Biometric authentication in health care sector: A survey

K Fatima, S Nawaz, S Mehrban - … International Conference on …, 2019 - ieeexplore.ieee.org
The development of technology has affected the performance of the healthcare system
globally. There is no denying the way that security is fundamental in-patient consideration …

How far did we get in face spoofing detection?

L Souza, L Oliveira, M Pamplona, J Papa - Engineering Applications of …, 2018 - Elsevier
The growing use of control access systems based on face recognition shed light over the
need for even more accurate systems to detect face spoofing attacks. In this paper, an …

Biometric privacy through hand geometry-a survey

K Přihodová, M Hub - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Reliable authentication is a key factor in ensuring data security. Information systems
requiring a high level of data security do not use passwords that are considered to be too …

A study of users' compliance and satisfied utilization of biometric application system

T Habibu, ET Luhanga, AE Sam - Information Security Journal: A …, 2021 - Taylor & Francis
Currently, the adoption rate of biometric technology has speedily grown in all applications.
The technology is considered as an effective measure for the protection against crime …

Towards a secure online E-voting protocol based on palmprint features

A Meraoumia, H Bendjenna… - 2018 3rd International …, 2018 - ieeexplore.ieee.org
Nowadays, internet becomes very vital for any kind of information exchange. One of
application which can uses internet for information exchange is the electronic voting (e …

Door knob hand recognition system

X Qu, D Zhang, G Lu, Z Guo - IEEE Transactions on Systems …, 2016 - ieeexplore.ieee.org
Biometric applications have been used globally in everyday life. However, conventional
biometrics is created and optimized for high-security scenarios. Being used in daily life by …

Automatic access control based on face and hand biometrics in a non-cooperative context

MNS Jahromi, MB Bonderup… - 2018 IEEE Winter …, 2018 - ieeexplore.ieee.org
Automatic access control systems (ACS) based on the human biometrics or physical tokens
are widely employed in public and private areas. Yet these systems, in their conventional …

Influence of Standalone and Ensemble Classifiers in Face Spoofing Detection using LBP and CNN Models

M Prasad, S Jain, P Bhanodia, A Priya - European Journal of Electrical …, 2024 - ejece.org
Background: Artificial intelligence has made significant contributions to facial recognition
and biometric identification and is now being employed in a range of applications. Detecting …

Door Knob Hand Recognition System

D Zhang, G Lu, L Zhang, D Zhang, G Lu, L Zhang - Advanced Biometrics, 2018 - Springer
Biometric applications have been used globally in everyday life. However, conventional
biometrics is created and optimized for high security scenarios. Being used in daily life by …

[引用][C] Multi Biometrics: Overview and User Perception Survey

HS Mahour, H Makwana - International Journal of Science and Research (IJSR), 2015