Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (41)
  • Open Access

    ARTICLE

    A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning

    Muhammad Azhar1,*, Sehat Ullah1, Khalil Ullah2, Habib Shah3, Abdallah Namoun4, Khaliq Ur Rahman5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 165-182, 2023, DOI:10.32604/cmc.2023.034605 - 06 February 2023

    Abstract Human biometric analysis has gotten much attention due to its widespread use in different research areas, such as security, surveillance, health, human identification, and classification. Human gait is one of the key human traits that can identify and classify humans based on their age, gender, and ethnicity. Different approaches have been proposed for the estimation of human age based on gait so far. However, challenges are there, for which an efficient, low-cost technique or algorithm is needed. In this paper, we propose a three-dimensional real-time gait-based age detection system using a machine learning approach. The… More >

  • Open Access

    ARTICLE

    Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics

    S. Aanjanadevi1,*, S. Aanjankumar2, K. R. Ramela3, V. Palanisamy4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2351-2362, 2023, DOI:10.32604/csse.2023.031893 - 21 December 2022

    Abstract Due to the enormous usage of the internet for transmission of data over a network, security and authenticity become major risks. Major challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database server. To describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical (Face, fingerprint, Ear etc.) and behavioural (Gesture, Voice, tying etc.) by means of matching and verification process. In this work, biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices… More >

  • Open Access

    ARTICLE

    Cancellable Multi-Biometric Feature Veins Template Generation Based on SHA-3 Hashing

    Salwa M. Serag Eldin1,*, Ahmed Sedik2, Sultan S. Alshamrani3, Ahmed M. Ayoup4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 733-749, 2023, DOI:10.32604/cmc.2023.030789 - 22 September 2022

    Abstract In this paper, a novel cancellable biometrics technique called Multi-Biometric-Feature-Hashing (MBFH) is proposed. The MBFH strategy is utilized to actualize a single direction (non-invertibility) biometric shape. MBFH is a typical model security conspire that is distinguished in the utilization of this protection insurance framework in numerous sorts of biometric feature strategies (retina, palm print, Hand Dorsum, fingerprint). A more robust and accurate multilingual biological structure in expressing human loneliness requires a different format to record clients with inseparable comparisons from individual biographical sources. This may raise worries about their utilization and security when these spread More >

  • Open Access

    ARTICLE

    A Novel Fusion System Based on Iris and Ear Biometrics for E-exams

    S. A. Shaban*, Hosnia M. M. Ahmed, D. L. Elsheweikh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3295-3315, 2023, DOI:10.32604/iasc.2023.030237 - 17 August 2022

    Abstract With the rapid spread of the coronavirus epidemic all over the world, educational and other institutions are heading towards digitization. In the era of digitization, identifying educational e-platform users using ear and iris based multimodal biometric systems constitutes an urgent and interesting research topic to preserve enterprise security, particularly with wearing a face mask as a precaution against the new coronavirus epidemic. This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations (E-exams) during the COVID-19 pandemic. The proposed system comprises four… More >

  • Open Access

    ARTICLE

    Optical Ciphering Scheme for Cancellable Speaker Identification System

    Walid El-Shafai1,2, Marwa A. Elsayed1, Mohsen A. Rashwan3, Moawad I. Dessouky1, Adel S. El-Fishawy1, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 563-578, 2023, DOI:10.32604/csse.2023.024375 - 16 August 2022

    Abstract Most current security and authentication systems are based on personal biometrics. The security problem is a major issue in the field of biometric systems. This is due to the use in databases of the original biometrics. Then biometrics will forever be lost if these databases are attacked. Protecting privacy is the most important goal of cancelable biometrics. In order to protect privacy, therefore, cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases. One methodology to achieve non-invertibility is the More >

  • Open Access

    ARTICLE

    Face Templates Encryption Technique Based on Random Projection and Deep Learning

    Mayada Tarek1,2,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2049-2063, 2023, DOI:10.32604/csse.2023.027139 - 01 August 2022

    Abstract Cancellable biometrics is the solution for the trade-off between two concepts: Biometrics for Security and Security for Biometrics. The cancelable template is stored in the authentication system’s database rather than the original biometric data. In case of the database is compromised, it is easy for the template to be canceled and regenerated from the same biometric data. Recoverability of the cancelable template comes from the diversity of the cancelable transformation parameters (cancelable key). Therefore, the cancelable key must be secret to be used in the system authentication process as a second authentication factor in conjunction… More >

  • Open Access

    ARTICLE

    An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform

    K. Meenakshi1,*, G. Maragatham2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 627-643, 2023, DOI:10.32604/iasc.2023.026961 - 06 June 2022

    Abstract Deep Learning is one of the most popular computer science techniques, with applications in natural language processing, image processing, pattern identification, and various other fields. Despite the success of these deep learning algorithms in multiple scenarios, such as spam detection, malware detection, object detection and tracking, face recognition, and automatic driving, these algorithms and their associated training data are rather vulnerable to numerous security threats. These threats ultimately result in significant performance degradation. Moreover, the supervised based learning models are affected by manipulated data known as adversarial examples, which are images with a particular level… More >

  • Open Access

    ARTICLE

    Unconstrained Hand Dorsal Veins Image Database and Recognition System

    Mustafa M. Al Rifaee1,*, Mohammad M. Abdallah1, Mosa I. Salah2, Ayman M. Abdalla1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5063-5073, 2022, DOI:10.32604/cmc.2022.030033 - 28 July 2022

    Abstract Hand veins can be used effectively in biometric recognition since they are internal organs that, in contrast to fingerprints, are robust under external environment effects such as dirt and paper cuts. Moreover, they form a complex rich shape that is unique, even in identical twins, and allows a high degree of freedom. However, most currently employed hand-based biometric systems rely on hand-touch devices to capture images with the desired quality. Since the start of the COVID-19 pandemic, most hand-based biometric systems have become undesirable due to their possible impact on the spread of the pandemic.… More >

  • Open Access

    ARTICLE

    A Proposed Biometric Authentication Model to Improve Cloud Systems Security

    Hosam El- El-Sofany1,2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 573-589, 2022, DOI:10.32604/csse.2022.024302 - 20 April 2022

    Abstract Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3131-3144, 2022, DOI:10.32604/cmc.2022.026457 - 29 March 2022

    Abstract Education 4.0 is being authorized more and more by the design of artificial intelligence (AI) techniques. Higher education institutions (HEI) have started to utilize Internet technologies to improve the quality of the service and boost knowledge. Due to the unavailability of information technology (IT) infrastructures, HEI is vulnerable to cyberattacks. Biometric authentication can be used to authenticate a person based on biological features such as face, fingerprint, iris, and so on. This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions, named SRODL-LAC… More >

Displaying 11-20 on page 2 of 41. Per Page