A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes

S Gupta, C Maple, B Crispo, K Raja, A Yautsiukhin… - Pattern Recognition, 2023 - Elsevier
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …

Toothsonic: Earable authentication via acoustic toothprint

Z Wang, Y Ren, Y Chen, J Yang - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …

Integrated resource management for terrestrial-satellite systems

S Fu, J Gao, L Zhao - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
As data traffic in terrestrial-satellite systems surges, the integration of power allocation for
caching, computing, and communication (3C) has attracted much research attention …

[HTML][HTML] Interpol questioned documents review 2019–2022

M Deviterne-Lapeyre, S Ibrahim - Forensic Science International: Synergy, 2023 - Elsevier
The goal of this paper is to provide a comprehensive review of the technical advances and
general areas of research in the field of Forensic Handwriting/Forensic Document …

[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment

D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …

A continuous articulatory-gesture-based liveness detection for voice authentication on smart devices

L Zhang, S Tan, Y Chen, J Yang - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Voice biometrics is drawing increasing attention to user authentication on smart devices.
However, voice biometrics is vulnerable to replay attacks, where adversaries try to spoof …

EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint

Z Wang, Y Wang, J Yang - Proceedings of the ACM on Interactive …, 2024 - dl.acm.org
Ear wearables (earables) are emerging platforms that are broadly adopted in various
applications. There is an increasing demand for robust earables authentication because of …

Signature barcodes for online verification

O Alpar - Pattern Recognition, 2022 - Elsevier
As a sub-branch of behavioral biometrics, online signature verification systems deal with
unique signing characteristics, which could be better differentiated by extraction of habitual …

Forgery document detection in information management system using cognitive techniques

M Sirajudeen, R Anitha - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
Manually verifying the authenticity of the physical documents (personal identity card,
certificates, passports, legal documents) increases the administrative overhead and takes a …

[PDF][PDF] Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Many organizations have insisted on protecting the cloud server from the outside, although
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …