles
26

Zaborska, Sylwia. "Regulacje prawne w zakresie ochrony danych biometrycznych na podstawie RODO." Studia Iuridica Lublinensia 28, no. 2 (2019): 97. http://dx.doi.org/10.17951/sil.2019.28.2.97-106.

Full text
Abstract:
<p>The purpose of this article is to draw attention to the possibility of using new methods for the identification and verification of individuals, i.e. biometric techniques. Nowadays, the use of biometrics grows, which entails the adaptation of legal norms to current trends. The author points out the changes in the protection of biometric data in connection with the introduction of the GDPR, especially in the context of making biometric data as a special category.</p>
APA, Harvard, Vancouver, ISO, and other styles
27

Siddappa M, DR. "Paper Presentation: Protection on Exam Paper Leakage Using Biometric." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50395.

Full text
Abstract:
ABSTRACT Examination paper leakage poses a serious threat to the integrity and fairness of academic evaluations. This paper presents a secure and innovative solution to prevent exam paper leakage using biometric authentication technology. The proposed system ensures that only authorized personnel can access, handle, and distribute exam papers by integrating biometric verification methods such as fingerprint or iris recognition. By replacing traditional manual or password-based access systems, biometrics provide a higher level of security, minimizing the risks of unauthorized access or identity
APA, Harvard, Vancouver, ISO, and other styles
28

Nagrale, Niraj K. "Deep Learning Approaches for Ear Biometrics: A Novel Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36217.

Full text
Abstract:
This paper presents a novel deep learning model for ear biometrics, achieving state-of-the-art performance through the integration of transfer learning and data augmentation. Ear biometrics has garnered significant interest due to the ear's unique and stable characteristics, making it a viable modality for biometric identification. Traditional methods often falter under variations in lighting, pose, and occlusion, but deep learning techniques, particularly Convolutional Neural Networks (CNNs), have shown exceptional capability in overcoming these challenges by learning robust and discriminativ
APA, Harvard, Vancouver, ISO, and other styles
29

R., Parimala, and Jayakumar C. "Ear Biometrics- An Alternative Biometric." International Journal of Computer Science and Engineering Communications 1, no. 1 (2013): 54–61. https://doi.org/10.5281/zenodo.821762.

Full text
Abstract:
This paper is one of the parts of a biometric based identity verification security system development project. Today, the most successful biometric based identification technologies such as fingerprint and iris scan are used worldwide in both criminal investigations and high security facilities. Even though Face recognition is one of the developing biometric methods; illumination, makeup, posing, emotional expressions and face-lifting reduce the success of face recognition. A new biometric which is not effected by any of the factors above is needed. The alternative biometric should overcome th
APA, Harvard, Vancouver, ISO, and other styles
30

Ali, Ammar Mohammed, and Alaa Kadhim Farhan. "A novel multi-biometric technique for verification of secure e-document." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 1 (2024): 662. http://dx.doi.org/10.11591/ijece.v14i1.pp662-671.

Full text
Abstract:
Extracting unique and distinctive traits is one of the most important challenges that researchers face, who rely on biometrics to extract exceptional traits for an individual. A large amount of biometric evidence that can be identified and found in various research has been done. In this paper, a biometrics system is proposed that combines the benefits of fingerprinting and uses a novel strategy to combine it with the image-based fingerprint vein feature set. The proposed system is fast and performs effective personal identification by combining both features. The features extracted from the v
APA, Harvard, Vancouver, ISO, and other styles
31

Mohammed, Ali Ammar, and Farhan Alaa Kadhim. "A novel multi-biometric technique for verification of secure e-document." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 1 (2024): 662–71. https://doi.org/10.11591/ijece.v14i1.pp662-671.

