Wesley et al., 2023 - Google Patents
Authentication-based multimodal biometric system using exponential water wave optimization algorithmWesley et al., 2023
- Document ID
- 1546490560820477709
- Author
- Wesley A
- et al.
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
The biometric system relies on a single biometric identifier which could not meet the desired performance required for personal identification. Hence, identification based on the multimodal biometric system is emerged in the research community to achieve the personal …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6261—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mohsin et al. | Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures | |
Chin et al. | High security iris verification system based on random secret integration | |
Kumar et al. | Privacy preserving security using biometrics in cloud computing | |
Tulyakov et al. | Symmetric hash functions for secure fingerprint biometric systems | |
Saini et al. | Face and palmprint multimodal biometric systems using Gabor–Wigner transform as feature extraction | |
Gayathri et al. | Novel framework for multimodal biometric image authentication using visual share neural network | |
Wesley | Authentication-based multimodal biometric system using exponential water wave optimization algorithm | |
Ali et al. | Polynomial vault: A secure and robust fingerprint based authentication | |
Gayathri et al. | A review on various biometric techniques, its features, methods, security issues and application areas | |
Ramya et al. | A comparative analysis of similarity distance measure functions for biocryptic authentication in cloud databases | |
Aftab et al. | Hand-based multibiometric systems: state-of-the-art and future challenges | |
Patil et al. | Multi-modal biometric system using finger knuckle image and retina image with template security using PolyU and DRIVE database | |
Ramasamy et al. | Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application | |
Yang et al. | Two novel style-transfer palmprint reconstruction attacks | |
Ghani et al. | Toward robust and privacy-enhanced facial recognition: A decentralized blockchain-based approach with GANs and deep learning | |
Asthana et al. | Random area-perimeter method for generation of unimodal and multimodal cancelable biometric templates | |
Singla et al. | Performance Analysis of Authentication System: A Systematic Literature Review | |
Gayathri et al. | Fisher-yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication | |
Kong | Palmprint identification based on generalization of iriscode | |
Khallaf et al. | Implementation of quaternion mathematics for biometric security | |
Siddhad et al. | Cancelable biometric template generation using convolutional autoencoder | |
Singla et al. | Performance analysis of authentication system: A systematic literature review | |
Ashiba et al. | Proposed homomorphic DWT for cancelable palmprint recognition technique | |
Galbally et al. | Iris image reconstruction from binary templates | |
Ajay Siddharth et al. | Palm print and palm vein biometric authentication system |