You are currently on the new version of our website. Access the old version .

410 Results Found

  • Article
  • Open Access
102 Citations
13,202 Views
31 Pages

Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing

  • Muhammad Ehatisham-ul-Haq,
  • Muhammad Awais Azam,
  • Jonathan Loo,
  • Kai Shuang,
  • Syed Islam,
  • Usman Naeem and
  • Yasar Amin

6 September 2017

Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted...

  • Systematic Review
  • Open Access
10 Citations
3,583 Views
20 Pages

Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

  • Lateef Adekunle Adebimpe,
  • Ian Ouii Ng,
  • Mohd Yamani Idna Idris,
  • Mohammed Okmi,
  • Chin Soon Ku,
  • Tan Fong Ang and
  • Lip Yee Por

6 September 2023

The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive informatio...

  • Review
  • Open Access
74 Citations
10,912 Views
20 Pages

Recurrent Neural Networks are powerful machine learning frameworks that allow for data to be saved and referenced in a temporal sequence. This opens many new possibilities in fields such as handwriting analysis and speech recognition. This paper seek...

  • Article
  • Open Access
45 Citations
7,283 Views
20 Pages

10 January 2018

Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot...

  • Article
  • Open Access
1 Citations
2,716 Views
44 Pages

Continuous Authentication in Resource-Constrained Devices via Biometric and Environmental Fusion

  • Nida Zeeshan,
  • Makhabbat Bakyt,
  • Naghmeh Moradpoor and
  • Luigi La Spada

12 September 2025

Continuous authentication allows devices to keep checking that the active user is still the rightful owner instead of relying on a single login. However, current methods can be tricked by forging faces, revealing personal data, or draining the batter...

  • Article
  • Open Access
44 Citations
5,734 Views
15 Pages

In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the f...

  • Article
  • Open Access
2 Citations
3,154 Views
21 Pages

25 October 2022

Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode. In the former mode, each user has full control of his/her biometric data, but the authentication...

  • Article
  • Open Access
12 Citations
6,287 Views
17 Pages

26 October 2020

Speaker identification is gaining popularity, with notable applications in security, automation, and authentication. For speaker identification, deep-convolutional-network-based approaches, such as SincNet, are used as an alternative to i-vectors. Co...

  • Article
  • Open Access
11 Citations
4,319 Views
16 Pages

Sex Recognition through ECG Signals aiming toward Smartphone Authentication

  • Jose-Luis Cabra Lopez,
  • Carlos Parra,
  • Libardo Gomez and
  • Luis Trujillo

29 June 2022

Physiological signals are strongly related to a person’s state of health and carry information about the human body. For example, by ECG, it is possible to obtain information about cardiac disease, emotions, personal identification, and the sex...

  • Article
  • Open Access
46 Citations
9,258 Views
18 Pages

10 January 2024

Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from...

  • Article
  • Open Access
9 Citations
6,375 Views
17 Pages

5 July 2021

People tend to display fake expressions to conceal their true feelings. False expressions are observable by facial micromovements that occur for less than a second. Systems designed to recognize facial expressions (e.g., social robots, recognition sy...

  • Article
  • Open Access
49 Citations
7,240 Views
15 Pages

4 December 2020

Attenuated total reflectance-Fourier transform infrared ppectroscopy (ATR-FTIR) proved to be a reliable, rapid, and easy-to-use technique to evaluate vegetable oils quality and authenticity. The spectral range of the middle infrared region (MIR) of F...

  • Article
  • Open Access
1 Citations
1,720 Views
15 Pages

A Hybrid Deep Learning and Feature Descriptor Approach for Partial Fingerprint Recognition

  • Zhi-Sheng Chen,
  • Chrisantonius,
  • Farchan Hakim Raswa,
  • Shang-Kuan Chen,
  • Chung-I Huang,
  • Kuo-Chen Li,
  • Shih-Lun Chen,
  • Yung-Hui Li and
  • Jia-Ching Wang

Partial fingerprint recognition has emerged as a critical method for verifying user authenticity during mobile transactions. As a result, there is a pressing need to develop techniques that effectively and accurately authenticate users, even when the...

