Contactless fingerprint verification using neural networks

S Rote, P Pimpale, K Reddy… - 2021 International …, 2021 - ieeexplore.ieee.org
Fingerprint recognition is one of the most used biometric system in these days. Different
methods used for these are using touch sensors, optical sensors or capacitive sensors. Each …

An innovative fingerprint feature representation method to facilitate authentication using neural networks

M Abernethy, SM Rai - … , ICONIP 2013, Daegu, Korea, November 3-7, 2013 …, 2013 - Springer
Authentication systems enable the verification of claimed identity; on computer systems
these are typically password-based. However, such systems are vulnerable to numerous …

An approach to authenticate magnetic stripe bank card transactions at point-of-sale terminals

KK Nair - 2015 - repository.nwu.ac.za
Magnetic stripe card technology has been deployed for more than five decades worldwide
and is extensively used in banking. Data embedded in them are often relied upon as a …

[PDF][PDF] A multi-factor authentication scheme using attack recognition and key generator technique

NAM Ariffin - 2017 - psasir.upm.edu.my
UNIVERSITI PUTRA MALAYSIA A MULTI-FACTOR AUTHENTICATION SCHEME USING
ATTACK RECOGNITION AND KEY GENERATOR TECHNIQUE NOOR AFIZA M Page 1 …

[PDF][PDF] Slepian-Wolf Coding for Intrusion Identification System of Digital Images

M Jain, A Jain - International Journal of Computer Applications - Citeseer
With the rapid growing of the internet technology it has been observed that the use of digital
image has become the essential part in many applications. The digital image is used in …

[引用][C] A SECURED AND EFFICIENT MULTI-FACTOR BIOMETRIC AUTHENTICATION SCHEME USING PLAN RECOGNITION TECHNIQUE

NAM Ariffin, NFM Sani… - Journal of …, 2016 - Journal of Theoretical and Applied …

[引用][C] Efficiency of Secured Novel Multi-Factor Authentication Scheme with Biometric Technology

NAM Ariffin, NFM Sani, ZM Hanapi, R Mahmod - Australian Journal of Basic and …, 2015