The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
A critical survey of the security and privacy aspects of the Aadhaar framework
D Sadhya, T Sahu - Computers & Security, 2024 - Elsevier
Aadhaar is an identification document issued by the Unique Identification Authority of India
(UIDAI) to the residents of India. It contains a 12-digit unique identification number (known …
(UIDAI) to the residents of India. It contains a 12-digit unique identification number (known …
One touch multi-banking transaction ATM system using biometric and GSM authentication
A Taralekar, G Chouhan, R Tangade… - … Conference on Big …, 2017 - ieeexplore.ieee.org
Every individuals has multiple bank accounts in different banks, people's need to carry
multiple ATM cards for transaction, there may be different PINs for every account. In …
multiple ATM cards for transaction, there may be different PINs for every account. In …
Prediction of depression using machine learning and NLP approach
A Mali, RR Sedamkar - … Computing and Networking: Proceedings of IC …, 2022 - Springer
Today, for Internet users, micro-blogging has become a popular networking forum. Millions
of people exchange views on different aspects of their lives. Thus, micro blogging websites …
of people exchange views on different aspects of their lives. Thus, micro blogging websites …
State of the art in biometric key binding and key generation schemes
authentication system and legitimate users to numerous security and privacy challenges.
Biometric cryptosystems or template protection schemes are used to overcome the security …
Biometric cryptosystems or template protection schemes are used to overcome the security …
Secure password-driven fingerprint biometrics authentication
A Razaque, KK Myrzabekovna… - … on Software Defined …, 2020 - ieeexplore.ieee.org
With emergence of latest technology, life of individuals has greatly been improved. On the
other hand, there has been vulnerabilities and loopholes in the technology that exploited the …
other hand, there has been vulnerabilities and loopholes in the technology that exploited the …
[PDF][PDF] Encryption Keys Generation Based on Bio-Cryptography Finger Vein Method
T Trainys, A Venčkauskas - CEUR Workshop Proceedings, 2018 - academia.edu
Bio-cryptography is a field that combines cryptography with biometrics. The use of biometric
methods in cryptography is a widely researched area. The main goal of biocryptography is a …
methods in cryptography is a widely researched area. The main goal of biocryptography is a …
一种新的基于指纹与人脸特征级融合的模糊金库方案
李洵, 游林, 梁家豪, 颜春辉 - 电信科学, 2018 - infocomm-journal.com
针对基于生物特征的模糊金库易受相关攻击导致密钥和生物特征模板丢失以及基于单生物特征
的模糊金库的认证性能不可靠的问题, 提出了一种新的基于指纹与人脸特征级融合的模糊金库 …
的模糊金库的认证性能不可靠的问题, 提出了一种新的基于指纹与人脸特征级融合的模糊金库 …
Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition
The advance of artificial intelligence has stimulated the rapid development of multi-biometric
recognition that recognizes users based on their multiple biometric features. Since biometric …
recognition that recognizes users based on their multiple biometric features. Since biometric …
[PDF][PDF] Prediction of depression using Machine Learning and NLP approach
A Mali, RR Sedamkar - Proceedings of the e-Conference on Data …, 2020 - tcetmumbai.in
Today, for Internet users, micro-blogging has become a popular networking forum. Millions
of people exchange views in different thought of their lives. Thus, micro blogging websites …
of people exchange views in different thought of their lives. Thus, micro blogging websites …