Journal articles on the topic 'User fingerprint'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'User fingerprint.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.
Full textJiang, Bin, Yikun Zhao, Hongmei Yi, Yongxue Huo, Haotian Wu, Jie Ren, Jianrong Ge, Jiuran Zhao, and Fengge Wang. "PIDS: A User-Friendly Plant DNA Fingerprint Database Management System." Genes 11, no. 4 (March 30, 2020): 373. http://dx.doi.org/10.3390/genes11040373.
Full textGabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Full textJu, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.
Full textAgarwal, Rohit, A. S. Jalal, and K. V. Arya. "A review on presentation attack detection system for fake fingerprint." Modern Physics Letters B 34, no. 05 (February 3, 2020): 2030001. http://dx.doi.org/10.1142/s021798492030001x.
Full textDiaz Pineda, Mabel Rocio, Maria Alejandra Dueñas, and Karen Dayanna Acevedo. "Fingerprints detection using neural networks suitable to physical changes of fingerprint." Revista CINTEX 22, no. 2 (December 30, 2017): 35–50. http://dx.doi.org/10.33131/24222208.271.
Full textAlakhras, Marwan, Mousa Hussein, and Mourad Oussalah. "Location Fixing and Fingerprint Matching Fingerprint Map Construction for Indoor Localization." Journal of Sensors 2020 (January 17, 2020): 1–14. http://dx.doi.org/10.1155/2020/7801752.
Full textSanchez-Reillo, R., L. Mengibar-Pozo, and C. Sanchez-Avila. "Microprocessor smart cards with fingerprint user authentication." IEEE Aerospace and Electronic Systems Magazine 18, no. 3 (March 2003): 22–24. http://dx.doi.org/10.1109/maes.2003.1193715.
Full textCahyaningtiyas, Rizqia, Efy Yosrita, and Rakhmat Arianto. "THE AUTOMATIC DOORS INTEGRATED ABSENCE AND USER ACCESS USING FINGERPRINT." Jurnal Ilmiah FIFO 8, no. 2 (November 1, 2016): 147. http://dx.doi.org/10.22441/fifo.v8i2.1309.
Full textStanton, Brian, Mary Theofanos, Shahram Orandi, Ross Micheals, and Nien-Fan Zhang. "Effects of Scanner Height on Fingerprint Capture." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 10 (October 2007): 592–96. http://dx.doi.org/10.1177/154193120705101005.
Full textIWASOKUN, Gabriel B. "A Fingerprint-Based Scheme for ATM User Authentication." International Journal of Information Security and Cybercrime 5, no. 2 (December 29, 2016): 71–86. http://dx.doi.org/10.19107/ijisc.2016.02.07.
Full textVibert, Benoit, Jean-Marie Le Bars, Christophe Charrier, and Christophe Rosenberger. "Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems." Sensors 20, no. 18 (September 21, 2020): 5410. http://dx.doi.org/10.3390/s20185410.
Full textF.W. Onifade, Olufade, Paul Akinde, and Folasade Olubusola Isinkaye. "Circular Gabor wavelet algorithm for fingerprint liveness detection." Journal of Advanced Computer Science & Technology 9, no. 1 (January 11, 2020): 1. http://dx.doi.org/10.14419/jacst.v9i1.29908.
Full textYassin, Ali A. "Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing." International Scholarly Research Notices 2014 (September 24, 2014): 1–13. http://dx.doi.org/10.1155/2014/351696.
Full textPraseetha, V. M., Saad Bayezeed, and S. Vadivel. "Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification." Journal of Intelligent Systems 29, no. 1 (April 10, 2019): 1379–87. http://dx.doi.org/10.1515/jisys-2018-0289.
Full textNtoutsi, Eirini, Myra Spiliopoulou, and Yannis Theodoridis. "FINGERPRINT." International Journal of Data Warehousing and Mining 8, no. 3 (July 2012): 27–44. http://dx.doi.org/10.4018/jdwm.2012070102.
Full textZhang, Shuai, Jiming Guo, Nianxue Luo, Lei Wang, Wei Wang, and Kai Wen. "Improving Wi-Fi Fingerprint Positioning with a Pose Recognition-Assisted SVM Algorithm." Remote Sensing 11, no. 6 (March 17, 2019): 652. http://dx.doi.org/10.3390/rs11060652.
Full textLee, J. K., S. R. Ryu, and K. Y. Yoo. "Fingerprint-based remote user authentication scheme using smart cards." Electronics Letters 38, no. 12 (2002): 554. http://dx.doi.org/10.1049/el:20020380.
