Journal articles on the topic 'Vulnerabilities of biometric system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Vulnerabilities of biometric system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sobabe, Abdou-Aziz, Tahirou Djara, and Antoine Vianou. "Biometric System Vulnerabilities: A Typology of Metadata." Advances in Science, Technology and Engineering Systems Journal 5, no. 1 (2020): 191–200. http://dx.doi.org/10.25046/aj050125.
Full textSingh, Yogendra Narain, and Sanjay Kumar Singh. "A taxonomy of biometric system vulnerabilities and defences." International Journal of Biometrics 5, no. 2 (2013): 137. http://dx.doi.org/10.1504/ijbm.2013.052964.
Full textKumar, Govind, Mozakker Anam, Md Sajid, and Dr Sakthivel M. "Finger Print Voting System." International Research Journal of Computer Science 11, no. 04 (2024): 200–203. http://dx.doi.org/10.26562/irjcs.2024.v1104.11.
Full textS Prasad, Puja. "Vulnerabilities of Biometric Authentication Systems: A Survey." HELIX 8, no. 5 (2018): 4100–4103. http://dx.doi.org/10.29042/2018-4100-4103.
Full textMoorthy, Kohbalan, Kauthar Mohd Daud, Steven R. Arokiasamy, and Md Raihanul Islam Tomal. "HYBRID BIOMETRIC AUTHENTICATION FOR AUTOMATIC TELLER MACHINE." International Journal of Software Engineering and Computer Systems 10, no. 1 (2024): 32–39. http://dx.doi.org/10.15282/ijsecs.10.1.2024.3.0121.
Full textGupta, Sharad. "Anti-Spoofing: Liveness Detection System." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 4997–5003. https://doi.org/10.22214/ijraset.2025.70787.
Full textKancherla, Tarun. "Fingerprint-Based Voting System Using C#: A Secure Biometric Approach to Modern Elections." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 158–60. https://doi.org/10.22214/ijraset.2025.68176.
Full textKhranovskyi, Mykola, and Andriy Kernytskyy. "Blockhain and Biometrics Challenges and Solutions." Computer Design Systems. Theory and Practice 6, no. 1 (2024): 189–98. http://dx.doi.org/10.23939/cds2024.01.189.
Full textMishra, Shalabh Kumar, Satyvir Singh, Ashu Soni, et al. "Development and deployment of a biometric fingerprint lock system." Journal of Information and Optimization Sciences 46, no. 1 (2025): 253–62. https://doi.org/10.47974/jios-1869.
Full textShuwandy, Moceheb Lazam, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood. "Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 165–77. https://doi.org/10.58496/mjcs/2025/011.
Full textV.K., Narendira Kumar, and Srinivasan B. "DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ALONG WITH MULTIMODAL BIOMETRICS TECHNOLOGY." International Journal of Advanced Information Technology (IJAIT) 1, no. 6 (2011): 33–42. https://doi.org/10.5281/zenodo.3406965.
Full textAcar, Abbas, Shoukat Ali, Koray Karabina, et al. "A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA." ACM Transactions on Privacy and Security 24, no. 4 (2021): 1–28. http://dx.doi.org/10.1145/3464690.
Full textTyagi, S., M. Kumar, D. Singh, and H. Tyagi. "Biometric Cryptosystem Based On Fingerprint Authentication And Cryptography Technique." International Research Journal of Parroha Multiple Campus (IRJPMC) 1, no. 1 (2023): 26–39. https://doi.org/10.5281/zenodo.10258787.
Full textDorofeev, K. A. "COMPARATIVE ANALYSIS OF VULNERABILITIES IN BIOMETRIC FACE RECOGNITION SYSTEMS." Journal of the Ural Federal District. Information security 22, no. 3 (2022): 34–46. http://dx.doi.org/10.14529/secur220304.
Full textGhilom, Milkias, and Shahram Latifi. "The Role of Machine Learning in Advanced Biometric Systems." Electronics 13, no. 13 (2024): 2667. http://dx.doi.org/10.3390/electronics13132667.
Full textN, Ramya. "Biometric Empowered Swiping Machine." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47614.
Full textGowda, V. Dankan, Pratik Gite, Mirzanur Rahman, Kirti Rahul Kadam, G. Manivasagam, and K. D. V. Prasad. "Novel approaches to biometric security using enhanced session keys and elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 477–88. http://dx.doi.org/10.47974/jdmsc-1884.
