A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Biometric Authentication Using Fused Multimodal Biometric
2016
Procedia Computer Science
The proposed enhanced multimodal authentication system is based on feature extraction(using fingerprint, retina and fingervein) and key generation (using RSA). ...
The experimental evaluation implemented using MATLAB 2014, illustrates the significance improvement in the performance of multimodal biometrics with RSA have GAR of 95.3% and FAR of 0.01%. ...
An image of the fingerprint is captured by an optical scanner, enhanced, and converted into a template as shown in Fig.2(b) . ...
doi:10.1016/j.procs.2016.05.187
fatcat:najtvm4zxbe73km74irsgzhtr4
Multimodal Biometrics for Person Authentication using Hand Image
2013
International Journal of Computer Applications
To obtain secure and accurate authentication system using most accepted biometrics Hand geometry in multimodal approach. ...
In this proposed method Hand geometry and selected window size palm print features computed from same image is used for authentication. Integrating the features increases robustness of the system. ...
Two different levels of fusion are applied for authentication such as score level fusion for the five finger surface features and decision level fusion for various modalities, based on the majority vote ...
doi:10.5120/12218-8400
fatcat:o7qb2ae6mzh3lbbjbusbuojvki
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
2012
International Journal of Computer Applications
Multimodal system is developed through fusion of face and fingerprint recognition. The result is significantly improved by using multimodal biometric authentication. ...
This paper suggests the multimodal biometrics system for identity verification using two traits: face and fingerprint. ...
1%
14.45% 3.6%
1.53%
0.1%
41.32% 6.9%
4.30%
0.01%
62.5%
9.4%
6.6%
0.001%
66.27% 15.2%
10.33%
Table 6 : 6 FRR Vs FAR in a Multimodal Biometric Authentication System ...
doi:10.5120/8132-1736
fatcat:ny3nmu3jfrgzfdfhl5pgofoznq
Combining Biometric Evidence for Person Authentication
[chapter]
2005
Lecture Notes in Computer Science
In particular, fingerprint and speech based systems will serve as illustration. A signal adaptive supervisor based on the input biometric signal quality is evaluated. ...
Humans are excellent experts in person recognition and yet they do not perform excessively well in recognizing others only based on one modality such as single facial image. ...
Only the index fingers of the first 75 users in the database are used in the experiments. 10 print samples (optical scanner) per user are selected, 3 of them (each one from a different level of control ...
doi:10.1007/11493648_1
fatcat:4fge63alsjcp3oqoy5ccvpw6cm
Signature-Based Biometric Authentication
[chapter]
2014
Studies in Computational Intelligence
In a modern, civilized and advanced society, reliable authentication and authorization of individuals are becoming more essential tasks in several aspects of daily activities and as well as many different ...
In the last few years, substantial efforts have been devoted to the development of biometric-based authentication systems. ...
[10] fingerprint recognition or fingerprint authentication refers to the automated technique of verifying a match between two individual fingerprints [10] . ...
doi:10.1007/978-3-319-05885-6_13
fatcat:g5qrfp47cng3tlgeaa62ddcuqm
Mobile Behavioral Biometrics for Passive Authentication
[article]
2022
arXiv
pre-print
Current mobile user authentication systems based on PIN codes, fingerprint, and face recognition have several shortcomings. ...
In all cases, the fusion of modalities is very beneficial, leading to Equal Error Rates (EER) ranging from 4% to 9% depending on the modality combination in a 3-second interval. ...
In such case, users would in fact have to repeatedly interrupt their activity to carry out the authentication process, for instance by placing their fingertip on the dedicated scanner or by typing in their ...
arXiv:2203.07300v1
fatcat:z2wu5ayjpvcn3owggoh6drbd2e
Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN]
2017
International Journal of Applied Information Systems
This paper considers a multi-biometric system involving a combination of three biometric traits: iris, fingerprint and face in order to make authentication cheaper and more reliable. ...
Fusion of outputs from face, fingerprint and iris recognition systems is done at decision level using AND operation. ...
This is shown in Table 2 .
Evaluation Two types of evaluation are considered: System Performance Evaluation and Recognition Performance Evaluation. ...
doi:10.5120/ijais2017451699
fatcat:5x73mduy6rcb5b33y4ldfvu37q
Continuous Authentication with Keystroke Dynamics
[chapter]
English
2015
Gate to Computer Science and Research
English
The continuous authentication system will lock out a user if the trust in genuineness of the current user is too low. ...
