[BOEK][B] Authentication using finger-vein recognition

H Vallabh - 2012 - search.proquest.com
Biometrics is a unique method used to identify humans by distinct biological characterises.
In recent years biometrics are showing up everywhere from homes, workplaces, schools and …

[PDF][PDF] Offline signature verification using feature point extraction

SN Gunjal, BJ Dange… - International Journal of …, 2016 - researchgate.net
Signature verification is one of the most widely used biometrics for authentication. The
objective of the signature verification system is to discriminate between two classes: the …

The relationship between usability and biometric authentication in mobile phones

CG Allen, S Komandur - HCI International 2019-Posters: 21st International …, 2019 - Springer
It is estimated that over 1 billion people are active mobile phone users in 2018. When using
a mobile phone, there are a variety of ways to authenticate and “secure” the device, and …

An identification system using eye detection based on wavelets and neural networks

MA El-Sayed, MA Khafagy - arxiv preprint arxiv:1401.5108, 2014 - arxiv.org
The randomness and uniqueness of human eye patterns is a major breakthrough in the
search for quicker, easier and highly reliable forms of automatic human identification. It is …

Biometrics and Information Security for a Secure Person Identi cation

M KORICHI - 2019 - dspace.univ-ouargla.dz
Secure information systems are critically important to modern day businesses and so-cieties.
From banking systems and medical systems to infrastructures surveillance or an e …

[PDF][PDF] Performance analysis of fingerprint based biometric authentication system using rsa

R Shrivastava, S Thakur - Engineering Universe for Scientific Research …, 2014 - eusrm.com
Biometric information offers a reliable and secure solution to the problem of user
authentication but, biometric systems themselves are vulnerable to a number of attacks. It is …

Acceptance of Biometric Systemsfor User Authentication and Identification

M Dobaibi - 2023 - diva-portal.org
Biometric systems have become increasingly popular for user authentication and
identification across various domains, including smartphones, laptops, financial services …

[PDF][PDF] A Novel Depth based Segmentation Approach for Offline Signature Verification

SN Gunjal, M Lipton, C Agrawal - International Journal of Computer …, 2013 - academia.edu
Signature verification is one of the most widely used biometrics for authentication. The
objective of the signature verification system is to discriminate between two classes: the …

[PDF][PDF] Results evaluation of max rule, min rule and product rule in score fusion multibiometric systems

S Karanwal, D Kumar, R Maurya - IJCSE) International Journal on …, 2010 - academia.edu
this paper discusses about unibiometric systems, multibiometric systems, product rule, max
rule and min rule of score level fusion. Score level fusion is used to generate scores of a …

[PDF][PDF] Year of Publication: 2016

A Gunjal, D Abin - 2016 - academia.edu
There has been a enlarge interest in the automatic determination of age from facial
photograph due to a lot of inherent applications. However, in spite of advances in automatic …