  • Review
  • Open Access
90 Citations
20,109 Views
35 Pages

Masked Face Recognition Using Deep Learning: A Review

  • Ahmad Alzu’bi,
  • Firas Albalas,
  • Tawfik AL-Hadhrami,
  • Lojin Bani Younis and
  • Amjad Bashayreh

31 October 2021

A large number of intelligent models for masked face recognition (MFR) has been recently presented and applied in various fields, such as masked face tracking for people safety or secure authentication. Exceptional hazards such as pandemics and fraud...

  • Article
  • Open Access
2 Citations
2,230 Views
17 Pages

With the proliferation of WiFi devices, WiFi-based identification technology has garnered attention in the security domain and has demonstrated initial success. Nonetheless, when untrained illegitimate users appear, the classifier tends to categorize...

  • Article
  • Open Access
12 Citations
5,241 Views
21 Pages

23 May 2023

Palm vein recognition has received some considerable attention regarding its use in biometric identification. Palm vein characteristics offer a superior level of security and reliability in personal identification compared to extrinsic methods such a...

  • Review
  • Open Access
728 Views
22 Pages

Exploring the Security of Mobile Face Recognition: Attacks, Defenses, and Future Directions

  • Elísabet Líf Birgisdóttir,
  • Michał Ignacy Kunkel,
  • Lukáš Pleva,
  • Maria Papaioannou,
  • Gaurav Choudhary and
  • Nicola Dragoni

17 December 2025

Biometric authentication on smartphones has advanced rapidly in recent years, with face recognition becoming the dominant modality due to its convenience and easy integration with modern mobile hardware. However, despite these developments, smartphon...

  • Article
  • Open Access
1 Citations
958 Views
18 Pages

31 October 2025

Background/Objectives: Developmental prosopagnosia (DP) is a neurodevelopmental disorder marked by lifelong face recognition difficulties. The 20-item Prosopagnosia Index (PI-20) has become an important tool for screening individuals with DP and has...

  • Article
  • Open Access
374 Views
44 Pages

24 December 2025

Iris recognition continues to pose challenges for deep learning models, despite its status as one of the most reliable biometric authentication techniques. These challenges become more pronounced when training data is limited, as subtle, high-dimensi...

  • Article
  • Open Access
2,511 Views
23 Pages

20 September 2024

In the rapidly evolving field of biometric authentication, deep learning has become a cornerstone technology for face detection and recognition tasks. However, traditional optimizers often struggle with challenges such as overfitting, slow convergenc...

  • Article
  • Open Access
60 Citations
9,029 Views
20 Pages

28 February 2017

The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is sti...

  • Feature Paper
  • Article
  • Open Access
19 Citations
2,973 Views
11 Pages

Opportunities and Constraints in Applying Artificial Neural Networks (ANNs) in Food Authentication. Honey—A Case Study

  • Ariana Raluca Hategan,
  • Romulus Puscas,
  • Gabriela Cristea,
  • Adriana Dehelean,
  • Francois Guyon,
  • Arthur Jozsef Molnar,
  • Valentin Mirel and
  • Dana Alina Magdas

22 July 2021

The present work aims to test the potential of the application of Artificial Neural Networks (ANNs) for food authentication. For this purpose, honey was chosen as the working matrix. The samples were originated from two countries: Romania (50) and Fr...

  • Article
  • Open Access
2 Citations
1,004 Views
18 Pages

14 April 2025

Traditional user authentication mechanisms in information systems, such as passwords and biometrics, remain vulnerable to forgery, theft, and privacy breaches. To address these limitations, this study proposes a two-factor authentication framework th...

  • Article
  • Open Access
10 Citations
4,730 Views
23 Pages

1 March 2023

The manner of walking (gait) is a powerful biometric that is used as a unique fingerprinting method, allowing unobtrusive behavioral analytics to be performed at a distance without subject cooperation. As opposed to more traditional biometric authent...

  • Article
  • Open Access
32 Citations
7,051 Views
14 Pages

An Identity Authentication Method Combining Liveness Detection and Face Recognition

  • Shuhua Liu,
  • Yu Song,
  • Mengyu Zhang,
  • Jianwei Zhao,
  • Shihao Yang and
  • Kun Hou

31 October 2019

In this study, an advanced Kinect sensor was adopted to acquire infrared radiation (IR) images for liveness detection. The proposed liveness detection method based on infrared radiation (IR) images can deal with face spoofs. Face pictures were acquir...

