[go: up one dir, main page]

Wesley et al., 2023 - Google Patents

Authentication-based multimodal biometric system using exponential water wave optimization algorithm

Wesley et al., 2023

Document ID
1546490560820477709
Author
Wesley A
et al.
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

The biometric system relies on a single biometric identifier which could not meet the desired performance required for personal identification. Hence, identification based on the multimodal biometric system is emerged in the research community to achieve the personal …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6261Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Mohsin et al. Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures
Chin et al. High security iris verification system based on random secret integration
Kumar et al. Privacy preserving security using biometrics in cloud computing
Tulyakov et al. Symmetric hash functions for secure fingerprint biometric systems
Saini et al. Face and palmprint multimodal biometric systems using Gabor–Wigner transform as feature extraction
Gayathri et al. Novel framework for multimodal biometric image authentication using visual share neural network
Wesley Authentication-based multimodal biometric system using exponential water wave optimization algorithm
Ali et al. Polynomial vault: A secure and robust fingerprint based authentication
Gayathri et al. A review on various biometric techniques, its features, methods, security issues and application areas
Ramya et al. A comparative analysis of similarity distance measure functions for biocryptic authentication in cloud databases
Aftab et al. Hand-based multibiometric systems: state-of-the-art and future challenges
Patil et al. Multi-modal biometric system using finger knuckle image and retina image with template security using PolyU and DRIVE database
Ramasamy et al. Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application
Yang et al. Two novel style-transfer palmprint reconstruction attacks
Ghani et al. Toward robust and privacy-enhanced facial recognition: A decentralized blockchain-based approach with GANs and deep learning
Asthana et al. Random area-perimeter method for generation of unimodal and multimodal cancelable biometric templates
Singla et al. Performance Analysis of Authentication System: A Systematic Literature Review
Gayathri et al. Fisher-yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication
Kong Palmprint identification based on generalization of iriscode
Khallaf et al. Implementation of quaternion mathematics for biometric security
Siddhad et al. Cancelable biometric template generation using convolutional autoencoder
Singla et al. Performance analysis of authentication system: A systematic literature review
Ashiba et al. Proposed homomorphic DWT for cancelable palmprint recognition technique
Galbally et al. Iris image reconstruction from binary templates
Ajay Siddharth et al. Palm print and palm vein biometric authentication system