Journal articles on the topic 'Biometric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Biometric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sharma, Tushar, and Upinder Kaur. "Biometric Security: A Review to Future." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.
Full textRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Full textYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.
Full textLakhera, Manmohan, and Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm." International Journal of Rough Sets and Data Analysis 5, no. 4 (October 2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.
Full textB.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Full textYaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.
Full textSingh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.
Full textKOPCZEWSKI, Marian, and Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Full textReddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.
Full text., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Full textShopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.
Full textFianyi, Israel, and Tanveer Zia. "Biometric Technology Solutions to Countering Today's Terrorism." International Journal of Cyber Warfare and Terrorism 6, no. 4 (October 2016): 28–40. http://dx.doi.org/10.4018/ijcwt.2016100103.
Full textTaha, Mohammed A., and Hanaa M. Ahmed. "A fuzzy vault development based on iris images." EUREKA: Physics and Engineering, no. 5 (September 13, 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Full textAgarwal, Sugandha, O. P. Singh, and Deepak Nagaria. "Biometric Image Security Using Chaos Algorithm." International Journal of Information Communication Technologies and Human Development 9, no. 2 (April 2017): 49–57. http://dx.doi.org/10.4018/ijicthd.2017040103.
Full textDamaševičius, Robertas, Rytis Maskeliūnas, Egidijus Kazanavičius, and Marcin Woźniak. "Combining Cryptography with EEG Biometrics." Computational Intelligence and Neuroscience 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/1867548.
Full textHausawi, Yasser. "Role of Usability on using Biometrics for Cybersecurity." Transactions on Networks and Communications 7, no. 4 (November 8, 2019): 19–26. http://dx.doi.org/10.14738/tnc.74.7244.
Full textMcAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of Biometrics and Steganography: A Comprehensive Review." Technologies 7, no. 2 (April 8, 2019): 34. http://dx.doi.org/10.3390/technologies7020034.
Full textDrosou, A., D. Ioannidis, K. Moustakas, and D. Tzovaras. "Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept." Scientific World JOURNAL 11 (2011): 503–19. http://dx.doi.org/10.1100/tsw.2011.51.
Full textChannegowda, Arjun Benagatte, and H. N. Prakash. "Multimodal biometrics of fingerprint and signature recognition using multi-level feature fusion and deep learning techniques." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 187. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp187-195.
Full textChandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (September 1, 2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.
Full textChoudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (January 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.
Full textUDROIU, Adriana-Meda, and Ștefan-Antonio DAN-ȘUTEU. "USABLE SECURITY IN BIOMETRIC AUTHENTICATION SYSTEMS." STRATEGIES XXI - Command and Staff College 17, no. 1 (July 22, 2021): 287–92. http://dx.doi.org/10.53477/2668-2028-21-37.
Full textkumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (May 25, 2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.
Full textWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Full textFaundez-Zanuy, M. "Biometric security technology." IEEE Aerospace and Electronic Systems Magazine 21, no. 6 (June 2006): 15–26. http://dx.doi.org/10.1109/maes.2006.1662038.
Full textJain, Anil K., Karthik Nandakumar, and Abhishek Nagar. "Biometric Template Security." EURASIP Journal on Advances in Signal Processing 2008, no. 1 (2008): 579416. http://dx.doi.org/10.1155/2008/579416.
Full textChinyemba, Melissa K., and Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions." Zambia ICT Journal 2, no. 1 (June 29, 2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.
Full textChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay, and and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme." Symmetry 11, no. 2 (February 1, 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Full textChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Full textGupta, Himanshu, and Kapil Chauhan. "Role of Biometric security for The Enhancement of Data Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 10 (July 27, 2015): 6184–89. http://dx.doi.org/10.24297/ijct.v14i10.1832.
Full textKöltzsch, Gregor. "BIOMETRICS - MARKET SEGMENTS AND APPLICATIONS." Journal of Business Economics and Management 8, no. 2 (June 30, 2007): 119–22. http://dx.doi.org/10.3846/16111699.2007.9636159.
Full textChaudhary, Sheetal, Rajender Nath, Chander Kant, and Surya Kant. "Approach for Protection of Iris Template using Cancelable Biometrics." International Journal of Sensors, Wireless Communications and Control 9, no. 1 (July 15, 2019): 144–52. http://dx.doi.org/10.2174/2210327908666181011143736.
