Cited By
View all- Kizza JKizza J(2015)AuthenticationGuide to Computer Network Security10.1007/978-1-4471-6654-2_10(205-223)Online publication date: 21-Jan-2015
In any commercial applications, users need a secure model to protect their transactions. The behavioral biometric such as voice and signature is dynamic, naturally involves cognitive experience and controlled by human beings. This could be seen when ...
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various distortions introduced during the acquisition process. An effective approach to account for within-class variations is by capturing multiple ...
The intersubject dependencies of false nonmatch rates were investigated for a minutiae-based biometric authentication process using single enrollment and verification measurements. A large number of genuine comparison scores were subjected to ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in