Time-series based prediction for energy consumption of smart home data using hybrid convolution-recurrent neural network
N Bhoj, RS Bhadoria - Telematics and Informatics, 2022 - Elsevier
The rapid increase in technological development has led to the rise in usage of IoT devices
for monitoring Electrical Energy Consumption. As countries around the world are committing …
for monitoring Electrical Energy Consumption. As countries around the world are committing …
[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey
SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …
software-related or template attacks at different vulnerable points in the biometric …
Rhemat: Robust human ear based multimodal authentication technique
Ear biometrics is a fast-developing field of computer vision that offers several advantages
over existing biometric authentication methods. The performance of the ear is superior to or …
over existing biometric authentication methods. The performance of the ear is superior to or …
Optimized authentication system with high security and privacy
Authentication and privacy play an important role in the present electronic world. Biometrics
and especially fingerprint-based authentication are extremely useful for unlocking doors …
and especially fingerprint-based authentication are extremely useful for unlocking doors …
Image forgery localization using image patches and deep learning
Due to the broad accessibility of camera systems, photographing has grown in popularity.
Photos seem to be significant in our daily lives since they carry a plethora of data, and it is …
Photos seem to be significant in our daily lives since they carry a plethora of data, and it is …
An alignment-free non-invertible transformation-based method for generating the cancellable fingerprint template
Since long time fingerprint has been the most compelling biometric due to its permanence,
universality, acceptability, and collectability. However, fingerprint recognition raises some …
universality, acceptability, and collectability. However, fingerprint recognition raises some …
Cancelable fingerprint template protection based on random quantization and improved bloom filter
Improving privacy and security in biometric systems requires addressing vulnerabilities in
existing cancelable fingerprint templates based on bloom filters. Therefore, we propose …
existing cancelable fingerprint templates based on bloom filters. Therefore, we propose …
A Secure Two-factor Authentication Key Exchange Scheme
Y Han, C Xu, C Jiang, K Chen - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Two-factor authentication key exchange (AKE) is an effective way to strengthen the security
of password-authenticated key exchange. Most two-factor AKE schemes using smart cards …
of password-authenticated key exchange. Most two-factor AKE schemes using smart cards …
A Novel Approach for Securing Fingerprint Biometrics using Local Minutiae Structure
In recent years, fingerprint biometrics for user authentication has increased significantly due
to the numerous advantages over traditional authentication methods like passwords and …
to the numerous advantages over traditional authentication methods like passwords and …
Enhanced authentication system with robust features for the secure user template
Biometrics has evolved into a crucial instrument for a user's authentication in the modern
world. Biometrics is gaining prominence as a method of authentication and is a viable …
world. Biometrics is gaining prominence as a method of authentication and is a viable …