Full text
Abstract:
Extracting unique and distinctive traits is one of the most important challenges that researchers face, who rely on biometrics to extract exceptional traits for an individual. A large amount of biometric evidence that can be identified and found in various research has been done. In this paper, a biometrics system is proposed that combines the benefits of fingerprinting and uses a novel strategy to combine it with the image-based fingerprint vein feature set. The proposed system is fast and performs effective personal identification by combining both features. The features extracted from the v
APA, Harvard, Vancouver, ISO, and other styles
32

Satinder Singh. "Quantum-Enhanced Eigenface Algorithm for Face Verification." Journal of Information Systems Engineering and Management 10, no. 36s (2025): 588–603. https://doi.org/10.52783/jisem.v10i36s.6536.

Full text
Abstract:
Facial biometrics play a crucial role in identity verification, yet classical approaches face challenges related to computational complexity and security vulnerabilities. This paper explores the integration of quantum computing with eigenface-based face verification to enhance efficiency and security. By utilizing the advantages of Quantum Principal Component Analysis (QPCA), we achieve exponential speedups in eigenvalue decomposition, significantly reducing the computational burden of high-dimensional facial data processing. Our hybrid classical-quantum approach optimizes quantum state encodi
APA, Harvard, Vancouver, ISO, and other styles
33

Prabhu, D., S. Vijay Bhanu, and S. Suthir. "MODELING OF OPTIMAL MULTI KEY HOMOMORPHIC ENCRYPTION WITH DEEP LEARNING BIOMETRIC BASED AUTHENTICATION SYSTEM FOR CLOUD COMPUTING." ASEAN Engineering Journal 13, no. 4 (2023): 149–56. http://dx.doi.org/10.11113/aej.v13.20160.

Full text
Abstract:
More recently, cloud computing (CC) has gained considerable attention among research communities and business people. Inspite of the advantages of CC, security, and privacy remains a challenging problem. Therefore, biometric authentication systems have been employed and fingerprint is considered as widely employed to attain security. In addition, image encryption techniques can be used to encrypt the fingerprint biometric image to add an extra level of security. Based on these motivation, this study designs an optimal multikey homomorphic encryption (OMHE) with stacked autoencoder (SAE) based
APA, Harvard, Vancouver, ISO, and other styles
34

Kumar, Girish, and Dr Ajay Khushwaha. "A modal for better authentication using hybrid biometrics by adding a side face with an ear." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2484–92. http://dx.doi.org/10.61841/turcomat.v11i3.14255.

Full text
Abstract:
Customer support in digital environment is most important by facilitating secure authentication and verification for both customer and retail stores. Ear and side face as hybrid biometric is effective and efficient method for authentication and recognition in biometrics. Many researchers reported that ear can be a biometric trait and has sufficient potential to be considered as biometric characteristic and same for the face it has been proved. In this research paper we investigated, with help of MATLAB tool. Idea of multiple traits of ear and side face biometric technique in retail stores for
APA, Harvard, Vancouver, ISO, and other styles
35

Mróz-Gorgoń, Barbara, Wojciech Wodo, Anna Andrych, Katarzyna Caban-Piaskowska, and Cyprian Kozyra. "Biometrics Innovation and Payment Sector Perception." Sustainability 14, no. 15 (2022): 9424. http://dx.doi.org/10.3390/su14159424.

Full text
Abstract:
This paper presents an analysis of innovations in the biometrics market, which have started to play a very important role in personal identification and identification systems. The aim of the study was to analyze current customs and opinions regarding payment methods, as well as to identify threats and opportunities for new biometric solutions in this area. First, the history of the biometrics market is presented. Acceptance patterns of new technologies are explored and modified. The authors used literature reviews, qualitative research (focus groups), and quantitative research (questionnaire
APA, Harvard, Vancouver, ISO, and other styles
36

M. Almufti, Saman, Bara’a Wasfi Salim, and Renas Rajab Asaad. "Automatic Verification for Handwritten Based on GLCM Properties and Seven Moments." Academic Journal of Nawroz University 12, no. 1 (2023): 130–36. http://dx.doi.org/10.25007/ajnu.v12n1a1651.

