Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …

An efficient and lightweight method for human ear recognition based on MobileNet

X Xu, Y Liu, S Cao, L Lu - Wireless Communications and …, 2022 - Wiley Online Library
In recent years, biometric recognition patterns have attracted the attention of many
researchers, among which human ears, as a unique and stable biometric feature, have …

Unconstrained ear recognition using transformers

MB Alejo - Jordanian Journal of Computers and Information …, 2021 - search.proquest.com
The advantages of the ears as a means of identification over other biometric modalities
provided an avenue for researchers to conduct biometric recognition studies on state-of-the …

[PDF][PDF] Prototype Sistem Keamanan Pintu Kandang Dan Pemberian Pakan Ternak Puyuh Otomatis Berbasis Mikrokontroler

A Muhaimin, MH Hersyah - J. Chipset, 2022 - pdfs.semanticscholar.org
This research aims to build a system that can maintain the security of the cage, give feed
quail automatically and weigh the weight of the feed by the needs of quail based on the time …

Anti-Fraud Mechanism Based Voting Machine With Three Stage Authentication Methods

J Mohmmad, A Das, M Shahriar… - … on Computer and …, 2023 - ieeexplore.ieee.org
A digital voting system can be the beginning of an effective, transparent, and secure voting
process with the integration of technology into every aspect of our society. This study …

Secure Safes Systems: Combining SSD Face Recognition with One-Time Password Authentication

D Yolanda, R Suwandi, A Anandika… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Safes are specially designed devices for securely storing and protecting documents,
valuables, or money. Typically, safes are equipped with locks or digital combinations to …

A Walk-through type authentication system design via gaze detection and color recognition

B Wu, K Tosa, K Sato - 2022 IEEE Intl Conf on Dependable …, 2022 - ieeexplore.ieee.org
With the development of IoT technology, more and more devices can provide the function of
detecting the user's gaze. Especially, as COVVID-19 spreads around the world, there is a …

Design of biometric system and modeling of machine learning for entering the information system

M Nazarkevych, N Lotoshynska… - 2021 IEEE 16th …, 2021 - ieeexplore.ieee.org
Today on the market there is a stable and significant increase in demand for biometric
access control systems, fingerprints are on the priority lists. Approaches to the recognition of …

A Deep-Learning-Driven Aerial Dialing PIN Code Input Authentication System via Personal Hand Features

J Wang, H Wang, K Sato, B Wu - Electronics, 2025 - mdpi.com
The dialing-type authentication as a common PIN code input system has gained popularity
due to the simple and intuitive design. However, this type of system has the security risk of …

Smart Multi Verification Based Security System

K Balasubramanian, V Karthik, VK Padmanaban - El-Cezeri, 2023 - dergipark.org.tr
In this technologically evolving era, security plays a significant role in preventing different
assets and crimes. This inconsistency developed an innovative idea to improve the level …