Journal articles on the topic 'Identification and Authentication Techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identification and Authentication Techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Warda Hassan and Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques." VFAST Transactions on Software Engineering 12, no. 1 (March 31, 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Full textDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini, and I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (May 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Full textSureshbabu, P., and M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Full textB S, Shruthi, and Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD." International Journal of Computer Science and Mobile Computing 12, no. 4 (April 30, 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Full textJoshi, V. C., and I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS." Acta Horticulturae, no. 720 (October 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Full textDan, Man Kan, and Dr T. Meyappan. "WATERMARKING TECHNIQUES." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Full textDivya, C. D., and Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey." Applied and Computational Engineering 2, no. 1 (March 22, 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Full textYaseen Khudhur, Doaa, Belal Al-Khateeb, and Hadeel Amjed Saeed. "Secure login technique for online banking." International Journal of Engineering & Technology 7, no. 4 (April 3, 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Full textSingh, Preet Amol, Neha Bajwa, Subh Naman, and Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs." Letters in Drug Design & Discovery 17, no. 9 (September 11, 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Full textGupta, Myra. "Biometric Authentication using Gait Recognition." Universal Research Reports 10, no. 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Full textSelvarani, P., and N. Malarvizhi. "Multibiometric authentication with MATLAB simulation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Full textZhao, Yi, and Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms." Information 15, no. 4 (March 29, 2024): 187. http://dx.doi.org/10.3390/info15040187.
Full textG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala, and Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (September 1, 2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Full textK N, Madhu, and Mrs Bhavana G. "Signature Recognition for Banking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Full textHossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review." Malaysian NANO-An International Journal 4, no. 1 (July 3, 2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.
Full textR, Dr Sharavanakumar. "EYE Blinking for Password Authentication." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Full textCicareli, Rodrigo dos Santos, and José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual." Semina: Ciências Exatas e Tecnológicas 41, no. 2 (December 11, 2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.
Full textK, Ambika, and Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication." International Journal of Electrical and Electronics Research 10, no. 4 (December 30, 2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.
Full textJing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning." Journal of Electrical Systems 19, no. 4 (January 25, 2024): 196–210. http://dx.doi.org/10.52783/jes.632.
Full textD., Ostapets, Dziuba V., and Rusetskyi V. "Tools for studying of facial identification and authentication." System technologies 4, no. 153 (May 1, 2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.
Full textFarid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed, and Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services." Sensors 21, no. 2 (January 14, 2021): 552. http://dx.doi.org/10.3390/s21020552.
Full textShaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou, and Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques." Information 9, no. 9 (August 24, 2018): 213. http://dx.doi.org/10.3390/info9090213.
Full textShet, Nagaraj. "Eye Based Secure Authentication System." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.
Full textAl-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi, and Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data." Sustainability 15, no. 13 (July 3, 2023): 10456. http://dx.doi.org/10.3390/su151310456.
Full textB.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Full textHassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (October 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Full textBaldini, Gianmarco, Raimondo Giuliani, and Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform." Applied Sciences 8, no. 11 (November 6, 2018): 2167. http://dx.doi.org/10.3390/app8112167.
Full textLin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti, and Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique." Symmetry 16, no. 10 (September 24, 2024): 1253. http://dx.doi.org/10.3390/sym16101253.
Full textNini, Deepthi Mohan, BSajini Krishnadas, and KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines." Ancient Science of Life 32, no. 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.
Full textAleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim, and Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals." Applied Sciences 13, no. 16 (August 21, 2023): 9454. http://dx.doi.org/10.3390/app13169454.
Full textWang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin, and Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (February 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.
Full textZiyatbekova, G. Z., and M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, no. 4 (December 30, 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Full textKharabe, Shwetambari, and C. Nalini. "Survey on finger-vein segmentation and authentication." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.
Full textPerez-Meana, Hector Manuel, and Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique." Telecommunications and Radio Engineering 67, no. 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.
Full textArjun Kharavane, Lakshmi, J. S. Awati, and M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System." Journal of Embedded Systems and Processing 8, no. 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.
Full textSultan, Shahad, and Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique." Journal of communications software and systems 16, no. 3 (September 15, 2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.
Full textNajafi, Fatemeh, Masoud Kaveh, Diego Martín, and Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks." Sensors 21, no. 6 (March 12, 2021): 2009. http://dx.doi.org/10.3390/s21062009.
Full textV L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 8 (December 24, 2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.
Full textAksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy." Turkish Journal of Agriculture - Food Science and Technology 9, sp (January 5, 2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.
Full textIngale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari, and Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.
Full textHebri, Dheeraj, and Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.
Full textC. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C., and Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.
Full textKusban, Muhammad, Aris Budiman, and Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (April 1, 2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.
Full textK. Selsiya, Dr. D. Banumathy, Nijanthan, and Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (May 31, 2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Full textWeerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Full textChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Full textA, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 27, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.
Full textSadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi, and Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings." Bioengineering 11, no. 4 (April 15, 2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.
Full textJ. Balachandran, M., and P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.
Full textDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Full text