Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely
used to enhance security in various devices. In the past decade, significant progress has …
used to enhance security in various devices. In the past decade, significant progress has …
Iris liveness detection for biometric authentication: A systematic literature review and future directions
Biometrics is progressively becoming vital due to vulnerabilities of traditional security
systems leading to frequent security breaches. Biometrics is an automated device that …
systems leading to frequent security breaches. Biometrics is an automated device that …
Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by
combining rigorous biological and mathematical concepts to encode original information in …
combining rigorous biological and mathematical concepts to encode original information in …
Cancelable biometric security system based on advanced chaotic maps
HAA El-Hameed, N Ramadan, W El-Shafai… - The Visual …, 2021 - Springer
In recent years, the protection of human biometrics has witnessed an exponential growth.
Fingerprint recognition has been utilized for cell phone authentication, biometric passports …
Fingerprint recognition has been utilized for cell phone authentication, biometric passports …
An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment
Digital images are being frequently used for diagnosis in clinics today. Diagnostic images
with identifying patient data are stored and transmitted across open networks. Security …
with identifying patient data are stored and transmitted across open networks. Security …
A complex network-based approach for security and governance in the smart green city
Interest in smart green cities is growing, and IoT is an underlying driver of this trend. The
integration of IoT in smart cities has altered the manner of working and living of society. IoT …
integration of IoT in smart cities has altered the manner of working and living of society. IoT …
Detection of iris presentation attacks using hybridization of discrete cosine transform and haar transform with machine learning classifiers and ensembles
Iris biometric identification allows for contactless authentication, which helps to avoid the
transmission of diseases like COVID-19. Biometric systems become unstable and …
transmission of diseases like COVID-19. Biometric systems become unstable and …
Role of genetic algorithm in optimization of Hindi word sense disambiguation
The Word Sense Disambiguation system is widely used in many fields, including business,
research, education, and government organizations. The availability of natural language …
research, education, and government organizations. The availability of natural language …
White blood cell image analysis for infection detection based on virtual hexagonal trellis (VHT) by using deep learning
White blood cells (WBCs) are an indispensable constituent of the immune system. Efficient
and accurate categorization of WBC is a critical task for disease diagnosis by medical …
and accurate categorization of WBC is a critical task for disease diagnosis by medical …
Replication-Based Query Management for Resource Allocation Using Hadoop and MapReduce over Big Data
A Kumar, N Varshney, S Bhatiya… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
We live in an age where everything around us is being created. Data generation rates are so
scary, creating pressure to implement costly and straightforward data storage and recovery …
scary, creating pressure to implement costly and straightforward data storage and recovery …