Full textBuciu, Ioan, and Alexandru Gacsadi. "Biometrics Systems and Technologies: A survey." International Journal of Computers Communications & Control 11, no. 3 (March 24, 2016): 315. http://dx.doi.org/10.15837/ijccc.2016.3.2556.
Full textSridevi, T., P. Mallikarjuna Rao, and P. V. Ramaraju. "Wireless sensor data mining for e-commerce applications." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 1 (December 25, 2018): 462. http://dx.doi.org/10.11591/ijeecs.v14.i1.pp462-470.
Full textSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application." Security and Communication Networks 2018 (December 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Full textAdámek, Milan, Miroslav Matýsek, and Petr Neumann. "Security of Biometric Systems." Procedia Engineering 100 (2015): 169–76. http://dx.doi.org/10.1016/j.proeng.2015.01.355.
Full textKöltzsch, Gregor. "INNOVATIVE METHODS TO ENHANCE TRANSACTION SECURITY OF BANKING APPLICATIONS." Journal of Business Economics and Management 7, no. 4 (December 31, 2006): 243–49. http://dx.doi.org/10.3846/16111699.2006.9636145.
Full textWang, Yazhou, Bing Li, Yan Zhang, Jiaxin Wu, and Qianya Ma. "A Secure Biometric Key Generation Mechanism via Deep Learning and Its Application." Applied Sciences 11, no. 18 (September 13, 2021): 8497. http://dx.doi.org/10.3390/app11188497.
Full textYang, Wencheng, Song Wang, Jiankun Hu, Guanglou Zheng, and Craig Valli. "Security and Accuracy of Fingerprint-Based Biometrics: A Review." Symmetry 11, no. 2 (January 28, 2019): 141. http://dx.doi.org/10.3390/sym11020141.
Full textGhouzali, Sanaa, Maryam Lafkih, Wadood Abdul, Mounia Mikram, Mohammed El Haziti, and Driss Aboutajdine. "Trace Attack against Biometric Mobile Applications." Mobile Information Systems 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/2065948.
Full textVeerasamy, Nanda Kumar. "An analysis of issues in biometric finger identification." International Journal of Engineering & Technology 3, no. 3 (August 28, 2014): 391. http://dx.doi.org/10.14419/ijet.v3i3.2368.
Full textLi, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.
Full textMoujahdi, Chouaib, George Bebis, Sanaa Ghouzali, Mounia Mikram, and Mohammed Rziza. "Biometric Template Protection Using Spiral Cube: Performance and Security Analysis." International Journal on Artificial Intelligence Tools 25, no. 01 (February 2016): 1550027. http://dx.doi.org/10.1142/s021821301550027x.
Full textKour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.
Full textArunarani, S., and R. Gobinath. "A survey on multimodal biometrics for human authentication." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 273. http://dx.doi.org/10.14419/ijet.v7i2.33.14167.
Full textSrivastava, Rohit. "Score-Level Multimodal Biometric Authentication of Humans Using Retina, Fingerprint, and Fingervein." International Journal of Applied Evolutionary Computation 11, no. 3 (July 2020): 20–30. http://dx.doi.org/10.4018/ijaec.2020070102.
Full textSujana, S., and V. S. K. Reddy. "Comparison of levels and fusion approaches for multimodal biometrics." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 791. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp791-801.
Full textJain, Rubal, and Chander Kant. "Attacks on Biometric Systems: An Overview." International Journal of Advances in Scientific Research 1, no. 7 (September 3, 2015): 283. http://dx.doi.org/10.7439/ijasr.v1i7.1975.
Full textPaul, Padma P., and Marina L. Gavrilova. "A Novel Cross Folding Algorithm for Multimodal Cancelable Biometrics." International Journal of Software Science and Computational Intelligence 4, no. 3 (July 2012): 20–37. http://dx.doi.org/10.4018/jssci.2012070102.
Full textMalčík, Dominik, and Martin Drahanský. "Anatomy of Biometric Passports." Journal of Biomedicine and Biotechnology 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/490362.
Full text