Full text
Abstract:
In recent years, the need for community verification of personality has increased dramatically, and biometrics are becoming very important in many daily applications. Biometrics work to verify individuals based on measurable data for their descriptions and characteristics. Biometric systems have thus been able to verify or identify a person.
 The fact that the use of handwritten signatures are recognized in all societies, and because they are biometric, has made signature verification an important biometric process. In this paper, a number of models are collected from hand signatures for
APA, Harvard, Vancouver, ISO, and other styles
37

Lalovic, Komlen, Milan Milosavljevic, Ivan Tot, and Nemanja Macek. "Device for biometric verification of maternity." Serbian Journal of Electrical Engineering 12, no. 3 (2015): 293–302. http://dx.doi.org/10.2298/sjee1503293l.

Full text
Abstract:
Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templat
APA, Harvard, Vancouver, ISO, and other styles
38

Jha, Abhishek, Ashish A, and Lalita Verma. "Biometric Authentication." YMER Digital 21, no. 05 (2022): 1041–49. http://dx.doi.org/10.37896/ymer21.05/b9.

Full text
Abstract:
Progresses in the field of Information Technology likewise make Information Security an indivisible piece of it. To manage security, Authentication assumes a significant part. This paper presents a survey on the biometric confirmation strategies and some future conceivable outcomes in this field. In biometrics, an individual should be distinguished in view of some trademark physiological boundaries. A wide assortment of frameworks requires solid individual acknowledgment plans to either affirm or decide the character of an individual mentioning their administrations. The motivation behind such
APA, Harvard, Vancouver, ISO, and other styles
39

Jung, Eunhwa, and Kyungho Hong. "Biometric verification based on facial profile images for mobile security." Journal of Systems and Information Technology 17, no. 1 (2015): 91–100. http://dx.doi.org/10.1108/jsit-03-2014-0020.

Full text
Abstract:
Purpose – This study aims at a biometric verification based on facial profile images for mobile security. The modern technology of mobile Internet devices and smart phones such as the iPhone series and Galaxy phone series has revealed the development of information technology of input and output devices as high-definition multimedia interface. The development of information technology requires novel biometric verification for personal identification or authentication in mobile security, especially in Internet banking and mobile Internet access. Our study deals with a biometric verification bas
APA, Harvard, Vancouver, ISO, and other styles
40

Janardhan Komarolu, C.Nagaraju. "Design of an Adaptive and Iterative Multi-Modal Transformer-Based Biometric Security Framework for Robust Authentication and Spoof Detection." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 2658–77. https://doi.org/10.52783/cana.v32.4547.

Full text
Abstract:
As more people rely on biometrics in conjunction with traditional identity authentication systems, attacks like deepfakes and adversarial techniques have emerged as prominent threats in several identity verification systems. Traditional unimodal and even static multimodal schemes are generally found ineffective in the face of new attacks because unimodality leaves them vulnerable to different adversarial manipulations, cannot verify continuously during the use phase, and lack adaptability to change. Therefore, in light of these limitations, we present an adaptive, robust, and privacy-preservin
APA, Harvard, Vancouver, ISO, and other styles
41

Jain, Rubal, and Chander Kant. "Attacks on Biometric Systems: An Overview." International Journal of Advances in Scientific Research 1, no. 7 (2015): 283. http://dx.doi.org/10.7439/ijasr.v1i7.1975.

Full text
Abstract:
Biometrics is a pattern recognition system that refers to the use of different physiological (face, fingerprints, etc.) and behavioral (voice, gait etc.) traits for identification and verification purposes. A biometrics-based personal authentication system has numerous advantages over traditional systems such as token-based (e.g., ID cards) or knowledge-based (e.g., password) but they are at the risk of attacks. This paper presents a literature review of attack system architecture and makes progress towards various attack points in biometric system. These attacks may compromise the template re
APA, Harvard, Vancouver, ISO, and other styles
42

Qin, Huafeng, and Peng Wang. "A Template Generation and Improvement Approach for Finger-Vein Recognition." Information 10, no. 4 (2019): 145. http://dx.doi.org/10.3390/info10040145.

