|
|
|
Yuting Sun, Yanfeng Tang and Xiaojuan Chen
Fingerprints are the most widely used of all biological characteristics in public safety and forensic identification. However, fingerprint images extracted from the crime scene are incomplete. On the one hand, due to the lack of effective area in partial...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Yong Qi, Mengzhe Qiu, Hefeifei Jiang and Feiyang Wang
The fingerprint is an important biological feature of the human body, which contains abundant biometric information. At present, the academic exploration of fingerprint gender characteristics is generally at the level of understanding, and the standardiz...
ver más
|
|
|
|
|
|
|
Octavio Loyola-González, Emilio Francisco Ferreira Mehnert, Aythami Morales, Julian Fierrez, Miguel Angel Medina-Pérez and Raúl Monroy
We study the impact of minutiae errors in the performance of latent fingerprint identification systems. We perform several experiments in which we remove ground-truth minutiae from latent fingerprints and evaluate the effects on matching score and rank-n...
ver más
|
|
|
|
|
|
|
Mehwish Leghari, Shahzad Memon, Lachhman Das Dhomeja, Akhtar Hussain Jalbani and Asghar Ali Chandio
The extensive research in the field of multimodal biometrics by the research community and the advent of modern technology has compelled the use of multimodal biometrics in real life applications. Biometric systems that are based on a single modality hav...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA...
ver más
|
|
|
|
|
|
|
Eugene Ilyushin,Dmitry Namiot
Pág. 11 - 19
AI technologies, which have received an impetus in development in recent years due to the emergence of a significant amount of data and computing resources, have greatly influenced many areas of human life, and for some of them, they have become an integ...
ver más
|
|
|
|
|
|
|
Oleksandr Yudin,Ruslana Ziubina,Serhii Buchyk,Olena Matviichuk-Yudina,Olha Suprun,Viktoriia Ivannikova
Pág. 56 - 64
Methods for verifying and identifying the operator by the features of the formation of biometric features of a speech signal in control systems of unmanned aerial systems are proposed.A method has been developed for the effective width of the spectrum of...
ver más
|
|
|
|
|
|
|
Milad Salem, Shayan Taheri and Jiann-Shiun Yuan
Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud. Due to the fact that biometric data like fingerprint and iris ca...
ver más
|
|
|
|
|
|
|
A. A. Grusho,M. I. Zabezhailo,D. V. Smirnov,E. E. Timonina
Pág. 43 - 50
Authentication data, such as password, key word, passport number, etc., authentication material, such as biometric fingerprint, faces, etc., authentication objects, such as phone, passport, token, etc., can be spotted, forged and transferred to the malef...
ver más
|
|
|
|