Awad et al., 2024 - Google Patents
AI-powered biometrics for Internet of Things security: A review and future visionAwad et al., 2024
View PDF- Document ID
- 14774611960508735161
- Author
- Awad A
- Babu A
- Barka E
- Shuaib K
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
Biometrics is a set of advanced technologies that use the physical or behavioral characteristics of individuals to provide reliable access control. With the rapid development in information and communication technology, biometrics has become an increasingly …
- 238000012552 review 0 title abstract description 82
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Awad et al. | AI-powered biometrics for Internet of Things security: A review and future vision | |
Liang et al. | Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective | |
Mosenia et al. | CABA: Continuous authentication based on BioAura | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
Mohsin et al. | Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures | |
Amin et al. | Biometric and traditional mobile authentication techniques: Overviews and open issues | |
Suresh et al. | Contemporary survey on effectiveness of machine and deep learning techniques for cyber security | |
Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
Kaiwartya et al. | An Investigation on Biometric Internet Security. | |
Tiwari et al. | Emerging Biometric Modalities and Integration Challenges | |
Mukkamala et al. | Leveraging AI And Big Data For Enhanced Security In Biometric Authentication: A Comprehensive Model For Digital Payments | |
Ayeswarya et al. | A comprehensive review on secure biometric-based continuous authentication and user profiling | |
Sujatha et al. | Multimodal biometric algorithm using iris, finger vein, finger print with hybrid ga, pso for authentication | |
Pahuja et al. | Multimodal biometric authentication: A review | |
Singla et al. | Performance Analysis of Authentication System: A Systematic Literature Review | |
Kaur et al. | Blockchain-based secure storage model for multimodal biometrics using 3D face and ear | |
Choras | Ear Biometrics. | |
Borra et al. | Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security | |
Rayani et al. | Continuous gait authentication against unauthorized smartphone access through Naïve Bayes classifier | |
Hernández-Álvarez et al. | Biometrics and artificial intelligence: Attacks and challenges | |
Smith-Creasey | Continuous Biometric Authentication Systems: An Overview | |
Zhu et al. | AI-assisted authentication: state of the art, taxonomy and future roadmap | |
Singh et al. | Enhancing Healthcare Security Using IoT-Enabled with Continuous Authentication Using Deep Learning | |
Thakur et al. | Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime Investigations | |
Singla et al. | Cyber Synergy |