A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Encryption on Multimodal Biometric using Hyper Chaotic Method and Inherent Binding Technique
2021
International Journal of Advanced Computer Science and Applications
User specific features are extracted for both the traits using ResNet 50 convolutional neural network and are fused by addition. ...
Face and fingerprint biometric templates are subjected to hyper-chaotic map leading to encrypted image. Encrypted image is fed as an input to deoxyribonucleic acid (DNA) sequence. ...
Several studies confirm that biometric encryption is resistant to multiple attacks and as such is highly recommended for verification and authentication [6] . ...
doi:10.14569/ijacsa.2021.0120772
fatcat:otnwstunxzc6fbcyve6xlp3fwi
RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network
2019
Big Data and Cognitive Computing
The system is examined on the biometric (fingerprint and iris) and the pharmaceutical data (pill image). ...
data as well as the noisy data are given to the network. ...
Funding: There is no funding resource for this project.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/bdcc3030043
fatcat:krg4bkbaejfzdadlzqgia6kiey
Research on Face Recognition Classification Based on Improved GoogleNet
2022
Security and Communication Networks
First, a new GoogLeNet-M network is proposed, which improves network performance on the basis of streamlining the network. ...
Finally, it is concluded that the performance of the GoogLeNet-M network is better than other networks on the dataset, and the migration learning method and regularization help to improve the network performance ...
for identity authentication for a reason because people's faces or fingerprints are unique. ...
doi:10.1155/2022/7192306
fatcat:wd3rjusj25bilet3tpvtrmeavu
Compact CNN Models for On-device Ocular-based User Recognition in Mobile Devices
[article]
2021
arXiv
pre-print
In order to further advance the state-of-the-art, this study for the first time evaluates five neural network pruning methods and compares them with the knowledge distillation method for on-device CNN ...
Subject-independent analysis on VISOB and UPFR-Periocular datasets suggest the efficacy of layerwise magnitude-based pruning at a compression rate of 8 for mobile ocular-based authentication using ResNet50 ...
Ocular biometrics in the RGB spectrum have been utilized for smartphone-based login authentication by both academia and industry such as EyeVerify Inc. ...
arXiv:2110.04953v1
fatcat:5vboiv6l75cz7fvozlpbby4v2e
IrisDenseNet: Robust Iris Segmentation Using Densely Connected Fully Convolutional Networks in the Images by Visible Light and Near-Infrared Light Camera Sensors
2018
Sensors
The recent advancements in computer vision have opened new horizons for deploying biometric recognition algorithms in mobile and handheld devices. ...
To address the iris segmentation issues in challenging situations by visible light and near-infrared light camera sensors, this paper proposes a densely connected fully convolutional network (IrisDenseNet ...
The mini-batch size is kept 4 with shuffling for the NICE-II dataset. ...
doi:10.3390/s18051501
pmid:29748495
pmcid:PMC5981870
fatcat:cqr5cgq2ujhz5pdfyh63lmgomm
E-cheating Prevention Measures: Detection of Cheating at Online Examinations Using Deep Learning Approach – A Case Study
[article]
2021
arXiv
pre-print
The results revealed accuracies of 68% for the deep neural network (DNN); 92% for the long-short term memory (LSTM); 95% for the DenseLSTM; and, 86% for the recurrent neural network (RNN). ...
We have utilised an e-cheating intelligence agent as a mechanism for detecting the practices of online cheating, which is composed of two major modules: the internet protocol (IP) detector and the behaviour ...
[22] suggested that the combination of facial recognition and keystroke dynamics could be the best classifiers for behavioural-based biometric authentication. In similar a study, Ghizlane et al. ...
arXiv:2101.09841v1
fatcat:iapzajbsjrcsrfdcsxxpuehoxy
2020 Index IEEE Transactions on Mobile Computing Vol. 19
2021
IEEE Transactions on Mobile Computing
Huang, H., +, TMC Dec. 2020 2743-2760
Message authentication
BioTouchPass: Handwritten Passwords for Touchscreen Biometrics. ...
., +, TMC Jan. 2020 200-216 A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles. ...
doi:10.1109/tmc.2020.3036773
fatcat:6puiux5lp5bfvjo47ey7ycwyfu
Thick Data Analytics through Ensemble Techniques: Identifying Personalized EEG Biometrics based on Eye State Prediction
2020
Asia-pacific Journal of Convergent Research Interchange
The main objective of this paper is to improve the performance of the EEG for biometric authentication using eye blinking brain signals through the use of ensembles techniques. ...
reason the eye movement have not been considered as a possible solution for a biometric system. ...
