Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (41)
  • Open Access

    ARTICLE

    Finger Vein Authentication Based on Wavelet Scattering Networks

    Amjad Rehman1, Majid Harouni2,*, Maedeh Omidiravesh3, Suliman Mohamed Fati1, Saeed Ali Bahaj4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3369-3383, 2022, DOI:10.32604/cmc.2022.016410 - 29 March 2022

    Abstract Biometric-based authentication systems have attracted more attention than traditional authentication techniques such as passwords in the last two decades. Multiple biometrics such as fingerprint, palm, iris, palm vein and finger vein and other biometrics have been introduced. One of the challenges in biometrics is physical injury. Biometric of finger vein is of the biometrics least exposed to physical damage. Numerous methods have been proposed for authentication with the help of this biometric that suffer from weaknesses such as high computational complexity and low identification rate. This paper presents a novel method of scattering wavelet-based identity… More >

  • Open Access

    ARTICLE

    Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms

    Safaa El-Gazar1, Walid El-Shafai2,3,*, Ghada El-Banby4, Hesham F. A. Hamed1, Gerges M. Salama1, Mohammed Abd-Elnaby5, Fathi E. Abd El-Samie2,6

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 87-102, 2022, DOI:10.32604/csse.2022.022722 - 23 March 2022

    Abstract Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption… More >

  • Open Access

    ARTICLE

    Face Recognition System Using Deep Belief Network and Particle Swarm Optimization

    K. Babu1,*, C. Kumar2, C. Kannaiyaraju3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 317-329, 2022, DOI:10.32604/iasc.2022.023756 - 05 January 2022

    Abstract Facial expression for different emotional feelings makes it interesting for researchers to develop recognition techniques. Facial expression is the outcome of emotions they feel, behavioral acts, and the physiological condition of one’s mind. In the world of computer visions and algorithms, precise facial recognition is tough. In predicting the expression of a face, machine learning/artificial intelligence plays a significant role. The deep learning techniques are widely used in more challenging real-world problems which are highly encouraged in facial emotional analysis. In this article, we use three phases for facial expression recognition techniques. The principal component… More >

  • Open Access

    ARTICLE

    Automated Teller Machine Authentication Using Biometric

    Shumukh M. Aljuaid*, Arshiya S. Ansari

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.020785 - 10 November 2021

    Abstract This paper presents a novel method of a secured card-less Automated Teller Machine (ATM) authentication based on the three bio-metrics measures. It would help in the identification and authorization of individuals and would provide robust security enhancement. Moreover, it would assist in providing identification in ways that cannot be impersonated. To the best of our knowledge, this method of Biometric_ fusion way is the first ATM security algorithm that utilizes a fusion of three biometric features of an individual such as Fingerprint, Face, and Retina simultaneously for recognition and authentication. These biometric images have been… More >

  • Open Access

    ARTICLE

    Dynamic Audio-Visual Biometric Fusion for Person Recognition

    Najlaa Hindi Alsaedi*, Emad Sami Jaha

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1283-1311, 2022, DOI:10.32604/cmc.2022.021608 - 03 November 2021

    Abstract Biometric recognition refers to the process of recognizing a person’s identity using physiological or behavioral modalities, such as face, voice, fingerprint, gait, etc. Such biometric modalities are mostly used in recognition tasks separately as in unimodal systems, or jointly with two or more as in multimodal systems. However, multimodal systems can usually enhance the recognition performance over unimodal systems by integrating the biometric data of multiple modalities at different fusion levels. Despite this enhancement, in real-life applications some factors degrade multimodal systems’ performance, such as occlusion, face poses, and noise in voice data. In this… More >

  • Open Access

    ARTICLE

    Dynamic Feature Subset Selection for Occluded Face Recognition

    Najlaa Hindi Alsaedi*, Emad Sami Jaha

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 407-427, 2022, DOI:10.32604/iasc.2022.019538 - 03 September 2021

    Abstract Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to… More >

  • Open Access

    ARTICLE

    Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis

    Amr Hefny1, Aboul Ella Hassanien2, Sameh H. Basha1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2367-2386, 2021, DOI:10.32604/cmc.2021.018017 - 21 July 2021

    Abstract Identity verification using authenticity evaluation of handwritten signatures is an important issue. There have been several approaches for the verification of signatures using dynamics of the signing process. Most of these approaches extract only global characteristics. With the aim of capturing both dynamic global and local features, this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system (NRVS) and Genetic NRVS (GNRVS) models. The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values: truth, indeterminacy, and falsity. These three values More >

  • Open Access

    ARTICLE

    An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

    Naglaa F. Soliman1,2, Abeer D. Algarni1,*, Walid El-Shafai3, Fathi E. Abd El-Samie1,3, Ghada M. El Banby4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1571-1595, 2021, DOI:10.32604/cmc.2021.016980 - 21 July 2021

    Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes… More >

  • Open Access

    ARTICLE

    Smartphone Security Using Swipe Behavior-based Authentication

    Adnan Bin Amanat Ali1, Vasaki Ponnusamy1, Anbuselvan Sangodiah1, Roobaea Alroobaea2, N. Z. Jhanjhi3,*, Uttam Ghosh4, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 571-585, 2021, DOI:10.32604/iasc.2021.015913 - 16 June 2021

    Abstract Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user’s authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning More >

  • Open Access

    ARTICLE

    Real-Time Multimodal Biometric Authentication of Human Using Face Feature Analysis

    Rohit Srivastava1, Ravi Tomar1, Ashutosh Sharma2, Gaurav Dhiman3, Naveen Chilamkurti4, Byung-Gyu Kim5,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1-19, 2021, DOI:10.32604/cmc.2021.015466 - 04 June 2021

    Abstract As multimedia data sharing increases, data security in mobile devices and its mechanism can be seen as critical. Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time. Humans incorporate physiological attributes like a fingerprint, face, iris, palm print, finger knuckle print, Deoxyribonucleic Acid (DNA), and behavioral qualities like walk, voice, mark, or keystroke. The main goal of this paper is to design a robust framework for automatic face recognition. Scale Invariant Feature Transform (SIFT) and Speeded-up Robust Features (SURF) are employed for face recognition. Also, we propose a… More >

Displaying 21-30 on page 3 of 41. Per Page