Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (94)
  • Open Access

    ARTICLE

    Smartphone Security Using Swipe Behavior-based Authentication

    Adnan Bin Amanat Ali1, Vasaki Ponnusamy1, Anbuselvan Sangodiah1, Roobaea Alroobaea2, N. Z. Jhanjhi3,*, Uttam Ghosh4, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 571-585, 2021, DOI:10.32604/iasc.2021.015913 - 16 June 2021

    Abstract Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user’s authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning More >

  • Open Access

    ARTICLE

    Real-Time Multimodal Biometric Authentication of Human Using Face Feature Analysis

    Rohit Srivastava1, Ravi Tomar1, Ashutosh Sharma2, Gaurav Dhiman3, Naveen Chilamkurti4, Byung-Gyu Kim5,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1-19, 2021, DOI:10.32604/cmc.2021.015466 - 04 June 2021

    Abstract As multimedia data sharing increases, data security in mobile devices and its mechanism can be seen as critical. Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time. Humans incorporate physiological attributes like a fingerprint, face, iris, palm print, finger knuckle print, Deoxyribonucleic Acid (DNA), and behavioral qualities like walk, voice, mark, or keystroke. The main goal of this paper is to design a robust framework for automatic face recognition. Scale Invariant Feature Transform (SIFT) and Speeded-up Robust Features (SURF) are employed for face recognition. Also, we propose a… More >

  • Open Access

    ARTICLE

    Data Mining of Scientometrics for Classifying Science Journals

    Muhammad Shaheen1,*, Ali Ahsan2, Saeed Iqbal3

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 873-885, 2021, DOI:10.32604/iasc.2021.016622 - 20 April 2021

    Abstract While there are several Scientometrics that can be used to assess the quality of the scientific work published in journals and conferences, yet; their validity and suitability is a great concern for stakeholders from both academia and industry. Different organizations have a different set of criteria for assessing the journals publishing scientific content. This is mostly based on the information generated from Scientometrics. A unified journal ranking system is therefore required that is acceptable to all concerned. This paper, collects data concerning Scientometrics for unified assessment of journals and proposes a mechanism of assessment using… More >

  • Open Access

    ARTICLE

    Code Smell Detection Using Whale Optimization Algorithm

    Moatasem M. Draz1, Marwa S. Farhan2,3,*, Sarah N. Abdulkader4,5, M. G. Gafar6,7

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1919-1935, 2021, DOI:10.32604/cmc.2021.015586 - 13 April 2021

    Abstract Software systems have been employed in many fields as a means to reduce human efforts; consequently, stakeholders are interested in more updates of their capabilities. Code smells arise as one of the obstacles in the software industry. They are characteristics of software source code that indicate a deeper problem in design. These smells appear not only in the design but also in software implementation. Code smells introduce bugs, affect software maintainability, and lead to higher maintenance costs. Uncovering code smells can be formulated as an optimization problem of finding the best detection rules. Although researchers… More >

  • Open Access

    ARTICLE

    ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing

    Ayesha Riaz1, Naveed Riaz1, Awais Mahmood2,*, Sajid Ali Khan3, Imran Mahmood1, Omar Almutiry2, Habib Dhahri2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2747-2764, 2021, DOI:10.32604/cmc.2021.014418 - 01 March 2021

    Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks… More >

  • Open Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri1,*, Purushottam Sharma2, Richa Sharma2, Osama Alfarraj3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469 - 28 December 2020

    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that… More >

  • Open Access

    ARTICLE

    Artificial Intelligence-Based Semantic Segmentation of Ocular Regions for Biometrics and Healthcare Applications

    Rizwan Ali Naqvi1, Dildar Hussain2, Woong-Kee Loh3,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 715-732, 2021, DOI:10.32604/cmc.2020.013249 - 30 October 2020

    Abstract Multiple ocular region segmentation plays an important role in different applications such as biometrics, liveness detection, healthcare, and gaze estimation. Typically, segmentation techniques focus on a single region of the eye at a time. Despite the number of obvious advantages, very limited research has focused on multiple regions of the eye. Similarly, accurate segmentation of multiple eye regions is necessary in challenging scenarios involving blur, ghost effects low resolution, off-angles, and unusual glints. Currently, the available segmentation methods cannot address these constraints. In this paper, to address the accurate segmentation of multiple eye regions in… More >

  • Open Access

    ARTICLE

    Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics

    Purvashi Baynath, Sunjiv Soyjaudah, Maleika Heenaye-Mamode Khan

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 651-661, 2019, DOI:10.31209/2018.100000060

    Abstract The goal of this paper is (i) adopt fusion of features (ii) determine the best method of feature selection technique among ant Colony optimisation, artificial bee colony optimisation and genetic algorithm. The experimental results reported that ant colony Optimisation is a promising techniques as feature selection on Keystroke Dynamics as it outperforms in terms of recognition rate for our inbuilt database where the distance between the keys has been considered for the password derivation with recognition rate 97.85%. Finally the results have shown that a small improvement is obtained by fused features, which suggest that More >

  • Open Access

    ARTICLE

    User Authentication System Based on Baseline‐corrected ECG for Biometrics

    Gyu Ho Choia, Jae Hyo Jungb, Hae Min Moonc, Youn Tae Kimb, Sung Bum Panc

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 193-204, 2019, DOI:10.31209/2018.100000055

    Abstract Recently, ECG-based user authentication technology, which is strong against forgery and falsification, has been actively studied compared to fingerprint and face authentication. It is impossible to measure the open ECG DB measured with expensive medical equipment in daily living, and the ECG measured with the developed device for easy ECG measurement has much noise. In this paper, we developed a device that easily measures the ECG for user authentication in everyday life, measured the ECG through the development equipment, adjusted the baseline correction of the measured ECG, extracted it from the adjusted ECG do. The More >

  • Open Access

    ARTICLE

    Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics

    Yu Sun1,2,*, Qiyuan Gao3, Xiaofan Du3, Zhao Gu3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1365-1375, 2019, DOI:10.32604/cmc.2019.06294

    Abstract In this advanced age, when smart phones are the norm, people utilize social networking, online shopping, and even private information storage through smart phones. As a result, identity authentication has become the most critical security activity in this period of the intelligent craze. By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users. Firstly, the sensor data and touch-screen data of the smart phone users are collected through android programming. Secondly, the eigenvalues of this data are extracted and sent to the More >

Displaying 71-80 on page 8 of 94. Per Page