99 Hits in 2.9 sec

Encryption on Multimodal Biometric using Hyper Chaotic Method and Inherent Binding Technique

Nalini M K, Radhika K R
2021 International Journal of Advanced Computer Science and Applications  
User specific features are extracted for both the traits using ResNet 50 convolutional neural network and are fused by addition.  ...  Face and fingerprint biometric templates are subjected to hyper-chaotic map leading to encrypted image. Encrypted image is fed as an input to deoxyribonucleic acid (DNA) sequence.  ...  Several studies confirm that biometric encryption is resistant to multiple attacks and as such is highly recommended for verification and authentication [6] .  ... 
doi:10.14569/ijacsa.2021.0120772 fatcat:otnwstunxzc6fbcyve6xlp3fwi

RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network

Shayan Taheri, Milad Salem, Jiann-Shiun Yuan
2019 Big Data and Cognitive Computing  
The system is examined on the biometric (fingerprint and iris) and the pharmaceutical data (pill image).  ...  data as well as the noisy data are given to the network.  ...  Funding: There is no funding resource for this project. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/bdcc3030043 fatcat:krg4bkbaejfzdadlzqgia6kiey

Research on Face Recognition Classification Based on Improved GoogleNet

Zhigang Yu, Yunyun Dong, Jihong Cheng, Miaomiao Sun, Feng Su, Jian Su
2022 Security and Communication Networks  
First, a new GoogLeNet-M network is proposed, which improves network performance on the basis of streamlining the network.  ...  Finally, it is concluded that the performance of the GoogLeNet-M network is better than other networks on the dataset, and the migration learning method and regularization help to improve the network performance  ...  for identity authentication for a reason because people's faces or fingerprints are unique.  ... 
doi:10.1155/2022/7192306 fatcat:wd3rjusj25bilet3tpvtrmeavu

Compact CNN Models for On-device Ocular-based User Recognition in Mobile Devices [article]

Ali Almadan, Ajita Rattani
2021 arXiv   pre-print
In order to further advance the state-of-the-art, this study for the first time evaluates five neural network pruning methods and compares them with the knowledge distillation method for on-device CNN  ...  Subject-independent analysis on VISOB and UPFR-Periocular datasets suggest the efficacy of layerwise magnitude-based pruning at a compression rate of 8 for mobile ocular-based authentication using ResNet50  ...  Ocular biometrics in the RGB spectrum have been utilized for smartphone-based login authentication by both academia and industry such as EyeVerify Inc.  ... 
arXiv:2110.04953v1 fatcat:5vboiv6l75cz7fvozlpbby4v2e

IrisDenseNet: Robust Iris Segmentation Using Densely Connected Fully Convolutional Networks in the Images by Visible Light and Near-Infrared Light Camera Sensors

Muhammad Arsalan, Rizwan Naqvi, Dong Kim, Phong Nguyen, Muhammad Owais, Kang Park
2018 Sensors  
The recent advancements in computer vision have opened new horizons for deploying biometric recognition algorithms in mobile and handheld devices.  ...  To address the iris segmentation issues in challenging situations by visible light and near-infrared light camera sensors, this paper proposes a densely connected fully convolutional network (IrisDenseNet  ...  The mini-batch size is kept 4 with shuffling for the NICE-II dataset.  ... 
doi:10.3390/s18051501 pmid:29748495 pmcid:PMC5981870 fatcat:cqr5cgq2ujhz5pdfyh63lmgomm

E-cheating Prevention Measures: Detection of Cheating at Online Examinations Using Deep Learning Approach – A Case Study [article]

Leslie Ching Ow Tiong, HeeJeong Jasmine Lee
2021 arXiv   pre-print
The results revealed accuracies of 68% for the deep neural network (DNN); 92% for the long-short term memory (LSTM); 95% for the DenseLSTM; and, 86% for the recurrent neural network (RNN).  ...  We have utilised an e-cheating intelligence agent as a mechanism for detecting the practices of online cheating, which is composed of two major modules: the internet protocol (IP) detector and the behaviour  ...  [22] suggested that the combination of facial recognition and keystroke dynamics could be the best classifiers for behavioural-based biometric authentication. In similar a study, Ghizlane et al.  ... 
arXiv:2101.09841v1 fatcat:iapzajbsjrcsrfdcsxxpuehoxy

2020 Index IEEE Transactions on Mobile Computing Vol. 19

2021 IEEE Transactions on Mobile Computing  
Huang, H., +, TMC Dec. 2020 2743-2760 Message authentication BioTouchPass: Handwritten Passwords for Touchscreen Biometrics.  ...  ., +, TMC Jan. 2020 200-216 A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles.  ... 
doi:10.1109/tmc.2020.3036773 fatcat:6puiux5lp5bfvjo47ey7ycwyfu

Thick Data Analytics through Ensemble Techniques: Identifying Personalized EEG Biometrics based on Eye State Prediction

Wadiwala Tejas, Fiaidhi Jinan, Mohammed Sabah
2020 Asia-pacific Journal of Convergent Research Interchange  
The main objective of this paper is to improve the performance of the EEG for biometric authentication using eye blinking brain signals through the use of ensembles techniques.  ...  reason the eye movement have not been considered as a possible solution for a biometric system.  ...  Maintaining Authenticity and Ambiguity For maintaining authenticity and ambiguity, we perform shuffle on our dataset to make sure that there is no order associated with our samples.  ... 
doi:10.47116/apjcri.2020.10.04 fatcat:5s4oiikhrzaxflmjy5ezrvjzse

