Journal articles on the topic 'Fingerprint Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Fingerprint Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.
Full textSyukron, Nur Hidayat. "Sistem Controling Engine Menggunakan Fingerprint Berbasis Arduino." Jurnal Ilmiah Informatika 4, no. 1 (June 30, 2019): 36–40. http://dx.doi.org/10.35316/jimi.v4i1.485.
Full textGupta, Himanshu, and Kapil Chauhan. "Role of Biometric security for The Enhancement of Data Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 10 (July 27, 2015): 6184–89. http://dx.doi.org/10.24297/ijct.v14i10.1832.
Full textNusantar, Alrizal Akbar Nusantar Akbar, Ilham Ari Elbaith Zaeni, and Dyah Lestari. "Home Energy Security Prototype using Microcontroller Based on Fingerprint Sensor." Frontier Energy System and Power Engineering 1, no. 2 (July 26, 2019): 19. http://dx.doi.org/10.17977/um049v1i2p19-29.
Full textDake, Mr Ashish Prabhakar. "Fingerprint Based Security System." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (November 30, 2019): 585–89. http://dx.doi.org/10.22214/ijraset.2019.11094.
Full textSzweda, Roy. "Holographic fingerprint security device." Network Security 1997, no. 7 (July 1997): 7. http://dx.doi.org/10.1016/s1353-4858(97)89874-1.
Full textJiang, Yujia, and Xin Liu. "Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid." Journal of Electrical and Computer Engineering 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/1539298.
Full textWang, Chunwei, Lina Yu, Huixian Chang, Sheng Shen, Fang Hou, and Yingwei Li. "Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System." Wireless Communications and Mobile Computing 2020 (November 30, 2020): 1–14. http://dx.doi.org/10.1155/2020/8841417.
Full textArai, Fumihito, and Toshio Fukuda. "Fingerprint Image Sensing Using Micromechanical Key and Extraction Algorithm for Sensed Fingerprint Image." Journal of Robotics and Mechatronics 13, no. 5 (October 20, 2001): 458–63. http://dx.doi.org/10.20965/jrm.2001.p0458.
Full textNwankwo, C., G. Oletu, and O. B. Longe. "Security Enhancement of an Automated Teller Machine Using Fingerprint and Password." advances in multidisciplinary & scientific research journal publication 26, no. 1 (December 11, 2020): 45–50. http://dx.doi.org/10.22624/isteams/v26p5-ieee-ng-ts.
Full textBharani, P. J., B. Gopinath, and R. Goutham. "A Prototype of Fingerprint and ZigBee Based Train Ignition System." Advanced Engineering Forum 6-7 (September 2012): 1129–34. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1129.
Full textYang, Yijun, Jianping Yu, Peng Zhang, and Shulan Wang. "A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication." Computational and Mathematical Methods in Medicine 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/673867.
Full textMeyer, Helen. "Fingerprint sensors solve security problems." Computers & Security 18, no. 2 (January 1999): 149. http://dx.doi.org/10.1016/s0167-4048(99)80030-3.
Full textBae, Kyoung-Yul. "Smartphone Security Using Fingerprint Password." Journal of Intelligence and Information Systems 19, no. 3 (September 30, 2013): 45–55. http://dx.doi.org/10.13088/jiis.2013.19.3.045.
Full textSugiarto, Rio Rizky, and Muhammad Aria Rajasa. "Motorcycle Security use GPS and LCD Nextion based microcontrollers." Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan 6, no. 2 (October 25, 2018): 47–57. http://dx.doi.org/10.34010/telekontran.v6i2.3799.
Full textSonar, Jayashree, and Mr S. O. Dahad. "A Review on Security of Fingerprint Template Using Fingerprint Mixing." International Journal of Engineering Trends and Technology 10, no. 8 (April 25, 2014): 402–7. http://dx.doi.org/10.14445/22315381/ijett-v10p276.
Full textVilardy O., Juan M., María S. Millán, and Elisabet Pérez-Cabré. "Image Encryption System Based on a Nonlinear Joint Transform Correlator for the Simultaneous Authentication of Two Users." Photonics 6, no. 4 (December 14, 2019): 128. http://dx.doi.org/10.3390/photonics6040128.
