Walia et al., 2019 - Google Patents
Secure multimodal biometric system based on diffused graphs and optimal score fusionWalia et al., 2019
View PDF- Document ID
- 325328502312813053
- Author
- Walia G
- Rishi S
- Asthana R
- Kumar A
- Gupta A
- Publication year
- Publication venue
- IET Biometrics
External Links
Snippet
Biometric authentication systems offer potential advantages over traditional knowledge‐ based methods. However, most of the biometric systems which are extensively used lack template security and robustness. In order to address these issues, in this study, the authors …
- 230000004927 fusion 0 title abstract description 83
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Walia et al. | Secure multimodal biometric system based on diffused graphs and optimal score fusion | |
Hezil et al. | Multimodal biometric recognition using human ear and palmprint | |
Veluchamy et al. | System for multimodal biometric recognition based on finger knuckle and finger vein using feature‐level fusion and k‐support vector machine classifier | |
Khan et al. | Iris Recognition Using Image Moments and k‐Means Algorithm | |
Heidari et al. | Biometric authentication using a deep learning approach based on different level fusion of finger knuckle print and fingernail | |
Ammour et al. | Face–iris multi‐modal biometric system using multi‐resolution Log‐Gabor filter with spectral regression kernel discriminant analysis | |
Kacar et al. | ScoreNet: deep cascade score level fusion for unconstrained ear recognition | |
Dwivedi et al. | Score-level fusion for cancelable multi-biometric verification | |
Gumaei et al. | An improved multispectral palmprint recognition system using autoencoder with regularized extreme learning machine | |
Gawande et al. | Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques | |
Omar et al. | Deep finger texture learning for verifying people | |
Chen et al. | Combining fractional‐order edge detection and chaos synchronisation classifier for fingerprint identification | |
Mandasari et al. | Score calibration in face recognition | |
Al‐Nima et al. | Personal verification<? show [AQ ID= Q1]?> based on multi‐spectral finger texture lighting images | |
Eskandari et al. | Optimum scheme selection for face–iris biometric | |
Gomez‐Barrero et al. | Predicting the vulnerability of biometric systems to attacks based on morphed biometric information | |
Eskandari et al. | Effect of face and ocular multimodal biometric systems on gender classification | |
Chen et al. | Explainable AI: a multispectral palm-vein identification system with new augmentation features | |
Gona et al. | Transfer learning convolutional neural network with modified Lion optimization for multimodal biometric system | |
Tomar et al. | Cascade‐based Multimodal Biometric Recognition System with Fingerprint and Face | |
González‐Soler et al. | Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors | |
Rajalakshmi et al. | A multimodal architecture using Adapt‐HKFCT segmentation and feature‐based chaos integrated deep neural networks (Chaos‐DNN‐SPOA) for contactless biometricpalm vein recognition system | |
Kar et al. | A hybrid feature descriptor with Jaya optimised least squares SVM for facial expression recognition | |
Diarra et al. | Study of deep learning methods for fingerprint recognition | |
Alsharman et al. | Pattern mathematical model for fingerprint security using bifurcation minutiae extraction and neural network feature selection |