  • Article
  • Open Access
1,324 Views
18 Pages

30 September 2025

Facial recognition systems are increasingly used for authentication across domains such as finance, e-commerce, and public services, but their growing adoption raises significant concerns about spoofing attacks enabled by printed photos, replayed vid...

  • Article
  • Open Access
7 Citations
3,852 Views
19 Pages

Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication

  • Kamil Adam Kamiński,
  • Andrzej Piotr Dobrowolski,
  • Zbigniew Piotrowski and
  • Przemysław Ścibiorek

7 September 2023

This paper presents a voice biometrics system implemented in a web application as part of a two-factor authentication (2FA) user login. The web-based application, via a client interface, runs registration, preprocessing, feature extraction and normal...

  • Article
  • Open Access
2 Citations
3,215 Views
16 Pages

10 November 2022

A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of...

  • Article
  • Open Access
10 Citations
3,176 Views
20 Pages

15 January 2024

In the current context in which user authentication is the first line of defense against emerging attacks and can be considered a defining element of any security infrastructure, the need to adopt alternative, non-invasive, contactless, and scalable...

  • Article
  • Open Access
1,260 Views
13 Pages

13 August 2025

Accurately discerning the authenticity of facial expressions is crucial for inferring others’ psychological states and behavioral intentions, particularly in shaping interpersonal trust dynamics among elementary school children. While existing...

  • Article
  • Open Access
5 Citations
3,433 Views
18 Pages

User Authentication Recognition Process Using Long Short-Term Memory Model

  • Bengie L. Ortiz,
  • Vibhuti Gupta,
  • Jo Woon Chong,
  • Kwanghee Jung and
  • Tim Dallas

User authentication (UA) is the process by which biometric techniques are used by a person to gain access to a physical or virtual site. UA has been implemented in various applications such as financial transactions, data privacy, and access control....

  • Article
  • Open Access
19 Citations
5,148 Views
17 Pages

10 August 2021

Fourier transform infrared spectroscopy on the middle infrared region (ATR-FTIR-MIR) proved to be a convenient and reliable technique to evaluate foods’ quality and authenticity. Plants’ essential oils are bioactive mixtures used as such or in differ...

  • Article
  • Open Access
17 Citations
4,736 Views
15 Pages

25 December 2020

The objective of this study was to develop a rapid technique to authenticate potato chip frying oils using vibrational spectroscopy signatures in combination with pattern recognition analysis. Potato chip samples (n = 118) were collected from local g...

  • Article
  • Open Access
14 Citations
9,200 Views
15 Pages

22 February 2022

The role that authenticity plays in tourism is debatable. Researchers have focused on the nature of authenticity, while the natural landscape is taken for granted as authentic. “Landscape” is the symbolic environment created by human acts...

  • Article
  • Open Access
23 Citations
3,674 Views
20 Pages

Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis

  • Haowen Tan,
  • Yuanzhao Song,
  • Shichang Xuan,
  • Sungbum Pan and
  • Ilyong Chung

1 August 2019

Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and h...

  • Article
  • Open Access
38 Citations
5,470 Views
15 Pages

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

  • Aveen Dayal,
  • Naveen Paluru,
  • Linga Reddy Cenkeramaddi,
  • Soumya J. and
  • Phaneendra K. Yalavarthy

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and survei...

  • Article
  • Open Access
6 Citations
3,206 Views
18 Pages

13 December 2022

Image recognition technology systems have existed in the realm of computer security since nearly the inception of electronics, and have seen vast improvements in recent years. Currently implemented facial detection systems regularly achieve accuracy...

  • Feature Paper
  • Article
  • Open Access
22 Citations
4,878 Views
15 Pages

Electronic Nose Analysis to Detect Milk Obtained from Pasture-Raised Goats

  • Andrea Balivo,
  • Simone Cipolletta,
  • Raffaella Tudisco,
  • Piera Iommelli,
  • Raffaele Sacchi and
  • Alessandro Genovese

8 January 2023

The nutritional peculiarities of dairy products made with milk from pasture-fed ruminants would require a rapid control to be authenticated and limit the risk of fraud. In the current study, ninety milk samples from two groups of goats were analysed...