Full textPraseetha, V. M., Saad Bayezeed, and S. Vadivel. "Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification." Journal of Intelligent Systems 29, no. 1 (April 10, 2019): 1379–87. http://dx.doi.org/10.1515/jisys-2018-0289.
Full textWaili, Tuerxun, Amir NurIman Mohd Zaid, and Mohammed Hazim Alkawaz. "Advanced Voting System Using Fingerprint." International Journal on Perceptive and Cognitive Computing 6, no. 2 (December 14, 2020): 18–21. http://dx.doi.org/10.31436/ijpcc.v6i2.172.
Full textLi, Xinting, Weijin Cheng, Chengsheng Yuan, Wei Gu, Baochen Yang, and Qi Cui. "Fingerprint Liveness Detection Based on Fine-Grained Feature Fusion for Intelligent Devices." Mathematics 8, no. 4 (April 3, 2020): 517. http://dx.doi.org/10.3390/math8040517.
Full textJu, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.
Full textBose, Palash Kumar, and Mohammad Jubaidul Kabir. "Fingerprint: A Unique and Reliable Method for Identification." Journal of Enam Medical College 7, no. 1 (January 30, 2017): 29–34. http://dx.doi.org/10.3329/jemc.v7i1.30748.
Full textJo, Young-Hoo, Seong-Yun Jeon, Jong-Hyuk Im, and Mun-Kyu Lee. "Security Analysis and Improvement of Fingerprint Authentication for Smartphones." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/8973828.
Full textkumari, U. Bhavani. "Security Authentication based Fingerprint on ATM." International Journal for Research in Applied Science and Engineering Technology 6, no. 5 (May 31, 2018): 329–34. http://dx.doi.org/10.22214/ijraset.2018.5054.
Full textSojan, Shancymol, and R. K. Kulkarni. "Mixing Fingerprint Features for Template Security." International Journal of Engineering Trends and Technology 41, no. 7 (November 25, 2016): 355–59. http://dx.doi.org/10.14445/22315381/ijett-v41p265.
Full textR, Kiruthika, and B. Rajesh Kumar. "Combination of Fingerprint for Security Protection." International Journal of Engineering Trends and Technology 9, no. 5 (March 25, 2014): 228–34. http://dx.doi.org/10.14445/22315381/ijett-v9p246.
Full textKadam, Pankaj Anil. "Enhanced ATM Security based on Machine Vision." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (August 15, 2021): 816–20. http://dx.doi.org/10.22214/ijraset.2021.37432.
Full textSchwarzl, Christian, and Edgar Weippl. "A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems." International Journal of Secure Software Engineering 2, no. 1 (January 2011): 40–83. http://dx.doi.org/10.4018/jsse.2011010103.
Full textF.W. Onifade, Olufade, Paul Akinde, and Folasade Olubusola Isinkaye. "Circular Gabor wavelet algorithm for fingerprint liveness detection." Journal of Advanced Computer Science & Technology 9, no. 1 (January 11, 2020): 1. http://dx.doi.org/10.14419/jacst.v9i1.29908.
Full textJeong, Jae-Won, In-Hoon Jang, and Kwee-Bo Sim. "Fingerprint Matching Algorithm Using String-Based MHC Detector Set." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 2 (March 20, 2005): 175–80. http://dx.doi.org/10.20965/jaciii.2005.p0175.
Full textKour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.
Full textManurung, Mario Junianto, Poningsi Poningsi, Sundari Retno Andani, Muhammad Safii, and Irawan Irawan. "Door Security Design Using Fingerprint and Buzzer Alarm Based on Arduino." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (February 9, 2021): 42–51. http://dx.doi.org/10.47709/cnahpc.v3i1.929.
Full textOkandeji, A., M. B. Olajide, A. A. Okubanjo, and F. Onaifo. "Design and development of biometric voting system using fingerprint and facial recognition." Nigerian Journal of Technological Research 15, no. 3 (November 23, 2020): 34–43. http://dx.doi.org/10.4314/njtr.v15i3.5.
