Adaptive biometric systems: Review and perspectives
With the widespread of computing and mobile devices, authentication using biometrics has
received greater attention. Although biometric systems usually provide good solutions, the …
received greater attention. Although biometric systems usually provide good solutions, the …
A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …
High security user authentication enabled by piezoelectric keystroke dynamics and machine learning
With the rapid development of electric and information technologies, security issues are
becoming a pressing concern. This has given rise to a plethora of authentication techniques …
becoming a pressing concern. This has given rise to a plethora of authentication techniques …
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
Cyber-attacks have spread all over the world to steal information such as trade secrets,
intellectual property and banking data. Facing the danger of the insecurity of saved data …
intellectual property and banking data. Facing the danger of the insecurity of saved data …
Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition
Biometric authentication systems are increasingly considered in different access control
applications. Regarding that users have completely different interactions with these …
applications. Regarding that users have completely different interactions with these …
Exploring Earable-based Passive User Authentication via Interpretable In-ear Breathing Biometrics
As earable devices have become indispensable smart devices in people's lives, earable-
based user authentication has gradually attracted widespread attention. In our work, we …
based user authentication has gradually attracted widespread attention. In our work, we …
Vulnerability of adaptive strategies of keystroke dynamics based authentication against different attack types
The attacks considered for keystroke dynamics study especially adaptive strategies have
commonly treated impersonation attempts known as zero-effort attacks. These attacks are …
commonly treated impersonation attempts known as zero-effort attacks. These attacks are …
[PDF][PDF] Authentification biométrique: comment (ré) concilier sécurité, utilisabilité et respect de la vie privée?
E Cherrier - 2021 - theses.hal.science
Authentification biométrique: comment (ré)concilier sécurité, utilisabilité et respect de la vie
privée? Page 1 HAL Id: tel-03326656 https://theses.hal.science/tel-03326656v2 Submitted on …
privée? Page 1 HAL Id: tel-03326656 https://theses.hal.science/tel-03326656v2 Submitted on …
Deep learning vs hand-crafted features for face recognition under uncontrolled conditions
Facial recognition in degraded conditions has become a very active and widely used area in
several fields such as video surveillance and access control. Indeed, the presence of facial …
several fields such as video surveillance and access control. Indeed, the presence of facial …
Towards engineering reliable keystroke biometrics systems
A Shah - 2020 - search.proquest.com
In this thesis, we argue that most of the work in the literature on behaviouralbased biometric
systems using AI and machine learning is immature and unreliable. Our analysis and …
systems using AI and machine learning is immature and unreliable. Our analysis and …