Skip to main content
    • by 
    •   4  
      Security and PrivacyProceedingsBit Error RateBiometric Authentication
    • by 
    •   18  
      Computer ScienceForensicsBiometricsSynchronization
    • by 
    • Biometric Authentication
A new multi-modal biometric authentication approach using gait signals and fingerprint images as biometric traits is proposed. The individual comparison scores derived from the gait and fingers are normalized using four methods (min-max,... more
    • by  and +1
    •   5  
      Optical SensorMobile DeviceTotal Internal ReflectionUser authentication
Internet of Things (IoT) is a buzzword, where all digital devices are connecting with each other to exchange some information. These devices are encroaching on our daily life including home appliances, offices, health etc. Security is the... more
    • by 
    •   4  
      SecurityInternet of Things (IoT)IOTBiometric Authentication
    • by 
    •   4  
      Image recognitionBiometric AuthenticationIRIS RECOGNITIONMessage Authentication
    • by  and +1
    •   11  
      Approximation TheoryPrivacySpeaker RecognitionSupport Vector Machines
    • by 
    •   5  
      Computer ScienceNetwork SecurityBiometricsCryptography
    • by 
    •   10  
      Information SecurityAuthenticationConceptual ModelConceptual Framework
... sucessful, it has two main drawbacks: heavy computational load and warping of forgeries. ... of the dynamical system at time , the function represents the state change of dynamical ... generated from input handwriting time series... more
    • by 
    •   15  
      Computer ScienceInformation ScienceBiomechanicsTime Series
Abstract: Palm vein authentication is one of the most reliable authentication. Which contain physiological body characteristics that can be used to distinguish between users. In this paper we represent in new approach for the personal... more
    • by 
    •   6  
      Pattern MatchingFeature ExtractionBiometric AuthenticationPalm-vein Recognition
    • by 
    •   16  
      Information SystemsBiometricsApplied EconomicsAuthentication
In this paper a new authentication technique is discussed i-e; facial recognition verification for online voting system. It aims to develop a computerized voting system to make the election process more secure and user friendly. The... more
    • by 
    •   3  
      Online VotingBiometric AuthenticationOnline Voting System
—With the increase in cyber threats and attacks many institutions are exploring how newer technologies may be applied to strengthen the way users are verified when bestowing permissions for carrying out web transactions. In particular,... more
    • by 
    •   13  
      BiometricsIdentity Fraud/TheftBiometrics Authentication TechnologiesIdentity Theft
The past few decades have witnessed the rapid progress of technology, engulfing all the aspects of human existence. The assistance of technology in man’s mundane as well as specialized activities has rendered it a part & parcel of... more
    • by 
    •   8  
      Face RecognitionBiometricVoice RecognitionFingerprint Recognition
The increasing demand for pervasive security poses a challenge in achieving robust authentication at very low cost. Identification using human biometrics is considered the most robust solution, but requires powerful computers to be... more
    • by 
    •   4  
      Computer ScienceFPGA implementationFuzzy Logic and Its ApplicationBiometric Authentication
    • by 
    •   7  
      Information TechnologyInformation SecurityComputer SecurityPKI
    • by 
    •   7  
      Computer ScienceInformation TechnologyInformation SecurityAccess Control
Automated Teller Machine (ATM) has been convenient approach than ever before for accessing bank’s account from anywhere anytime. Being an electronic telecommunication device, it helps customer to perform transactions/withdraw cash, make... more
    • by 
    •   2  
      Atmospheric Remote Sensing, Embedded Systems DesignBiometric Authentication
This posting is an annotated bibliography focused broadly on touchscreen and gesture user interfaces, on-line character recognition (a.k.a. dynamic character recognition, a.k.a. pen and touch computing), both hardware and software. It has... more
    • by 
    •   20  
      CryptographyGesture RecognitionTouch ScreenMulti-Touch
    • by 
    •   16  
      Principal Component AnalysisFace RecognitionBack PropagationRadial Basis Function
Biometrics is the utilization of biological characteristics (face, iris, and fingerprint) or behavioral traits (signature, voice) for identity verification of an individual. Biometric authentication is gaining popularity as more trustable... more
    • by 
    •   9  
      Face RecognitionBiometricsAuthenticationVerification
Pur nella varietà delle singole architetture, tutti i sistemi di firma grafometrica consentono la digitalizzazione sia del tratto chirografo sia di altri valori biometrici comportamentali legati alla dinamica di apposizione della firma... more
    • by 
    •   19  
      Biometrics Authentication TechnologiesElectronic DocumentsHandwritten Signature VerificationElectronic Signatures
This article provides an overview of the literature surrounding emerging markets and the global paradigm shift taking place towards the development of digital economies. It provides a review of recent practices in the government sector.... more
    • by 
    •   11  
      Information TechnologyDigital IdentityEmerging MarketsAuthentication
    • by 
    •   3  
      Access ControlSystem ArchitectureBiometric Authentication
    • by 
    •   10  
      Information TechnologyDigital SignatureAccess ControlMobile Communication
The role of attendance in any organization cannot be over emphasis. Attendance Record System (ARS) is one of the tools used by organizations to track their staff`s daily attendance and performance analysis. ARS helps organizations to... more
    • by 
    •   12  
      Facial RecognitionAuthenticationBiometrics Authentication TechnologiesFacial Expression Recognition using Eigenfaces
The purpose of this paper is to highlight and solve issues concerning the biometric information for authentication and their use with smartcards
    • by 
    •   2  
      SmartcardBiometric Authentication
    • by 
    •   18  
      Computer ScienceBiomedical EngineeringPrivacyBiometrics
    • by 
    •   2  
      Delaunay TriangulationBiometric Authentication
    • by 
    •   5  
      Multiple Classifier SystemsMCSSystem performanceBiometric Authentication
    • by 
    •   2  
      Voice RecognitionBiometric Authentication
    • by 
    •   5  
      Data StructureProbability Distribution & ApplicationsSecure ComputationBiometric Authentication
    • by 
    •   16  
      Mechanical EngineeringIntellectual PropertySignal ProcessingBiometrics
    • by 
    •   5  
      Face RecognitionBiometricFace VerificationBiometric Authentication
    • by 
    •   5  
      Image ProcessingPattern RecognitionImage AnalysisBiometrics Authentication Technologies
    • by 
    •   14  
      Computer ScienceBiometricsComputer SecurityAuthentication
    • by 
    •   20  
      Information SystemsIndividualityProbabilitySystem Design
Human body communication (HBC) is a short-range wireless communication in the vicinity of, or inside a human body by using the human body as a propagation medium. HBC is divided into two solutions: galvanic coupling and capacitive... more
    • by 
    •   20  
      Support Vector MachinesArticulated Human Body TrackingBiometrics Authentication TechnologiesMy main research interest is to about the representation of the human body, human anatomy, and the relationship between figuration and abstraction. I have an MA on this subject from Chelsea School of Arts and Design of London, UK.
    • by 
    •   3  
      Large ScaleBiometric AuthenticationCommercial Off-The-Shelf
E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As... more
    • by  and +1
    •   2  
      Access ControlBiometric Authentication
    • by 
    •   4  
      Face RecognitionBiometric AuthenticationIRIS RECOGNITIONImage Sequence
    • by 
    •   14  
      Signal ProcessingPattern RecognitionBiometricsCoding
    • by 
    •   20  
      Information SystemsIndividualityProbabilitySystem Design
This report describes the results of testing of authentication methods and applications for smartphones, including the methodology that was used. We want to determine the authentication methods that are perceived as secure and... more
    • by  and +1
    •   10  
      User Experience (UX)AuthenticationHuman-centered Design, UX/UIFingerprint
    • by 
    •   6  
      Cognitive ScienceKey ManagementSmart CardBiometric Authentication
— Human Face Recognition has become a potential method of biometric authentication because of its most non-intrusive and user-friendly nature. Automatic face recognition poses various challenges due to: (a) inherent variability of face... more
    • by 
    •   7  
      Computer ScienceImage ProcessingFace RecognitionFacial expression
In this paper, we propose a novel continuous authentication system for smartphone users. The proposed system entirely relies on unlabeled phone movement patterns collected through smartphone accelerometer. The data was collected in a... more
    • by  and +2
    •   4  
      User authenticationBiometric AuthenticationContext Aware Continuous AuthenticationContinuous Authentication
    • by 
    •   8  
      Speaker VerificationPerformance EvaluationSignature Verificationhidden Markov model