We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the results in a new manner. ...
This implies that a CA system does not depend on specific activities of the user, e.g. a CA system cannot be based on providing a fingerprint because that requires the user to present his finger to a fingerprint ...
doi:10.15579/gcsr.vol2.ch3
fatcat:xnosjqjxife6fmxmyz3jz274me
Deep Learning Based Person Authentication System using Fingerprint and Brain Wave
2024
International Journal of Computing and Digital Systems
In this innovative system, we leverage a combination of brainwave signals and fingerprint images to enhance security. ...
This fusion results in an algorithm that effectively fine-tunes the DMN for optimal performance. ...
to its high accuracy, affordability, and portability of fingerprint scanners, leading to numerous applications [7] . ...
doi:10.12785/ijcds/150153
fatcat:eokyqcpjg5c25iolgi2rhy7he4
Biometric Matching and Fusion System for Fingerprints from Non-Distal Phalanges
[article]
2015
arXiv
pre-print
, and (iii) phalanx-type-based fusion. ...
Utilizing a medium-size (50 individuals, 400 unique fingers, 1600 distinct images) database collected in our laboratory with a commercial optical fingerprint sensor, and a commercial minutiae extractor ...
With projected further increases in (i) world population, and percentage of As our results indicate, multifinger (e.g. two fingers) fusion of sequentially obtained non-distal phalanges lead to authentication ...
arXiv:1505.04028v2
fatcat:nyruayfimrgslfl74vs5gros5y
Towards Usable and Secure Location-based Smartphone Authentication
2021
Symposium On Usable Privacy and Security
To date, however, not much research has been conducted on investigating security and usability requirements for designing such location-based authentication services. ...
Two participants mentioned "no support for fingerprint scanner." Only one participant mentioned battery drain as the reason. Intentions for future use. ...
In this paper, we implemented a fully working indoor location-based authentication solution that does not require special hardware or a fingerprinted wireless signal map. Mehrabi et al. ...
dblp:conf/soups/ChoKHKLK21
fatcat:de5owmzntzdkjnyoygbl7jfau4
Assessment on Extraction and Matching of Finger Vein and Iris Pattern based Authentication System
2020
International journal of recent technology and engineering
The finger vein pattern acquired under infrared light is used to design an accurate personal authentication system. ...
The vein pattern is hidden inside the body and hence the problem of forgery in vein is consequently reduced when compared to fingerprint. ...
The various steps involved in iris recognition Iris-recognition-scanners-vs-fingerprint-scanners
IV. ...
doi:10.35940/ijrte.e6642.018520
fatcat:itnhlad3xrd5vf6eaw53ida55u
Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015
2017
Image and Vision Computing
Fingerprints Part 2 has held steady at two submissions each competition in 2011 and 2013 and only one for the 2015 edition. ...
system to determine if a biometric measure is authentic. ...
LivDet 2013 Consensual vs. ...
doi:10.1016/j.imavis.2016.07.002
fatcat:5gry7e7crjcpzorsr6uvx2ozfe
BioPay: A Secure Payment Gateway through Biometrics
2021
Zenodo
two main components, face recognition and fingerprint authentication that is required to be registered in the bank one time, so that registered data can be used as reference data during account fetching ...
So, in the Second stage detected face is recognized by the fusion of Principle Component Analysis (PCA), Artificial Neural Network (ANN). It provides better accuracy in the face recognition system. ...
doi:10.5281/zenodo.5224633
fatcat:nahwaw4e4je67mga55oryes64y
Fingerprint Recognition
[chapter]
2009
Guide to Biometric Reference Systems and Performance Evaluation
Two research systems are compared within the proposed framework. The evaluated systems follow different approaches for fingerprint processing and are discussed in detail. ...
First, an overview of the state of the art in fingerprint recognition is presented, including current issues and challenges. Fingerprint databases and evaluation campaigns, are also summarized. ...
Fig. 4 .1) are: a) fingerprint sensing, in which the fingerprint of an individual is acquired by a fingerprint scanner to produce a raw digital representation; b) preprocessing, in which the input fingerprint ...
doi:10.1007/978-1-84800-292-0_4
fatcat:x3a7z7nd2reulgwgwjbdyqpl2a
« Previous
Showing results 1 — 15 out of 185 results