Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images

    Puja S. Prasad1, Adepu Sree Lakshmi1, Sandeep Kautish2, Simar Preet Singh3, Rajesh Kumar Shrivastava3, Abdulaziz S. Almazyad4, Hossam M. Zawbaa5, Ali Wagdy Mohamed6,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 725-739, 2024, DOI:10.32604/cmes.2023.030640

    Abstract Pupil dynamics are the important characteristics of face spoofing detection. The face recognition system is one of the most used biometrics for authenticating individual identity. The main threats to the facial recognition system are different types of presentation attacks like print attacks, 3D mask attacks, replay attacks, etc. The proposed model uses pupil characteristics for liveness detection during the authentication process. The pupillary light reflex is an involuntary reaction controlling the pupil’s diameter at different light intensities. The proposed framework consists of two-phase methodologies. In the first phase, the pupil’s diameter is calculated by applying stimulus (light) in one eye… More >

  • Open Access

    ARTICLE

    Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals

    V. Harshini1, T. Dhanwin1, A. Shahina1,*, N. Safiyyah2, A. Nayeemulla Khan2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1851-1867, 2023, DOI:10.32604/csse.2023.028136

    Abstract Biometrics, which has become integrated with our daily lives, could fall prey to falsification attacks, leading to security concerns. In our paper, we use Transient Evoked Otoacoustic Emissions (TEOAE) that are generated by the human cochlea in response to an external sound stimulus, as a biometric modality. TEOAE are robust to falsification attacks, as the uniqueness of an individual’s inner ear cannot be impersonated. In this study, we use both the raw 1D TEOAE signals, as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform (CWT). We use 1D and 2D Convolutional Neural Networks (CNN) for… More >

  • Open Access

    ARTICLE

    Voice to Face Recognition Using Spectral ERB-DMLP Algorithms

    Fauzi A. Bala1,2,*, Osman N. Ucan1, Oguz Bayat1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2187-2204, 2022, DOI:10.32604/cmc.2022.024205

    Abstract Designing an authentication system for securing the power plants are important to allow only specific staffs of the power plant to access the certain blocks so that they can be restricted from using high risk-oriented equipment. This authentication is also vital to prevent any security threats or risks like compromises of business server, release of confidential data etc. Though conventional works attempted to accomplish better authentication, they lacked with respect to accuracy. Hence, the study aims to enhance the recognition rate by introducing a voice recognition system as a personal authentication based on Deep Learning (DL) due to its ability… More >

  • Open Access

    ARTICLE

    Evaluation of Deep Learning Models for Person Authentication Based on Touch Gesture

    Asrar Bajaber1,*, Mai Fadel1, Lamiaa Elrefaei2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 465-481, 2022, DOI:10.32604/csse.2022.022003

    Abstract Touch gesture biometrics authentication system is the study of user's touching behavior on his touch device to identify him. The features traditionally used in touch gesture authentication systems are extracted using hand-crafted feature extraction approach. In this work, we investigate the ability of Deep Learning (DL) to automatically discover useful features of touch gesture and use them to authenticate the user. Four different models are investigated Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), Convolutional Neural Network (CNN) combined with LSTM (CNN-LSTM), and CNN combined with GRU(CNN-GRU). In addition, different regularization techniques are investigated such as Activity Regularizer, Batch Normalization… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into… More >

  • Open Access

    ARTICLE

    User Authentication System Based on Baseline‐corrected ECG for Biometrics

    Gyu Ho Choia, Jae Hyo Jungb, Hae Min Moonc, Youn Tae Kimb, Sung Bum Panc

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 193-204, 2019, DOI:10.31209/2018.100000055

    Abstract Recently, ECG-based user authentication technology, which is strong against forgery and falsification, has been actively studied compared to fingerprint and face authentication. It is impossible to measure the open ECG DB measured with expensive medical equipment in daily living, and the ECG measured with the developed device for easy ECG measurement has much noise. In this paper, we developed a device that easily measures the ECG for user authentication in everyday life, measured the ECG through the development equipment, adjusted the baseline correction of the measured ECG, extracted it from the adjusted ECG do. The proposed system includes the steps… More >

  • Open Access

    ARTICLE

    An Ensemble Based Hand Vein Pattern Authentication System

    M. Rajalakshmi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.114, No.2, pp. 209-220, 2018, DOI:10.3970/cmes.2018.114.209

    Abstract Amongst several biometric traits, Vein pattern biometric has drawn much attention among researchers and diverse users. It gains its importance due to its difficulty in reproduction and inherent security advantages. Many research papers have dealt with the topic of new generation biometric solutions such as iris and vein biometrics. However, most implementations have been based on small datasets due to the difficulties in obtaining samples. In this paper, a deeper study has been conducted on previously suggested methods based on Convolutional Neural Networks (CNN) using a larger dataset. Also, modifications are suggested for implementation using ensemble methods. Ensembles were used… More >

Displaying 1-10 on page 1 of 7. Per Page