A review of radio frequency fingerprinting techniques
N Soltanieh, Y Norouzi, Y Yang… - IEEE Journal of Radio …, 2020 - ieeexplore.ieee.org
Radio frequency (RF) fingerprinting techniques have been used as an extra security layer
for wireless devices. Unique fingerprints are used to identify wireless devices in order to …
for wireless devices. Unique fingerprints are used to identify wireless devices in order to …
A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
The human face is considered the prime entity in recognizing a person's identity in our
society. Henceforth, the importance of face recognition systems is growing higher for many …
society. Henceforth, the importance of face recognition systems is growing higher for many …
Classification assessment methods
A Tharwat - Applied computing and informatics, 2021 - emerald.com
Classification techniques have been applied to many applications in various fields of
sciences. There are several ways of evaluating classification algorithms. The analysis of …
sciences. There are several ways of evaluating classification algorithms. The analysis of …
Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint
A multimodal biometric system integrates information from more than one biometric modality
to improve the performance of each individual biometric system and make the system robust …
to improve the performance of each individual biometric system and make the system robust …
Evolution, current challenges, and future possibilities in ECG biometrics
Face and fingerprint are, currently, the most thoroughly explored biometric traits, promising
reliable recognition in diverse applications. Commercial products using these traits for …
reliable recognition in diverse applications. Commercial products using these traits for …
Biometrics: a tool for information security
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …
Biometrics as a method of employee control
Biometric technology is used for various purposes. One of these is the identification of
individuals. It has been widely used in the field of life for various applications. Despite the …
individuals. It has been widely used in the field of life for various applications. Despite the …
Comparing passwords, tokens, and biometrics for user authentication
L O'Gorman - Proceedings of the IEEE, 2003 - ieeexplore.ieee.org
For decades, the password has been the standard means for user authentication on
computers. However, as users are required to remember more, longer, and changing …
computers. However, as users are required to remember more, longer, and changing …
Generating cancelable fingerprint templates
Biometrics-based authentication systems offer obvious usability advantages over traditional
password and token-based authentication schemes. However, biometrics raises several …
password and token-based authentication schemes. However, biometrics raises several …
ECG biometric recognition: A comparative analysis
The electrocardiogram (ECG) is an emerging biometric modality that has seen about 13
years of development in peer-reviewed literature, and as such deserves a systematic review …
years of development in peer-reviewed literature, and as such deserves a systematic review …