A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …
aspects of life. Recognising and identifying particular users is central to delivering the …
Toothsonic: Earable authentication via acoustic toothprint
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …
range of personal applications. The traditional authentication methods hence become less …
Integrated resource management for terrestrial-satellite systems
As data traffic in terrestrial-satellite systems surges, the integration of power allocation for
caching, computing, and communication (3C) has attracted much research attention …
caching, computing, and communication (3C) has attracted much research attention …
[HTML][HTML] Interpol questioned documents review 2019–2022
M Deviterne-Lapeyre, S Ibrahim - Forensic Science International: Synergy, 2023 - Elsevier
The goal of this paper is to provide a comprehensive review of the technical advances and
general areas of research in the field of Forensic Handwriting/Forensic Document …
general areas of research in the field of Forensic Handwriting/Forensic Document …
[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment
D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
A continuous articulatory-gesture-based liveness detection for voice authentication on smart devices
Voice biometrics is drawing increasing attention to user authentication on smart devices.
However, voice biometrics is vulnerable to replay attacks, where adversaries try to spoof …
However, voice biometrics is vulnerable to replay attacks, where adversaries try to spoof …
EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint
Z Wang, Y Wang, J Yang - Proceedings of the ACM on Interactive …, 2024 - dl.acm.org
Ear wearables (earables) are emerging platforms that are broadly adopted in various
applications. There is an increasing demand for robust earables authentication because of …
applications. There is an increasing demand for robust earables authentication because of …
Signature barcodes for online verification
O Alpar - Pattern Recognition, 2022 - Elsevier
As a sub-branch of behavioral biometrics, online signature verification systems deal with
unique signing characteristics, which could be better differentiated by extraction of habitual …
unique signing characteristics, which could be better differentiated by extraction of habitual …
Forgery document detection in information management system using cognitive techniques
M Sirajudeen, R Anitha - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
Manually verifying the authenticity of the physical documents (personal identity card,
certificates, passports, legal documents) increases the administrative overhead and takes a …
certificates, passports, legal documents) increases the administrative overhead and takes a …
[PDF][PDF] Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.
Many organizations have insisted on protecting the cloud server from the outside, although
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …