Machine learning in medical applications: A review of state-of-the-art methods

M Shehab, L Abualigah, Q Shambour… - Computers in Biology …, 2022 - Elsevier
Applications of machine learning (ML) methods have been used extensively to solve various
complex challenges in recent years in various application areas, such as medical, financial …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

[KIRJA][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

[KIRJA][B] Handbook of multibiometrics

AA Ross, K Nandakumar, AK Jain - 2006 - books.google.com
Reliable human authentication schemes are of paramount importance in our highly
networked society. Advances in biometrics help address the myriad of problems associated …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

Deep learning approaches for continuous authentication based on activity patterns using mobile sensing

S Mekruksavanich, A Jitpattanakul - Sensors, 2021 - mdpi.com
Smartphones as ubiquitous gadgets are rapidly becoming more intelligent and context-
aware as sensing, networking, and processing capabilities advance. These devices provide …

[PDF][PDF] Biometric authentication: A review

D Bhattacharyya, R Ranjan… - … Journal of u-and e …, 2009 - biometrie-online.net
Advances in the field of Information Technology also make Information Security an
inseparable part of it. In order to deal with security, Authentication plays an important role …

[PDF][PDF] Implementation and benchmarking of perceptual image hash functions

C Zauner - 2010 - phash.org
Due to the ever increasing digitalization, the authentication of multimedia content is
becoming more and more important. Authentication in general means deciding whether an …

Deep speaker embeddings for speaker verification: Review and experimental comparison

M Jakubec, R Jarina, E Lieskovska, P Kasak - Engineering Applications of …, 2024 - Elsevier
The construction of speaker-specific acoustic models for automatic speaker recognition is
almost exclusively based on deep neural network-based speaker embeddings. This work …

An effective approach for iris recognition using phase-based image matching

K Miyazawa, K Ito, T Aoki, K Kobayashi… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
This paper presents an efficient algorithm for iris recognition using phase-based image
matching-an image matching technique using phase components in 2D discrete Fourier …