|
|
|
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi
Fingerprint analysis has long been a cornerstone in criminal investigations for suspect identification. Beyond this conventional role, recent efforts have aimed to extract additional demographic information from fingerprints, such as gender, age, and nat...
ver más
|
|
|
|
|
|
|
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ...
ver más
|
|
|
|
|
|
|
Jin Su Kim, Cheol Ho Song, Jae Myung Kim, Jimin Lee, Yeong-Hyeon Byeon, Jaehyo Jung, Hyun-Sik Choi, Keun-Chang Kwak, Youn Tae Kim, EunSang Bak and Sungbum Pan
Current advancements in biosignal-based user recognition technology are paving the way for a next-generation solution that addresses the limitations of face- and fingerprint-based user recognition methods. However, existing biosignal benchmark databases ...
ver más
|
|
|
|
|
|
|
Yuting Sun, Yanfeng Tang and Xiaojuan Chen
Fingerprints are the most widely used of all biological characteristics in public safety and forensic identification. However, fingerprint images extracted from the crime scene are incomplete. On the one hand, due to the lack of effective area in partial...
ver más
|
|
|
|
|
|
|
Ahmed M. Nor, Octavian Fratu and Simona Halunga
In this article, we propose a new RIS passive beamforming scheme in two main stages. First, a fingerprint-based codebook (FP-CB) design phase occurs, where the area of interest is divided into a number of points and the optimal reflection patterns (RPs) ...
ver más
|
|
|
|
|
|
|
Juan Wang, Jing Zhong and Jiangqi Li
With the development of IoT, IoT devices have proliferated. With the increasing demands of network management and security evaluation, automatic identification of IoT devices becomes necessary. However, existing works require a lot of manual effort and f...
ver más
|
|
|
|
|
|
|
Yuanjun Ye, Haiping Fu, Yiwei Zhou, Shanxin Zhang, Zehuang Wang, Lihua Tian, Jianjun Tan, Genfa Zhu, Jinmei Liu and Yechun Xu
Caladiums are promising colorful foliage plants due to their unique leaf shapes and dazzling colors. Until now, over 2000 varieties of Caladium have been cultivated worldwide. The long-term natural variation and artificial selection have enriched the ger...
ver más
|
|
|
|
|
|
|
Soorim Yang, Kyoung-Hwan Kim, Hye-Ryeong Jeong, Seokjun Lee and Jaeho Kim
The COVID-19 pandemic has underscored the necessity for rapid contact tracing as a means to effectively suppress the spread of infectious diseases. Existing contact tracing methods leverage location-based or distance-based detection to identify contact w...
ver más
|
|
|
|
|
|
|
Alan Huang and Justie Su-Tzu Juan
A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and man...
ver más
|
|
|
|
|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|