Audio-Visual Person Recognition Using Deep Convolutional Neural Networks

Mehul Naik, Sagar Vegad, Harsh Patel, Hanqi Zhuang
2017 Journal of Biometrics & Biostatistics  
Among the techniques investigated, developing multi-modal recognition systems using audio and face signals for people authentication holds a promising future due to its ease of use.  ...  In this paper, an efficient audio-visual bimodal recognition system which uses Deep Convolution Neural Networks (CNNs) as a primary model architecture.  ...  Analysis for audio In the experiment, we shuffled the data and divided it into 80% training and 20% testing.  ... 
doi:10.4172/2155-6180.1000377 fatcat:yqms53wzynf7bpky2osbp6sfgi

SIP-SegNet: A Deep Convolutional Encoder-Decoder Network for Joint Semantic Segmentation and Extraction of Sclera, Iris and Pupil based on Periocular Region Suppression [article]

Bilal Hassan, Ramsha Ahmed, Taimur Hassan, Naoufel Werghi
2020 arXiv   pre-print
Finally, the semantic segmentation of sclera, iris and pupil is achieved using the densely connected fully convolutional encoder-decoder network.  ...  The simulation results validate the optimal segmentation of the proposed SIP-SegNet, with the mean f1 scores of 93.35, 95.11 and 96.69 for the sclera, iris and pupil classes respectively.  ...  Acknowledgement We are grateful to Chinese Academy of Sciences Institute of Automation for making their datasets publicly available for research purposes.  ... 
arXiv:2003.00825v1 fatcat:gqsus26nnfccvd5sr6z7pl3ocm

A Performance Evaluation of Classic Convolutional Neural Networks for 2D and 3D Palmprint and Palm Vein Recognition

Wei Jia, Jian Gao, Wei Xia, Yang Zhao, Hai Min, Jing-Ting Lu
2020 International Journal of Automation and Computing  
AbstractPalmprint recognition and palm vein recognition are two emerging biometrics technologies.  ...  A lot of experiments have been carried out in the conditions of different network structures, different learning rates, and different numbers of network layers.  ...  It is well known that biometrics technology is one of the most effective solutions to personal authentication [1] .  ... 
doi:10.1007/s11633-020-1257-9 fatcat:ckstrmaivndodmjvkazxnjo6oa

Two-tiered face verification with low-memory footprint for mobile devices

Rafael Soares Padilha, Fernanda Andalo, Gabriel Bertocco, Waldir Almeida, William Dias, Thiago Resek, Ricardo Torres, Jacques Wainer, Anderson Rocha
2020 IET Biometrics  
Even though knowledge-based procedures are still the main methods to secure the owner's identity, recently biometric traits have been employed for more secure and effortless authentication.  ...  To train a CNN for the verification task, the authors propose a hybrid-image input, which allows the network to process encoded information of a pair of face images.  ...  Several systems use biometric traits to secure the identity of an individual [1] . Among the different biometric modalities, automated face recognition is a very important one [2] .  ... 
doi:10.1049/iet-bmt.2020.0031 fatcat:wjjjngytebb57lq42mkmaktcv4

Human Recognition Using Face in Computed Tomography [article]

Jiuwen Zhu, Hu Han, S. Kevin Zhou
2020 arXiv   pre-print
In this paper, we explore the feasibility of leveraging the faces in 3D CT images as biometric features.  ...  Specifically, we propose an automatic processing pipeline that first detects facial landmarks in 3D for ROI extraction and then generates aligned 2D depth images, which are used for automatic recognition  ...  For example, ECG has been employed in biometric applications [3] . A biometric authentication algorithm by utilizing ECG is proposed to unlock the mobile devices [4] .  ... 
arXiv:2005.14238v1 fatcat:phy25ohevnennaxjbowemofhqa

You Walk, We Authenticate: Lightweight Seamless Authentication based on Gait in Wearable IoT Systems

Pratik Musale, Duin Baek, Nuwan Werellagama, Simon S. Woo, Bong Jun Choi
2019 IEEE Access  
Considering each individual's unique walking pattern, gait, which is the pattern of limb movements during locomotion, can be utilized as a biometric feature for user authentication.  ...  Interestingly, some of these activities exhibit distinct patterns for each individual, which can provide an opportunity to extract useful features for user authentication.  ...  Moreover, only statistical features were considered in user authentication. Enamamu et al. [24] utilized heart rate as a biometric measure for user authentication.  ... 
doi:10.1109/access.2019.2906663 fatcat:3ltqnp4sdrhydh4cznozhv7auu

A Method for Thematic and Structural Visualization of Academic Content

Alexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldan
2017 2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)  
Foreword And when he died, I suddenly realized I wasn't crying for him at all, but for the things he did.  ...  The aim of this thesis is to introduce an alternative to the traditional academic integrity approaches, bridging the anonymity gap, and empowering instructors and academic administrators with new means for  ...  Ana-Elena Guerrero-Roldan-for their guidance throughout this demanding and incredible journey. A special thanks goes to Dr.  ... 
doi:10.1109/icalt.2017.24 dblp:conf/icalt/AmigudADG17 fatcat:voezr7hg6nfcxlubzzgsbnzpi4
« Previous Showing results 1 — 15 out of 99 results