Touchless fingerprint recognition: A survey of recent developments and challenges
S Sreehari, SM Anzar - Computers and Electrical Engineering, 2025 - Elsevier
Touchless biometrics, particularly touchless fingerprint recognition, have gained significant
attention in recent years, with the COVID-19 pandemic accelerating the need for clean and …
attention in recent years, with the COVID-19 pandemic accelerating the need for clean and …
Optimal deployment of face recognition solutions in a heterogeneous IoT platform for secure elderly care applications
Face recognition provides a desirable solution for authentication and surveillance in Internet
of Things platforms for elderly care. However, its inclusion is challenging because of the …
of Things platforms for elderly care. However, its inclusion is challenging because of the …
Biometric Recognition Based on Hand Electromagnetic Scattering at Microwaves
In recent years, the need for secure, reliable, and easy-to-use automatic recognition
approaches has favored the diffusion of biometric systems. Such methods exploit …
approaches has favored the diffusion of biometric systems. Such methods exploit …
Deep insights on processing strata, features and detectors for fingerprint and iris liveness detection techniques
R BR - Multimedia Tools and Applications, 2024 - Springer
Fingerprint and iris traits are used in sensitive applications and so, spoofing them can
impose a serious security threat as well as financial damages. Spoofing is a process of …
impose a serious security threat as well as financial damages. Spoofing is a process of …
Designing Automated Deployment Strategies of Face Recognition Solutions in Heterogeneous IoT Platforms
In this paper, we tackle the problem of deploying face recognition (FR) solutions in
heterogeneous Internet of Things (IoT) platforms. The main challenges are the optimal …
heterogeneous Internet of Things (IoT) platforms. The main challenges are the optimal …
Survey of Face Liveness Detection for Unsupervised Locations
D Apgar, MR Abid - 2021 IEEE 12th Annual Information …, 2021 - ieeexplore.ieee.org
Spoofing attacks represent a major threat to facial recognition systems. There are many
types of attacks that can be carried out, ranging from 2D photo attacks to 3D mask attacks …
types of attacks that can be carried out, ranging from 2D photo attacks to 3D mask attacks …
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Y Mirsky - arXiv preprint arXiv:2208.08524, 2022 - arxiv.org
Social engineering (SE) is a form of deception that aims to trick people into giving access to
data, information, networks and even money. For decades SE has been a key method for …
data, information, networks and even money. For decades SE has been a key method for …
A Novel Deep Learning-Based Method for Real-Time Face Spoof Detection
Abstract Facial-based Commercial Off-The-Shelf (COTS) systems increase the success rate
of spoof attacks to 70% detection accuracy. A spoof attack uses an image, video, or 3D …
of spoof attacks to 70% detection accuracy. A spoof attack uses an image, video, or 3D …
Serial Multimodal Biometrics Authentication and Liveness Detection Using Speech Recognition with Normalized Longest Word Subsequence Method
R Andrian, GP Kusuma - JOIV: International Journal on Informatics …, 2024 - joiv.org
Biometric authentication aims to verify whether an entity matches the claimed identity based
on biometric data. Despite its advantages, vulnerabilities, particularly those related to …
on biometric data. Despite its advantages, vulnerabilities, particularly those related to …
Identification of PPG Measurement Sites Toward Countermeasures Against Biometric Presentation Attacks
In this study, we propose a countermeasure against a presentation attack on a
photoplethysmogram (PPG)-based biometric authentication system. The countermeasure …
photoplethysmogram (PPG)-based biometric authentication system. The countermeasure …