Full textRodiah, Sarifuddin Madenda, Diana Tri Susetianingtias, Fitrianingsih, Dea Adlina, and Rini Arianty. "Retinal biometric identification using convolutional neural network." Computer Optics 45, no. 6 (2021): 865–72. http://dx.doi.org/10.18287/2412-6179-co-890.
Full textT, Maheswaran, Dinesh M, Guhan S, Kamalakar L, and Mohammed Abdulla M. "Real Time Face Recognition Security System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43520.
Full textMukul Jangid, Surbhi Gupta, and Shubham Sharma. "Zero trust biometric attendance: A secure face recognition framework." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2437–49. https://doi.org/10.30574/wjaets.2025.15.2.0807.
Full textTyagi, Shivani, Manish Kumar, Dharambeer Singh, and Hariom Tyagi. "Biometric Cryptosystem Based On Fingerprint Authentication And Cryptography Technique." International Research Journal of Parroha Multiple Campus 1, no. 1 (2022): 26–39. http://dx.doi.org/10.61916/prmn.2023.v0101.004.
Full textYEZHOVA, Y. "MULTIMODAL NEURAL NETWORK USER AUTHENTICATION SYSTEMS BASED ON BIOMETRIC FEATURES." Scientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science 1, no. 40 (2025): 40–50. https://doi.org/10.31474/1996-1588-2025-1-40-40-50.
Full textMuhammad Saad Zahoor, Et al. "Biometric Encryption: Integrating Artificial Intelligence for Robust Authentication." Dandao Xuebao/Journal of Ballistics 35, no. 3 (2023): 25–33. http://dx.doi.org/10.52783/dxjb.v35.121.
Full textNita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (2018): 39. http://dx.doi.org/10.3390/cryptography2040039.
Full textKhalid Taybi and Chaouki Chouraik. "Transforming cybersecurity in Moroccan banking: Implementing a smart system with machine learning and biometric recognition." Computer Science & IT Research Journal 6, no. 3 (2025): 231–42. https://doi.org/10.51594/csitrj.v6i3.1889.
Full textMaaref, Zineb, Foudil Belhadj, Abdelouahab Attia, et al. "A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems." Egyptian Informatics Journal 27 (September 2024): 100511. http://dx.doi.org/10.1016/j.eij.2024.100511.
Full textSindhujasri, Kode Lakshmi Durga, Kaduputla Manogna, Sutrayeth Hari Yuktha Nanda, Baligiri Thandava Krishna, and Attru Hanumantharao. "Decentralized and Biometric-Authenticated E-Voting System: A Blockchain-Based Approach." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1785–94. https://doi.org/10.22214/ijraset.2025.67653.
Full textDwivedi, Abhishek, and Shekhar Verma. "SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept." Scientific Temper 13, no. 02 (2022): 165–72. http://dx.doi.org/10.58414/scientifictemper.2022.13.2.25.
Full textNoh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes." Security and Communication Networks 2022 (September 29, 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.
Full textShinde, Trupti, Tanuja Nandre, and Gaurav Wable. "Enhanced Security for ATM Machines Using Facial Recognition and OTP." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem37351.
Full textKhade, Smita, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha, Shilpa Gite, and Sudeep D. Thepade. "Iris Liveness Detection for Biometric Authentication: A Systematic Literature Review and Future Directions." Inventions 6, no. 4 (2021): 65. http://dx.doi.org/10.3390/inventions6040065.
Full textLoganathan, D. "Graphical Password Authentication: Image Grid Based Digital Lock for Mobile Apps." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4735–47. http://dx.doi.org/10.22214/ijraset.2023.52681.
Full textRupali, Baliram Navalkar, and Rajeshri R. Shelke Prof. "Design Pattern Classifiers under Attack for Security Evaluation using Multimodal System." International Journal of Trend in Scientific Research and Development 1, no. 4 (2017): 260–65. https://doi.org/10.31142/ijtsrd97.
Full textWambua, Jacqueline Koki, and Dr Justice Mutua. "Biometric Strategies and Performance of Electronic Claim Processing at National Hospital Insurance Fund in Kenya." East African Scholars Journal of Economics, Business and Management 7, no. 06 (2024): 213–25. http://dx.doi.org/10.36349/easjebm.2024.v07i06.002.
