User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …
to enjoy the anytime and anywhere various applications such as the online shopping …
A survey on gait recognition via wearable sensors
MD Marsico, A Mecca - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Gait is a biometric trait that can allow user authentication, though it is classified as a “soft”
one due to a certain lack in permanence and to sensibility to specific conditions. The earliest …
one due to a certain lack in permanence and to sensibility to specific conditions. The earliest …
Fingerprint classification and identification algorithms for criminal investigation: A survey
Fingerprint plays a fundamental role in community security and criminal investigation, such
as forensic investigation, law enforcement, customs access and public security organs. This …
as forensic investigation, law enforcement, customs access and public security organs. This …
Offloading decision methods for multiple users with structured tasks in edge computing for smart cities
An edge computing system is an emergent architecture for providing computing, storage,
control, and networking abilities, that is an important technology to realize Internet of Things …
control, and networking abilities, that is an important technology to realize Internet of Things …
Velody: Nonlinear vibration challenge-response for resilient user authentication
Biometrics have been widely adopted for enhancing user authentication, benefiting usability
by exploiting pervasive and collectible unique characteristics from physiological or …
by exploiting pervasive and collectible unique characteristics from physiological or …
Recent advances in biometric technology for mobile devices
The prevalent commercial deployment of mobile biometrics as a robust authentication
method on mobile devices has fueled increasingly scientific attention. Motivated by this, in …
method on mobile devices has fueled increasingly scientific attention. Motivated by this, in …
Development of a low-cost microcomputer based vein imaging system
In this study, a low-cost microcomputer based dorsal hand-vein imaging system was
developed by utilizing non-invasive near infrared imaging technology for the patients having …
developed by utilizing non-invasive near infrared imaging technology for the patients having …
Human identity verification from biometric dorsal hand vein images using the DL-GAN method
KM Alashik, R Yildirim - IEEE Access, 2021 - ieeexplore.ieee.org
In this research, biometric authentication, which has been widely used for different purposes
in the last quarter-century, is studied. Dorsal hand veins are used for biometric …
in the last quarter-century, is studied. Dorsal hand veins are used for biometric …
[PDF][PDF] State of the art in vascular biometrics
A Uhl - Handbook of Vascular Biometrics, 2020 - library.oapen.org
The investigation of vascular biometric traits has become increasingly popular during the
last years. This book chapter provides a comprehensive discussion of the respective state of …
last years. This book chapter provides a comprehensive discussion of the respective state of …
A Real‐Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT
M Moradi, M Moradkhani, MB Tavakoli - Journal of Sensors, 2022 - Wiley Online Library
When milliards of smart devices are connected to the Internet using the Internet of Things
(IoT), robust security methods are required to deliver current information to the objects …
(IoT), robust security methods are required to deliver current information to the objects …