|
|
|
Maria Louro da Silva, Carolina Gouveia, Daniel Filipe Albuquerque and Hugo Plácido da Silva
Bio-Radar (BR) systems have shown great promise for biometric applications. Conventional methods can be forged, or fooled. Even alternative methods intrinsic to the user, such as the Electrocardiogram (ECG), present drawbacks as they require contact with...
ver más
|
|
|
|
|
|
|
Yi Zhao and Song-Kyoo Kim
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, ...
ver más
|
|
|
|
|
|
|
Yanmin Lei, Dong Pan, Zhibin Feng and Junru Qian
With the development of deep learning technology, more and more researchers are interested in ear recognition. Human ear recognition is a biometric identification technology based on human ear feature information and it is often used for authentication a...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Smita Khairnar, Shilpa Gite, Ketan Kotecha and Sudeep D. Thepade
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to spoofing threats. Many researchers focus on face liveness detection to pr...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Masaki Yasuhara, Isao Nambu and Shohei Yano
In existing biometric authentication methods, the user must perform an authentication operation such as placing a finger in a scanner or facing a camera. With ear acoustic authentication, the acoustic characteristics of the ear canal can be used as biome...
ver más
|
|
|
|
|
|
|
Vladimír Smejkal, Jindrich Kodl
Pág. 166 - 178
The use of dynamic biometric methods for the authentication of people provides significantly greater security than the use of the static ones. The variance of individual dynamic properties of a person, which protects biometric methods against attacks, ca...
ver más
|
|
|
|