|
|
|
|
|
Abdulwahid Al Abdulwahid
Ethnic conflicts frequently lead to violations of human rights, such as genocide and crimes against humanity, as well as economic collapse, governmental failure, environmental problems, and massive influxes of refugees. Many innocent people suffer as a r...
ver más
|
|
|
|
|
|
|
|
|
|
|
Tony Gwyn, Kaushik Roy and Mustafa Atay
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur...
ver más
|
|
|
|
|
|
|
|
|
|
|
Bhanu Singh and Nirvisha Singh
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user?s identity, for data security. Organizations en...
ver más
|
|
|
|
|
|
|
|
|
|
|
Mehwish Leghari, Shahzad Memon, Lachhman Das Dhomeja, Akhtar Hussain Jalbani and Asghar Ali Chandio
The extensive research in the field of multimodal biometrics by the research community and the advent of modern technology has compelled the use of multimodal biometrics in real life applications. Biometric systems that are based on a single modality hav...
ver más
|
|
|
|
|
|
|
|
|
|
|
Iurii Medvedev, Farhad Shadmand, Leandro Cruz and Nuno Gonçalves
Various modern security systems follow a tendency to simplify the usage of the existing biometric recognition solutions and embed them into ubiquitous portable devices. In this work, we continue the investigation and development of our method for securin...
ver más
|
|
|
|
|
|
|
|
|
|
|
Sherif Said, Abdullah S. Karar, Taha Beyrouthy, Samer Alkork and Amine Nait-ali
Electrical biosignals have the potential for use as biometric authenticators, owing to their ability to facilitate liveness detection and concealed nature. In this work, the viability of using surface electromyogram (sEMG) as a biometric modality for use...
ver más
|
|
|
|
|
|
|
|
|
|
|
Paloma Tirado-Martin, Judith Liu-Jimenez, Jorge Sanchez-Casanova and Raul Sanchez-Reillo
Currently, machine learning techniques are successfully applied in biometrics and Electrocardiogram (ECG) biometrics specifically. However, not many works deal with different physiological states in the user, which can provide significant heart rate vari...
ver más
|
|
|
|
|
|
|
|
|
|
|
Mehwish Leghari, Shahzad Memon, Lachman Das Dhomeja, Akhter Hussain Jalbani
Pág. 647 - 656
Now-a-days, in the field of machine learning the data augmentation techniques are common in use, especially with deep neural networks, where a large amount of data is required to train the network. The effectiveness of the data augmentation technique has...
ver más
|
|
|
|
|
|
|
|
|
|
|
Gabriel Babatunde Iwasokun,Kolawole Isaiah Opatoye,Babajide Oluwaseun Orunmuyi
Pág. 114 - 125
|
|
|
|
|
|
|
|
|
|
|
Wei Nie, Bob Zhang and Shuping Zhao
Hyperspectral hand biometrics, which combines hyperspectral techniques and hand traits is a potential application in high-security scenarios. Based on adjusting image acutance, the discriminative local features were extracted from hyperspectral dorsal ha...
ver más
|
|
|
|
|
|
|
|
|
|
|
Frantisek Hortai
Pág. 3 - 18
-
|
|
|
|
|
|
|
|
|
|
|
Mary Grace Galterio, Simi Angelic Shavit and Thaier Hayajneh
-
|
|
|
|
|
|
|
|
|
|
|
Sebastián Becker, Romina Garrido
El presente trabajo realiza una descripción sobre la biometría y cómo funciona esta para verificar e identificar a las personas. Junto con ello, realiza un análisis sobre la naturaleza jurídica de la biometría a través de pautas de derecho comparado, des...
ver más
|
|
|
|
|
|
|
|
|
|
|
S. Altan Erdem
While it is a rather common business practice, Internet marketing is still an area that continues to evolve and adapt. One of the everlasting challenges associated with this field is being able to insure that the online transactions take place in a secur...
ver más
|
|
|
|
|
|
|
|
|
|
|
Catalin Lupu
Pág. 368 - 377
|
|
|
|
|
|
|
|
|
|
|
Alonso Barrios Trilleras, Ana Milena Lopez Aguirre, Victor Manuel Nieto Rodriguez
Pág. 137 - 149
ResumenDescargasReferenciasCómo citar
|
|
|
|
|
|
|
|
|
|
|
Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho and Mohamed S. Abdallah
Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. Their importance resides in their capacity to ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Maria Louro da Silva, Carolina Gouveia, Daniel Filipe Albuquerque and Hugo Plácido da Silva
Bio-Radar (BR) systems have shown great promise for biometric applications. Conventional methods can be forged, or fooled. Even alternative methods intrinsic to the user, such as the Electrocardiogram (ECG), present drawbacks as they require contact with...
ver más
|
|
|
|
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
|
|
|
|
Juan Carlos Atenco, Juan Carlos Moreno and Juan Manuel Ramirez
In this work we present a bimodal multitask network for audiovisual biometric recognition. The proposed network performs the fusion of features extracted from face and speech data through a weighted sum to jointly optimize the contribution of each modali...
ver más
|
|
|
|
|
|