Full textShah, Chirag Vinalbhai. "Securing Digital Transactions: The Role of AI, Big Data, and Biometric Authentication in Modern Payment Systems." Global Research and Development Journals 9, no. 7 (2024): 15–24. http://dx.doi.org/10.70179/grdjev09i100009.
Full textPecolt, Sebastian, Andrzej Błażejewski, Tomasz Królikowski, Igor Maciejewski, Kacper Gierula, and Sebastian Glowinski. "Personal Identification Using Embedded Raspberry Pi-Based Face Recognition Systems." Applied Sciences 15, no. 2 (2025): 887. https://doi.org/10.3390/app15020887.
Full textKhranovskyi, Mykola, and Andriy Kernytskyy. "ADVANTAGES OF USING LOCALITY-SENSITIVE HASHING FOR FINGERPRINT VERIFICATION IN ZERO-KNOWLEDGE PROTOCOLS." Computer Design Systems. Theory and Practice 7, no. 1 (2025): 64–72. https://doi.org/10.23939/cds2025.01.064.
Full textR., Pradeep, N. R. Sunitha, and G. S. Thejas. "A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol." International Journal of Computer Network and Information Security 15, no. 3 (2013): 15–29. http://dx.doi.org/10.5815/ijcnis.2023.03.02.
Full textJoni, Sohel Ahmed, Rabiul Rahat, Nishat Tasnin, Partho Ghose, Md Ashraf Uddin, and John Ayoade. "Hybrid-Blockchain-Based Electronic Voting Machine System Embedded with Deepface, Sharding, and Post-Quantum Techniques." Blockchains 2, no. 4 (2024): 366–423. http://dx.doi.org/10.3390/blockchains2040017.
Full textRamakrishnan, Mr R., B. Beula grace, and K. Shanmugapriya. "Civis ID with True Face: A Biometric Voting System for Secure and Transparent Elections." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02169.
Full textAbusham, Eimad, Basil Ibrahim, Kashif Zia, and Sanad Al Maskari. "An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System." Scientific Programming 2022 (November 25, 2022): 1–17. http://dx.doi.org/10.1155/2022/2628885.
Full textSavkova, Tatiana, Ivan Opirskyy, and Dmytro Sabodashko. "STUDYING THE RESISTANCE OF BIOMETRIC AUTHENTICATION SYSTEMS TO ATTACKS USING VOICE CLONING TECHNOLOGY BASED ON DEEP NEURAL NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 27–43. https://doi.org/10.28925/2663-4023.2024.26.670.
Full textKumar, Pratyush. "Secure Three Level Authentication System." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 6156–63. https://doi.org/10.22214/ijraset.2025.69782.
Full textAndrian, Rafi, and Gede Putra Kusuma. "Serial Multimodal Biometrics Authentication and Liveness Detection Using Speech Recognition with Normalized Longest Word Subsequence Method." JOIV : International Journal on Informatics Visualization 8, no. 3 (2024): 1260. http://dx.doi.org/10.62527/joiv.8.3.2247.
Full textHaq, Muhamad Amirul, Le Nam Quoc Huy, Muhammad Ridlwan, and Ishmatun Naila. "Multi-Angle Facial Recognition: Enhancing Biometric Security with a Broadly Positioned Stereo-Camera System." E3S Web of Conferences 500 (2024): 03032. http://dx.doi.org/10.1051/e3sconf/202450003032.
Full textKang, Dongwoo, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, and Dongho Won. "Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity." Security and Communication Networks 2018 (June 20, 2018): 1–14. http://dx.doi.org/10.1155/2018/9046064.
Full textCarrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.
Full textVinutha, H., and G. Thippeswamy. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. https://doi.org/10.11591/csit.v4i1.pp1-13.
Full textKrishnamoorthy, Latha, and Ammasandra Sadashivaiah Raju. "An ensemble approach for electrocardiogram and lip features based biometric authentication by using grey wolf optimization." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1524. http://dx.doi.org/10.11591/ijeecs.v33.i3.pp1524-1535.
Full textKrishnamoorthy, Latha, and Ammasandra Sadashivaiah Raju. "An ensemble approach for electrocardiogram and lip features based biometric authentication by using grey wolf optimization." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1524–35. https://doi.org/10.11591/ijeecs.v33.i3.pp1524-1535.
Full text