Full text
Abstract:
Finger-vein biometrics have been extensively investigated for person verification. One of the open issues in finger-vein verification is the lack of robustness against variations of vein patterns due to the changes in physiological and imaging conditions during the acquisition process, which results in large intra-class variations among the finger-vein images captured from the same finger and may degrade the system performance. Despite recent advances in biometric template generation and improvement, current solutions mainly focus on the extrinsic biometrics (e.g., fingerprints, face, signatur
APA, Harvard, Vancouver, ISO, and other styles
43

Szczuko, Piotr, Arkadiusz Harasimiuk, and Andrzej Czyżewski. "Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application." Sensors 22, no. 6 (2022): 2356. http://dx.doi.org/10.3390/s22062356.

Full text
Abstract:
An evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application of DST, required modifications, base probability, and mass conversions. Next, the biometric verification process is described, and the engineered biometric banking sys
APA, Harvard, Vancouver, ISO, and other styles
44

Trokoz, D. A. "Direct dynamic biometric verification technique." Вестник Ростовского государственного университета путей сообщения, no. 1 (2021): 70–79. http://dx.doi.org/10.46973/0201-727x_2021_1_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bazen, A. M., and R. N. J. Veldhuis. "Likelihood-Ratio-Based Biometric Verification." IEEE Transactions on Circuits and Systems for Video Technology 14, no. 1 (2004): 86–94. http://dx.doi.org/10.1109/tcsvt.2003.818356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Vijaya Kumar, B. V. K., Marios Savvides, Chunyan Xie, Krithika Venkataramani, Jason Thornton, and Abhijit Mahalanobis. "Biometric verification with correlation filters." Applied Optics 43, no. 2 (2004): 391. http://dx.doi.org/10.1364/ao.43.000391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Topcu, Berkay, Cagatay Karabat, Matin Azadmanesh, and Hakan Erdogan. "Practical security and privacy attacks against biometric hashing using sparse recovery." EURASIP Journal on Advances in Signal Processing 2016, no. 1 (2016): 100. https://doi.org/10.1186/s13634-016-0396-1.

Full text
Abstract:
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user’s password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a
APA, Harvard, Vancouver, ISO, and other styles
48

Huang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.

Full text
Abstract:
Biometric systems input physical or personal human characteristics for identification, authentication, and security purposes. With the advancement in communication and intelligent security systems, biometrics are programmed to validate electronic signatures (E-signatures) for online and offline authentication. This article introduces a dynamic signature verification technique (DSVT) using mutual compliance (MC) between the security system and the biometric device. The security system is responsible for online and offline signature approval using personal inputs from humans. This personal verif
APA, Harvard, Vancouver, ISO, and other styles
49

Agrafioti, Foteini, Francis M. Bui, and Dimitrios Hatzinakos. "Secure Telemedicine: Biometrics for Remote and Continuous Patient Verification." Journal of Computer Networks and Communications 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/924791.

Full text
Abstract:
The technological advancements in the field of remote sensing have resulted in substantial growth of the telemedicine industry. While health care practitioners may now monitor their patients’ well-being from a distance and deliver their services remotely, the lack of physical presence introduces security risks, primarily with regard to the identity of the involved parties. The sensing apparatus, that a patient may employ at home, collects and transmits vital signals to medical centres which respond with treatment decisions despite the lack of solid authentication of the transmitter’s identity.
APA, Harvard, Vancouver, ISO, and other styles
50

Salama, Gerges M., Safaa El-Gazar, Basma Omar, et al. "Cancelable biometric system for IoT applications based on optical double random phase encoding." Optics Express 30, no. 21 (2022): 37816. http://dx.doi.org/10.1364/oe.466101.

Full text
Abstract:
The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an important role in securing the emerging IoT devices, especially IoT robots. Biometric identification is an interesting candidate to improve IoT usability and security. To access and control sensitive environments like IoT, passwords are not recommended for high security levels. Biometrics can be used instead, but more protection is needed to store original biometrics away from invaders. This paper presents a cancelable multimodal biometric recognition system based on encryption algorithms and waterm
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!