Full textVilardy O., Juan M., María S. Millán, and Elisabet Pérez-Cabré. "Image Encryption System Based on a Nonlinear Joint Transform Correlator for the Simultaneous Authentication of Two Users." Photonics 6, no. 4 (December 14, 2019): 128. http://dx.doi.org/10.3390/photonics6040128.
Full textChen, Ching-Han, Chen-Shuo An, and Ching-Yi Chen. "Fingerprint Quality Assessment based on Texture and Geometric Features." Journal of Imaging Science and Technology 64, no. 4 (July 1, 2020): 40403–1. http://dx.doi.org/10.2352/j.imagingsci.technol.2020.64.4.040403.
Full textSelvarani, P., and N. Malarvizhi. "Secure data in cloud with multimodal key generation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 27. http://dx.doi.org/10.14419/ijet.v7i1.7.9382.
Full textIskhakov, A. Y., and A. A. Salomatin. "Estimation of the time for calculating the attributes of browser fingerprints in the user authentication task." E3S Web of Conferences 224 (2020): 01030. http://dx.doi.org/10.1051/e3sconf/202022401030.
Full textQian, Jiansheng, and Mingzhi Song. "Research and Application of Underground WLAN Adaptive Radio Fingerprint Database." Sensors 20, no. 4 (February 21, 2020): 1182. http://dx.doi.org/10.3390/s20041182.
Full textD. Mahesh Kumar, Aravinda H. S., Thejaswini P. ,. Anu H. ,. "AN ADAPTIVE ALGORITHM BASED AUTHENTICATION SYSTEM FOR REAL-TIME BIOMETRIC TIME-ATTENDANCE SYSTEM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (February 18, 2021): 77–90. http://dx.doi.org/10.17762/itii.v9i1.104.
Full textSingh, Law Kumar, Munish Khanna, and Hitendra Garg. "Multimodal Biometric Based on Fusion of Ridge Features with Minutiae Features and Face Features." International Journal of Information System Modeling and Design 11, no. 1 (January 2020): 37–57. http://dx.doi.org/10.4018/ijismd.2020010103.
Full textTheofanos, Mary, Brian Stanton, Charles Sheppard, Ross Micheals, and Nien-Fan Zhang. "Does the Angle of a Fingerprint Scanner Affect User Performance?" Proceedings of the Human Factors and Ergonomics Society Annual Meeting 52, no. 24 (September 2008): 1989–93. http://dx.doi.org/10.1177/154193120805202415.
Full textBudiman, Muhammad Arif, and I. Gusti Agung Widagda. "Fingerprints Image Recognition by Using Perceptron Artificial Neural Network." BULETIN FISIKA 21, no. 2 (May 5, 2020): 37. http://dx.doi.org/10.24843/bf.2020.v21.i02.p01.
Full textYang, Chao, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, and Jianfeng Ma. "Fingerprint Protected Password Authentication Protocol." Security and Communication Networks 2019 (June 26, 2019): 1–12. http://dx.doi.org/10.1155/2019/1694702.
Full textHusseis, Anas, Judith Liu-Jimenez, and Raul Sanchez-Reillo. "The Impact of Pressure on the Fingerprint Impression: Presentation Attack Detection Scheme." Applied Sciences 11, no. 17 (August 26, 2021): 7883. http://dx.doi.org/10.3390/app11177883.
Full textSelvarani, P., and N. Malarvizhi. "Multibiometric authentication with MATLAB simulation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.
Full textBai, Junhang, Yongliang Sun, Weixiao Meng, and Cheng Li. "Wi-Fi Fingerprint-Based Indoor Mobile User Localization Using Deep Learning." Wireless Communications and Mobile Computing 2021 (January 8, 2021): 1–12. http://dx.doi.org/10.1155/2021/6660990.
Full textBai, Junhang, Yongliang Sun, Weixiao Meng, and Cheng Li. "Wi-Fi Fingerprint-Based Indoor Mobile User Localization Using Deep Learning." Wireless Communications and Mobile Computing 2021 (January 8, 2021): 1–12. http://dx.doi.org/10.1155/2021/6660990.
Full textWei, Jie, Fang Zhao, and Haiyong Luo. "SP-Loc: A crowdsourcing fingerprint based shop-level indoor localization algorithm integrating shop popularity without the indoor map." International Journal of Distributed Sensor Networks 14, no. 11 (November 2018): 155014771881563. http://dx.doi.org/10.1177/1550147718815637.
