Opportunistic multi-modal user authentication for health-tracking IoT wearables
A Muratyan, W Cheung, SV Dibbo… - The Fifth International …, 2022 - Springer
With the advancement of technologies, market wearables are becoming increasingly
popular with a range of services, including providing access to bank accounts, accessing …
popular with a range of services, including providing access to bank accounts, accessing …
Biometric authentication in health care sector: A survey
The development of technology has affected the performance of the healthcare system
globally. There is no denying the way that security is fundamental in-patient consideration …
globally. There is no denying the way that security is fundamental in-patient consideration …
State of the art and perspectives on traditional and emerging biometrics: A survey
I Traore, M Alshahrani, MS Obaidat - Security and Privacy, 2018 - Wiley Online Library
The last three decades have seen a shift and impressive progress in the biometric
technologies landscape. Several major real‐world applications of biometrics have been …
technologies landscape. Several major real‐world applications of biometrics have been …
Method and apparatus for voice signature authentication
M Moganti, A Sankalia - US Patent 9,118,669, 2015 - Google Patents
US9118669B2 - Method and apparatus for voice signature authentication - Google Patents
US9118669B2 - Method and apparatus for voice signature authentication - Google Patents …
US9118669B2 - Method and apparatus for voice signature authentication - Google Patents …
A robust cryptosystem to enhance the security in speech based person authentication
R Nagakrishnan, A Revathi - Multimedia tools and applications, 2020 - Springer
The developments in technology have made us utilizing speech as a biometric to
authenticate persons. In this paper, speech encryption and decryption algorithm are …
authenticate persons. In this paper, speech encryption and decryption algorithm are …
Evaluating the performance of speaker recognition solutions in e-commerce applications
Two important tasks in many e-commerce applications are identity verification of the user
accessing the system and determining the level of rights that the user has for accessing and …
accessing the system and determining the level of rights that the user has for accessing and …
A video-based biometric authentication for e-Learning web applications
BE Penteado, AN Marana - … Conference, ICEIS 2009, Milan, Italy, May 6 …, 2009 - Springer
In the last years there was an exponential growth in the offering of Web-enabled distance
courses and in the number of enrolments in corporate and higher education using this …
courses and in the number of enrolments in corporate and higher education using this …
A review on noisy password, voiceprint biometric and one-time-password
KK Kumbhare, KV Warkar - Procedia Computer Science, 2016 - Elsevier
In this paper, we review the Noisy password, Voiceprint biometric and One-Time-Password.
The most common method used for authentication is static passwords. The traditional …
The most common method used for authentication is static passwords. The traditional …
Mobil Cihazlarda Biyometrik Sistemler Üzerine Bir İnceleme
B Arslan, Ş Sağıroğlu - Politeknik Dergisi, 2016 - dergipark.org.tr
Mobil cihazların kullanımlarındaki artış, bu cihazların farklı kullanım alanlarının oluşmasına
sebep olmuştur. Bu alanlarından biri de mobil cihazlarda kullanılan biyometrik sistemler ve …
sebep olmuştur. Bu alanlarından biri de mobil cihazlarda kullanılan biyometrik sistemler ve …