[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Walia et al., 2019 - Google Patents

Secure multimodal biometric system based on diffused graphs and optimal score fusion

Walia et al., 2019

View PDF @Full View
Document ID
325328502312813053
Author
Walia G
Rishi S
Asthana R
Kumar A
Gupta A
Publication year
Publication venue
IET Biometrics

External Links

Snippet

Biometric authentication systems offer potential advantages over traditional knowledge‐ based methods. However, most of the biometric systems which are extensively used lack template security and robustness. In order to address these issues, in this study, the authors …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Similar Documents

Publication Publication Date Title
Walia et al. Secure multimodal biometric system based on diffused graphs and optimal score fusion
Hezil et al. Multimodal biometric recognition using human ear and palmprint
Veluchamy et al. System for multimodal biometric recognition based on finger knuckle and finger vein using feature‐level fusion and k‐support vector machine classifier
Khan et al. Iris Recognition Using Image Moments and k‐Means Algorithm
Heidari et al. Biometric authentication using a deep learning approach based on different level fusion of finger knuckle print and fingernail
Ammour et al. Face–iris multi‐modal biometric system using multi‐resolution Log‐Gabor filter with spectral regression kernel discriminant analysis
Kacar et al. ScoreNet: deep cascade score level fusion for unconstrained ear recognition
Dwivedi et al. Score-level fusion for cancelable multi-biometric verification
Gumaei et al. An improved multispectral palmprint recognition system using autoencoder with regularized extreme learning machine
Gawande et al. Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques
Omar et al. Deep finger texture learning for verifying people
Chen et al. Combining fractional‐order edge detection and chaos synchronisation classifier for fingerprint identification
Mandasari et al. Score calibration in face recognition
Al‐Nima et al. Personal verification<? show [AQ ID= Q1]?> based on multi‐spectral finger texture lighting images
Eskandari et al. Optimum scheme selection for face–iris biometric
Gomez‐Barrero et al. Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Eskandari et al. Effect of face and ocular multimodal biometric systems on gender classification
Chen et al. Explainable AI: a multispectral palm-vein identification system with new augmentation features
Gona et al. Transfer learning convolutional neural network with modified Lion optimization for multimodal biometric system
Tomar et al. Cascade‐based Multimodal Biometric Recognition System with Fingerprint and Face
González‐Soler et al. Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors
Rajalakshmi et al. A multimodal architecture using Adapt‐HKFCT segmentation and feature‐based chaos integrated deep neural networks (Chaos‐DNN‐SPOA) for contactless biometricpalm vein recognition system
Kar et al. A hybrid feature descriptor with Jaya optimised least squares SVM for facial expression recognition
Diarra et al. Study of deep learning methods for fingerprint recognition
Alsharman et al. Pattern mathematical model for fingerprint security using bifurcation minutiae extraction and neural network feature selection