[go: up one dir, main page]

Awad et al., 2024 - Google Patents

AI-powered biometrics for Internet of Things security: A review and future vision

Awad et al., 2024

View PDF
Document ID
14774611960508735161
Author
Awad A
Babu A
Barka E
Shuaib K
Publication year
Publication venue
Journal of Information Security and Applications

External Links

Snippet

Biometrics is a set of advanced technologies that use the physical or behavioral characteristics of individuals to provide reliable access control. With the rapid development in information and communication technology, biometrics has become an increasingly …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition

Similar Documents

Publication Publication Date Title
Awad et al. AI-powered biometrics for Internet of Things security: A review and future vision
Liang et al. Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective
Mosenia et al. CABA: Continuous authentication based on BioAura
Dahia et al. Continuous authentication using biometrics: An advanced review
Mohsin et al. Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures
Amin et al. Biometric and traditional mobile authentication techniques: Overviews and open issues
Suresh et al. Contemporary survey on effectiveness of machine and deep learning techniques for cyber security
Wells et al. Privacy and biometrics for smart healthcare systems: attacks, and techniques
Kaiwartya et al. An Investigation on Biometric Internet Security.
Tiwari et al. Emerging Biometric Modalities and Integration Challenges
Mukkamala et al. Leveraging AI And Big Data For Enhanced Security In Biometric Authentication: A Comprehensive Model For Digital Payments
Ayeswarya et al. A comprehensive review on secure biometric-based continuous authentication and user profiling
Sujatha et al. Multimodal biometric algorithm using iris, finger vein, finger print with hybrid ga, pso for authentication
Pahuja et al. Multimodal biometric authentication: A review
Singla et al. Performance Analysis of Authentication System: A Systematic Literature Review
Kaur et al. Blockchain-based secure storage model for multimodal biometrics using 3D face and ear
Choras Ear Biometrics.
Borra et al. Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security
Rayani et al. Continuous gait authentication against unauthorized smartphone access through Naïve Bayes classifier
Hernández-Álvarez et al. Biometrics and artificial intelligence: Attacks and challenges
Smith-Creasey Continuous Biometric Authentication Systems: An Overview
Zhu et al. AI-assisted authentication: state of the art, taxonomy and future roadmap
Singh et al. Enhancing Healthcare Security Using IoT-Enabled with Continuous Authentication Using Deep Learning
Thakur et al. Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime Investigations
Singla et al. Cyber Synergy