Full textRivandi, Pranoko, Astuti Winda, Dewanto Satrio, and Mahmud Iwan Solihin. "Automotive Start–Stop Engine Based on Fingerprint Recognition System." E3S Web of Conferences 130 (2019): 01022. http://dx.doi.org/10.1051/e3sconf/201913001022.
Full textPratomo, Danang Yugo. "Sistem Keamanan Model Sidik Jari (Digital Key Security) Menggunakan Pemrograman Arduino Pada Sepeda Motor." Jurnal Teknik Mesin dan Pembelajaran 3, no. 2 (December 30, 2020): 99. http://dx.doi.org/10.17977/um054v3i2p99-108.
Full textThanki, Rohit M., and Komal Rajendrakumar Borisagar. "Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 35–53. http://dx.doi.org/10.4018/ijisp.2018100103.
Full textHatekar, Mr Amit. "Fingerprint Based Security System using GSM Module." International Journal of Engineering Research and Applications 07, no. 05 (May 2017): 31–34. http://dx.doi.org/10.9790/9622-0705023134.
Full textB.Awotunde, Joseph, Tolorunloju R. James, Suhurat I. Abdulkadir, and Fatimoh T. Adewumi-Olowabi. "Fingerprint Authentication System: Toward Enhancing ATM Security." International Journal of Applied Information Systems 7, no. 7 (August 5, 2014): 27–32. http://dx.doi.org/10.5120/ijais14-451214.
Full textkumar, D. Vinod. "Fingerprint Based ATM Security by using ARM7." IOSR Journal of Electronics and Communication Engineering 2, no. 5 (2012): 26–28. http://dx.doi.org/10.9790/2834-0252628.
Full textM.S, Kavitha. "Knock based Security Console with Fingerprint Sensor." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 15, 2021): 3400–3412. http://dx.doi.org/10.47059/revistageintec.v11i4.2379.
Full textVibert, Benoit, Jean-Marie Le Bars, Christophe Charrier, and Christophe Rosenberger. "Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems." Sensors 20, no. 18 (September 21, 2020): 5410. http://dx.doi.org/10.3390/s20185410.
Full textBudiman, Muhammad Arif, and I. Gusti Agung Widagda. "Fingerprints Image Recognition by Using Perceptron Artificial Neural Network." BULETIN FISIKA 21, no. 2 (May 5, 2020): 37. http://dx.doi.org/10.24843/bf.2020.v21.i02.p01.
Full textWardoyo, Jalu, Noor Hudallah, and Aryo Baskoro Utomo. "SMART HOME SECURITY SYSTEM BERBASIS MIKROKONTROLER." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 10, no. 1 (April 29, 2019): 367–74. http://dx.doi.org/10.24176/simet.v10i1.2684.
Full textBukit, Alexander Victor, I. Nengah Putra, Herdhig Prima Yudha, and Muhammad Zulkifli. "DESIGN OF ENCRYPT ROOM SECURE SYSTEM ON SATKOM LANTAMAL V SURABAYA BASED ON FINGERPRINT AND QUICK RESPONSE CODE." JOURNAL ASRO 11, no. 04 (November 19, 2020): 1. http://dx.doi.org/10.37875/asro.v11i04.352.
Full textRajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Full textSelvarani, P., and N. Malarvizhi. "Secure data in cloud with multimodal key generation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 27. http://dx.doi.org/10.14419/ijet.v7i1.7.9382.
Full textSolomon, Zakkam, Meghana K M, Manjula, and Roshini B. "SURVEY ON E-FINGERPRINT TICKET." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 53–57. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3351.
Full textChaudhary, Sumit, Monika Garg, and Neha Singh. "IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 428–32. http://dx.doi.org/10.24297/ijct.v3i3a.2950.
Full textDey, Swarnadip, Sajal Kumar Karmakar, Surajit Goon, and Prianka Kundu. "A SURVEY ON FINGERPRINT PATTERN RECOGNITION." International Journal of Research -GRANTHAALAYAH 7, no. 8 (August 31, 2019): 496–506. http://dx.doi.org/10.29121/granthaalayah.v7.i8.2019.704.
Full textVoznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska, and Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.
Full text