Full textMoskovchenko, Valeriy, Danil Stolyarov, Aleksandr Gorbunov, and Vladislav Belyanin. "The Analysis of Technologies Protecting from Web Browsers Identification." NBI Technologies, no. 1 (August 2018): 34–39. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.6.
Full textRashid, Mofeed, and Huda Zaki. "RSA Cryptographic Key Generation Using Fingerprint Minutiae." Iraqi Journal for Computers and Informatics 41, no. 1 (December 31, 2014): 66–69. http://dx.doi.org/10.25195/ijci.v41i1.101.
Full textHu, Chia Shing, and Chia Shing Hu. "Fingerprint Identification Based on Mopso in SVM." Applied Mechanics and Materials 479-480 (December 2013): 810–17. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.810.
Full textHan, Yoon Chung, and Byeong-jun Han. "Skin Pattern Sonification as a New Timbral Expression." Leonardo Music Journal 24 (December 2014): 41–43. http://dx.doi.org/10.1162/lmj_a_00199.
Full textKwao, Lazarus. "User Authentication Model for Securing E-Health System using Fingerprint Biometrics." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (November 30, 2019): 285–93. http://dx.doi.org/10.22214/ijraset.2019.11046.
Full textFirdaus, Firdaus, Noor Azurati Ahmad, and Shamsul Sahibuddin. "Fingerprint indoor positioning based on user orientations and minimum computation time." TELKOMNIKA (Telecommunication Computing Electronics and Control) 17, no. 4 (August 1, 2019): 1740. http://dx.doi.org/10.12928/telkomnika.v17i4.12774.
Full textTheofanos, Mary, Brian Stanton, Shahram Orandi, Ross Micheals, and Nien-Fan Zhang. "Ten-Print Fingerprint Capture: Effect of Instructional Modes on User Performance." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 10 (October 2007): 597–601. http://dx.doi.org/10.1177/154193120705101006.
Full textKu, W. C., S. T. Chang, and M. H. Chiang. "Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards." Electronics Letters 41, no. 5 (2005): 240. http://dx.doi.org/10.1049/el:20047658.
Full textChang, Chin-Chen, and Iuon-Chang Lin. "Remarks on fingerprint-based remote user authentication scheme using smart cards." ACM SIGOPS Operating Systems Review 38, no. 4 (October 2004): 91–96. http://dx.doi.org/10.1145/1031154.1031165.
Full textShigematsu, Satoshi, Takahiro Hatano, Hiroki Morimura, Katsuyuki Machida, and Yukio Okazaki. "Ubiquitous user authentication system with wireless battery-powered fingerprint identification module." IEEJ Transactions on Electrical and Electronic Engineering 2, no. 6 (2007): 643–50. http://dx.doi.org/10.1002/tee.20220.
Full textShapovalova, N. N., I. O. Dotsenko, and V. O. Shcherbyna. "User system identification by fingerprint on the basis artificial intelligence methods." Jornal of Kryvyi Rih National University, no. 47 (2018): 81–84. http://dx.doi.org/10.31721/2306-5451-2018-1-47-81-84.
Full textGupta, Himanshu, and Kapil Chauhan. "Role of Biometric security for The Enhancement of Data Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 10 (July 27, 2015): 6184–89. http://dx.doi.org/10.24297/ijct.v14i10.1832.
Full textJiang, Xing Chen, and Jian De Zheng. "An Indirect Fingerprint Authentication Scheme in Cloud Computing." Applied Mechanics and Materials 484-485 (January 2014): 986–90. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.986.
Full textEt.al, Dilip Agarwal. "SmartUAV’sDelivery System using Fingerprint Authentication." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3185–91. http://dx.doi.org/10.17762/turcomat.v12i3.1560.
Full textGufron, Muhammad, Eko Budi Cahyono, and Gita Indah Marthasari. "Sistem Pelaporan Identifikasi Karakter Seorang Anak Berdasarkan Pola Sidik Jari dan Sudut Tangan." Jurnal Repositor 1, no. 1 (October 8, 2019): 17. http://dx.doi.org/10.22219/repositor.v1i1.6.
Full textRathore, Aditya Singh, Chenhan Xu, and Wenyao Xu. "Sonicprint." GetMobile: Mobile Computing and Communications 24, no. 4 (March 15, 2021): 43–46. http://dx.doi.org/10.1145/3457356.3457369.
Full textMary Bastina, A. Amali, and N. Rama. "Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (February 1, 2017): 408. http://dx.doi.org/10.11591/ijece.v7i1.pp408-416.
Full text