Touchless fingerprint recognition: A survey of recent developments and challenges

S Sreehari, SM Anzar - Computers and Electrical Engineering, 2025 - Elsevier
Touchless biometrics, particularly touchless fingerprint recognition, have gained significant
attention in recent years, with the COVID-19 pandemic accelerating the need for clean and …

Optimal deployment of face recognition solutions in a heterogeneous IoT platform for secure elderly care applications

U Elordi, A Bertelsen, L Unzueta, N Aranjuelo… - Procedia Computer …, 2021 - Elsevier
Face recognition provides a desirable solution for authentication and surveillance in Internet
of Things platforms for elderly care. However, its inclusion is challenging because of the …

Biometric Recognition Based on Hand Electromagnetic Scattering at Microwaves

E Maiorana, D Ramaccia, L Stefanini… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In recent years, the need for secure, reliable, and easy-to-use automatic recognition
approaches has favored the diffusion of biometric systems. Such methods exploit …

Deep insights on processing strata, features and detectors for fingerprint and iris liveness detection techniques

R BR - Multimedia Tools and Applications, 2024 - Springer
Fingerprint and iris traits are used in sensitive applications and so, spoofing them can
impose a serious security threat as well as financial damages. Spoofing is a process of …

Designing Automated Deployment Strategies of Face Recognition Solutions in Heterogeneous IoT Platforms

U Elordi, C Lunerti, L Unzueta, J Goenetxea… - Information, 2021 - mdpi.com
In this paper, we tackle the problem of deploying face recognition (FR) solutions in
heterogeneous Internet of Things (IoT) platforms. The main challenges are the optimal …

Survey of Face Liveness Detection for Unsupervised Locations

D Apgar, MR Abid - 2021 IEEE 12th Annual Information …, 2021 - ieeexplore.ieee.org
Spoofing attacks represent a major threat to facial recognition systems. There are many
types of attacks that can be carried out, ranging from 2D photo attacks to 3D mask attacks …

DF-Captcha: A Deepfake Captcha for Preventing Fake Calls

Y Mirsky - arXiv preprint arXiv:2208.08524, 2022 - arxiv.org
Social engineering (SE) is a form of deception that aims to trick people into giving access to
data, information, networks and even money. For decades SE has been a key method for …

A Novel Deep Learning-Based Method for Real-Time Face Spoof Detection

MA Malik, T Mazhar, I Haq, T Shahzad, YY Ghadi… - 2023 - researchsquare.com
Abstract Facial-based Commercial Off-The-Shelf (COTS) systems increase the success rate
of spoof attacks to 70% detection accuracy. A spoof attack uses an image, video, or 3D …

Serial Multimodal Biometrics Authentication and Liveness Detection Using Speech Recognition with Normalized Longest Word Subsequence Method

R Andrian, GP Kusuma - JOIV: International Journal on Informatics …, 2024 - joiv.org
Biometric authentication aims to verify whether an entity matches the claimed identity based
on biometric data. Despite its advantages, vulnerabilities, particularly those related to …

Identification of PPG Measurement Sites Toward Countermeasures Against Biometric Presentation Attacks

S Hinatsu, N Matsuda, H Ishizuka, S Ikeda… - IEEE Access, 2022 - ieeexplore.ieee.org
In this study, we propose a countermeasure against a presentation attack on a
photoplethysmogram (PPG)-based biometric authentication system. The countermeasure …