Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

[HTML][HTML] Self-sovereign identity: a systematic review, map** and taxonomy

F Schardong, R Custódio - Sensors, 2022 - mdpi.com
Self-Sovereign Identity (SSI) is an identity model centered on the user. The user maintains
and controls their data in this model. When a service provider requests data from the user …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

[KIRJA][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

General framework to evaluate unlinkability in biometric template protection systems

M Gomez-Barrero, J Galbally… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The wide deployment of biometric recognition systems in the last two decades has raised
privacy concerns regarding the storage and use of biometric data. As a consequence, the …

Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing

Z **, JY Hwang, YL Lai, S Kim… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we propose a ranking-based locality sensitive hashing inspired two-factor
cancelable biometrics, dubbed “Index-of-Max”(IoM) hashing for biometric template …

Cancelable biometrics: a comprehensive survey

Manisha, N Kumar - Artificial Intelligence Review, 2020 - Springer
Biometric recognition is a challenging research field but suffers from privacy and security
concerns. To address this concern, Cancelable Biometrics is suggested in literature in which …

Multi-biometric template protection based on homomorphic encryption

M Gomez-Barrero, E Maiorana, J Galbally, P Campisi… - Pattern Recognition, 2017 - Elsevier
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …

Emotion recognition from body movement

F Ahmed, ASMH Bari, ML Gavrilova - IEEE Access, 2019 - ieeexplore.ieee.org
Automatic emotion recognition from the analysis of body movement has tremendous
potential to revolutionize virtual reality, robotics, behavior modeling, and biometric identity …