Yusuf et al., 2020 - Google Patents
A survey of biometric approaches of authenticationYusuf et al., 2020
View PDF- Document ID
- 16602413689658277326
- Author
- Yusuf N
- Marafa K
- Shehu K
- Mamman H
- Maidawa M
- Publication year
- Publication venue
- International Journal of Advanced Computer Research
External Links
Snippet
The increasing need for better authentication methods against hackers has called for the use of the biometric authentication method to guard against unauthorized access into the systems. The used of human characteristics for biometrics provides authentication for …
- 238000011160 research 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00107—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger
- G06K9/00114—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger using image processing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rui et al. | A survey on biometric authentication: Toward secure and privacy-preserving identification | |
| Yusuf et al. | A survey of biometric approaches of authentication | |
| Melzi et al. | An overview of privacy-enhancing technologies in biometric recognition | |
| Jain | Biometric recognition: how do I know who you are? | |
| CN101098232B (en) | An identity authentication method combining dynamic password and multi-biometric features | |
| Mayron | Biometric authentication on mobile devices | |
| Bhattasali et al. | A survey of security and privacy issues for biometrics based remote authentication in cloud | |
| Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
| Zafar et al. | Fingerprint authentication and security risks in smart devices | |
| Belkhede et al. | Biometric mechanism for enhanced security of online transaction on Android system: A design approach | |
| Dahiya et al. | Biometrics security concerns | |
| Ayoup et al. | Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing. | |
| Bhartiya et al. | Biometric authentication systems: security concerns and solutions | |
| Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
| Hu et al. | Authconformer: Sensor-based continuous authentication of smartphone users using a convolutional transformer | |
| El-El-Sofany | A Proposed Biometric Authentication Model to Improve Cloud Systems Security. | |
| Abdulkader et al. | Authentication systems: Principles and threats | |
| Smith-Creasey | Continuous biometric authentication systems | |
| Singla et al. | Performance analysis of authentication system: A systematic literature review | |
| Kannavara et al. | Topics in biometric human-machine interaction security | |
| Rudrakshi et al. | A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem | |
| Sawant et al. | A Study on Biometric Authentication Systems, Privacy Concerns and Mitigation Strategies | |
| Cimato et al. | Biometrics and privacy | |
| H Nair et al. | Hybrid Biometric Based Person Identification Using Machine Learning. | |
| Furnell | Biometric technology and user identity |