Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (77)
  • Open Access

    ARTICLE

    Real-Time Multimodal Biometric Authentication of Human Using Face Feature Analysis

    Rohit Srivastava1, Ravi Tomar1, Ashutosh Sharma2, Gaurav Dhiman3, Naveen Chilamkurti4, Byung-Gyu Kim5,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1-19, 2021, DOI:10.32604/cmc.2021.015466 - 04 June 2021

    Abstract As multimedia data sharing increases, data security in mobile devices and its mechanism can be seen as critical. Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time. Humans incorporate physiological attributes like a fingerprint, face, iris, palm print, finger knuckle print, Deoxyribonucleic Acid (DNA), and behavioral qualities like walk, voice, mark, or keystroke. The main goal of this paper is to design a robust framework for automatic face recognition. Scale Invariant Feature Transform (SIFT) and Speeded-up Robust Features (SURF) are employed for face recognition. Also, we propose a… More >

  • Open Access

    ARTICLE

    A New Segmentation Framework for Arabic Handwritten Text Using Machine Learning Techniques

    Saleem Ibraheem Saleem1,*, Adnan Mohsin Abdulazeez1, Zeynep Orman2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2727-2754, 2021, DOI:10.32604/cmc.2021.016447 - 13 April 2021

    Abstract The writer identification (WI) of handwritten Arabic text is now of great concern to intelligence agencies following the recent attacks perpetrated by known Middle East terrorist organizations. It is also a useful instrument for the digitalization and attribution of old text to other authors of historic studies, including old national and religious archives. In this study, we proposed a new affective segmentation model by modifying an artificial neural network model and making it suitable for the binarization stage based on blocks. This modified method is combined with a new effective rotation model to achieve an… More >

  • Open Access

    ARTICLE

    ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing

    Ayesha Riaz1, Naveed Riaz1, Awais Mahmood2,*, Sajid Ali Khan3, Imran Mahmood1, Omar Almutiry2, Habib Dhahri2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2747-2764, 2021, DOI:10.32604/cmc.2021.014418 - 01 March 2021

    Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks… More >

  • Open Access

    ARTICLE

    Hybrid Multimodal Biometric Template Protection

    Naima Bousnina1, Sanaa Ghouzali2,*, Mounia Mikram1,3, Maryam Lafkih1, Ohoud Nafea4, Muna Al-Razgan2, Wadood Abdul4

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 35-51, 2021, DOI:10.32604/iasc.2021.014694 - 07 January 2021

    Abstract Biometric template disclosure starts gaining an important concern in deploying practical biometric authentication systems, where an assailant compromises the database for illegitimate access. To protect biometric templates from disclosure attacks, biometric authentication systems should meet these four requirements: security, diversity, revocability, and performance. Different methods have been suggested in the literature such as feature transformation techniques and biometric cryptosystems. However, no single method could satisfy the four requirements, giving rise to the deployment of hybrid mechanisms. In this context, the current paper proposes a hybrid system for multimodal biometric template protection to provide robustness against… More >

  • Open Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri1,*, Purushottam Sharma2, Richa Sharma2, Osama Alfarraj3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469 - 28 December 2020

    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that… More >

  • Open Access

    ARTICLE

    Artificial Intelligence-Based Semantic Segmentation of Ocular Regions for Biometrics and Healthcare Applications

    Rizwan Ali Naqvi1, Dildar Hussain2, Woong-Kee Loh3,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 715-732, 2021, DOI:10.32604/cmc.2020.013249 - 30 October 2020

    Abstract Multiple ocular region segmentation plays an important role in different applications such as biometrics, liveness detection, healthcare, and gaze estimation. Typically, segmentation techniques focus on a single region of the eye at a time. Despite the number of obvious advantages, very limited research has focused on multiple regions of the eye. Similarly, accurate segmentation of multiple eye regions is necessary in challenging scenarios involving blur, ghost effects low resolution, off-angles, and unusual glints. Currently, the available segmentation methods cannot address these constraints. In this paper, to address the accurate segmentation of multiple eye regions in… More >

  • Open Access

    ARTICLE

    Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service

    Zengpeng Li1, Jiuru Wang2, *, Chang Choi3, Wenyin Zhang2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 663-674, 2020, DOI:10.32604/cmc.2020.06565 - 01 May 2020

    Abstract Multi-factor authentication (MFA) was proposed by Pointcheval et al. [Pointcheval and Zimmer (2008)] to improve the security of single-factor (and two-factor) authentication. As the backbone of multi-factor authentication, biometric data are widely observed. Especially, how to keep the privacy of biometric at the password database without impairing efficiency is still an open question. Using the vulnerability of encryption (or hash) algorithms, the attacker can still launch offline brute-force attacks on encrypted (or hashed) biometric data. To address the potential risk of biometric disclosure at the password database, in this paper, we propose a novel efficient More >

  • Open Access

    ARTICLE

    Implementation of a Biometric Interface in Voice Controlled Wheelchairs

    Lamia Bouafif1, Noureddine Ellouze2,*

    Sound & Vibration, Vol.54, No.1, pp. 1-15, 2020, DOI:10.32604/sv.2020.08665 - 01 March 2020

    Abstract In order to assist physically handicapped persons in their movements, we developed an embedded isolated word speech recognition system (ASR) applied to voice control of smart wheelchairs. However, in spite of the existence in the industrial market of several kinds of electric wheelchairs, the problem remains the need to manually control this device by hand via joystick; which limits their use especially by people with severe disabilities. Thus, a significant number of disabled people cannot use a standard electric wheelchair or drive it with difficulty. The proposed solution is to use the voice to control and… More >

  • Open Access

    ARTICLE

    Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics

    Purvashi Baynath, Sunjiv Soyjaudah, Maleika Heenaye-Mamode Khan

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 651-661, 2019, DOI:10.31209/2018.100000060

    Abstract The goal of this paper is (i) adopt fusion of features (ii) determine the best method of feature selection technique among ant Colony optimisation, artificial bee colony optimisation and genetic algorithm. The experimental results reported that ant colony Optimisation is a promising techniques as feature selection on Keystroke Dynamics as it outperforms in terms of recognition rate for our inbuilt database where the distance between the keys has been considered for the password derivation with recognition rate 97.85%. Finally the results have shown that a small improvement is obtained by fused features, which suggest that More >

  • Open Access

    ARTICLE

    User Authentication System Based on Baseline‐corrected ECG for Biometrics

    Gyu Ho Choia, Jae Hyo Jungb, Hae Min Moonc, Youn Tae Kimb, Sung Bum Panc

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 193-204, 2019, DOI:10.31209/2018.100000055

    Abstract Recently, ECG-based user authentication technology, which is strong against forgery and falsification, has been actively studied compared to fingerprint and face authentication. It is impossible to measure the open ECG DB measured with expensive medical equipment in daily living, and the ECG measured with the developed device for easy ECG measurement has much noise. In this paper, we developed a device that easily measures the ECG for user authentication in everyday life, measured the ECG through the development equipment, adjusted the baseline correction of the measured ECG, extracted it from the adjusted ECG do. The More >

Displaying 61-70 on page 7 of 77. Per Page