Maintaining Authenticity and Ambiguity For maintaining authenticity and ambiguity, we perform shuffle on our dataset to make sure that there is no order associated with our samples. ...
doi:10.47116/apjcri.2020.10.04
fatcat:5s4oiikhrzaxflmjy5ezrvjzse
Audio-Visual Person Recognition Using Deep Convolutional Neural Networks
2017
Journal of Biometrics & Biostatistics
Among the techniques investigated, developing multi-modal recognition systems using audio and face signals for people authentication holds a promising future due to its ease of use. ...
In this paper, an efficient audio-visual bimodal recognition system which uses Deep Convolution Neural Networks (CNNs) as a primary model architecture. ...
Analysis for audio In the experiment, we shuffled the data and divided it into 80% training and 20% testing. ...
doi:10.4172/2155-6180.1000377
fatcat:yqms53wzynf7bpky2osbp6sfgi
SIP-SegNet: A Deep Convolutional Encoder-Decoder Network for Joint Semantic Segmentation and Extraction of Sclera, Iris and Pupil based on Periocular Region Suppression
[article]
2020
arXiv
pre-print
Finally, the semantic segmentation of sclera, iris and pupil is achieved using the densely connected fully convolutional encoder-decoder network. ...
The simulation results validate the optimal segmentation of the proposed SIP-SegNet, with the mean f1 scores of 93.35, 95.11 and 96.69 for the sclera, iris and pupil classes respectively. ...
Acknowledgement We are grateful to Chinese Academy of Sciences Institute of Automation for making their datasets publicly available for research purposes. ...
arXiv:2003.00825v1
fatcat:gqsus26nnfccvd5sr6z7pl3ocm
A Performance Evaluation of Classic Convolutional Neural Networks for 2D and 3D Palmprint and Palm Vein Recognition
2020
International Journal of Automation and Computing
AbstractPalmprint recognition and palm vein recognition are two emerging biometrics technologies. ...
A lot of experiments have been carried out in the conditions of different network structures, different learning rates, and different numbers of network layers. ...
It is well known that biometrics technology is one of the most effective solutions to personal authentication [1] . ...
doi:10.1007/s11633-020-1257-9
fatcat:ckstrmaivndodmjvkazxnjo6oa
Two-tiered face verification with low-memory footprint for mobile devices
2020
IET Biometrics
Even though knowledge-based procedures are still the main methods to secure the owner's identity, recently biometric traits have been employed for more secure and effortless authentication. ...
To train a CNN for the verification task, the authors propose a hybrid-image input, which allows the network to process encoded information of a pair of face images. ...
Several systems use biometric traits to secure the identity of an individual [1] . Among the different biometric modalities, automated face recognition is a very important one [2] . ...
doi:10.1049/iet-bmt.2020.0031
fatcat:wjjjngytebb57lq42mkmaktcv4
Human Recognition Using Face in Computed Tomography
[article]
2020
arXiv
pre-print
In this paper, we explore the feasibility of leveraging the faces in 3D CT images as biometric features. ...
Specifically, we propose an automatic processing pipeline that first detects facial landmarks in 3D for ROI extraction and then generates aligned 2D depth images, which are used for automatic recognition ...
For example, ECG has been employed in biometric applications [3] . A biometric authentication algorithm by utilizing ECG is proposed to unlock the mobile devices [4] . ...
arXiv:2005.14238v1
fatcat:phy25ohevnennaxjbowemofhqa
You Walk, We Authenticate: Lightweight Seamless Authentication based on Gait in Wearable IoT Systems
2019
IEEE Access
Considering each individual's unique walking pattern, gait, which is the pattern of limb movements during locomotion, can be utilized as a biometric feature for user authentication. ...
Interestingly, some of these activities exhibit distinct patterns for each individual, which can provide an opportunity to extract useful features for user authentication. ...
Moreover, only statistical features were considered in user authentication. Enamamu et al. [24] utilized heart rate as a biometric measure for user authentication. ...
doi:10.1109/access.2019.2906663
fatcat:3ltqnp4sdrhydh4cznozhv7auu
A Method for Thematic and Structural Visualization of Academic Content
2017
2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)
Foreword And when he died, I suddenly realized I wasn't crying for him at all, but for the things he did. ...
The aim of this thesis is to introduce an alternative to the traditional academic integrity approaches, bridging the anonymity gap, and empowering instructors and academic administrators with new means for ...
Ana-Elena Guerrero-Roldan-for their guidance throughout this demanding and incredible journey. A special thanks goes to Dr. ...
doi:10.1109/icalt.2017.24
dblp:conf/icalt/AmigudADG17
fatcat:voezr7hg6nfcxlubzzgsbnzpi4
« Previous
Showing results 1 — 15 out of 99 results