  • Article
  • Open Access
11 Citations
2,319 Views
18 Pages

Secure CAPTCHA by Genetic Algorithm (GA) and Multi-Layer Perceptron (MLP)

  • Saman Shojae Chaeikar,
  • Fatemeh Mirzaei Asl,
  • Saeid Yazdanpanah,
  • Mazdak Zamani,
  • Azizah Abdul Manaf and
  • Touraj Khodadadi

29 September 2023

To achieve an acceptable level of security on the web, the Completely Automatic Public Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to prevent bots from doing destructive actions such as downloading or signing up. S...

  • Article
  • Open Access
2 Citations
2,668 Views
26 Pages

Blockchain-Based Multistage Continuous Authentication for Smart Devices

  • Yue Yao,
  • Xiaomei Zhang,
  • Haomin Hu,
  • Huibin Liu,
  • Rong Huang and
  • Zejie Wang

24 November 2023

With the increasing connectivity between multiple smart devices in the Internet of Vehicles, privacy and security have become stringent threats due to unauthorized access. To overcome this issue, designing continuous authentication systems has become...

  • Article
  • Open Access
35 Citations
4,454 Views
23 Pages

Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices

  • Xin Zeng,
  • Xiaomei Zhang,
  • Shuqun Yang,
  • Zhicai Shi and
  • Chihung Chi

5 July 2021

Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accur...

  • Article
  • Open Access
15 Citations
3,208 Views
16 Pages

Composition Profiling and Authenticity Assessment of Camellia Oil Using High Field and Low Field 1H NMR

  • Meijun Xing,
  • Shenghao Wang,
  • Jianzhong Lin,
  • Feng Xia,
  • Jianghua Feng and
  • Guiping Shen

5 August 2021

Camellia oil (CA), mainly produced in southern China, has always been called Oriental olive oil (OL) due to its similar physicochemical properties to OL. The high nutritional value and high selling price of CA make mixing it with other low-quality oi...

  • Article
  • Open Access
18 Citations
4,057 Views
18 Pages

A Novel ROI Extraction Method Based on the Characteristics of the Original Finger Vein Image

  • Huimin Lu,
  • Yifan Wang,
  • Ruoran Gao,
  • Chengcheng Zhao and
  • Yang Li

27 June 2021

As the second generation of biometric technology, finger vein recognition has become a research hotspot due to its advantages such as high security, and living body recognition. In recent years, the global pandemic has promoted the development of con...

  • Feature Paper
  • Article
  • Open Access
7 Citations
4,932 Views
33 Pages

S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information

  • Juan Manuel Espín López,
  • Alberto Huertas Celdrán,
  • Javier G. Marín-Blázquez,
  • Francisco Esquembre and
  • Gregorio Martínez Pérez

28 May 2021

Continuous authentication systems have been proposed as a promising solution to authenticate users in smartphones in a non-intrusive way. However, current systems have important weaknesses related to the amount of data or time needed to build precise...

  • Review
  • Open Access
303 Citations
17,017 Views
39 Pages

Inertial Sensor-Based Gait Recognition: A Review

  • Sebastijan Sprager and
  • Matjaz B. Juric

2 September 2015

With the recent development of microelectromechanical systems (MEMS), inertial sensors have become widely used in the research of wearable gait analysis due to several factors, such as being easy-to-use and low-cost. Considering the fact that each in...

  • Article
  • Open Access
18 Citations
4,070 Views
13 Pages

25 May 2018

Food fraud, the sale of goods that have in some way been mislabelled or tampered with, is an increasing concern, with a number of high profile documented incidents in recent years. These recent incidents and their scope show that there are gaps in th...

  • Article
  • Open Access
2 Citations
4,206 Views
24 Pages

15 July 2024

By leveraging artificial intelligence and big data to analyze and assess classroom conditions, we can significantly enhance teaching quality. Nevertheless, numerous existing studies primarily concentrate on evaluating classroom conditions for student...

  • Article
  • Open Access
1 Citations
3,523 Views
19 Pages

A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data

  • Abdulrahman Hussian,
  • Foud Murshed,
  • Mohammed Nasser Alandoli and
  • Ghalib Aljafari

Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks. Addressing these...

  • Article
  • Open Access
31 Citations
18,914 Views
42 Pages

Deepfake Media Forensics: Status and Future Challenges

  • Irene Amerini,
  • Mauro Barni,
  • Sebastiano Battiato,
  • Paolo Bestagini,
  • Giulia Boato,
  • Vittoria Bruni,
  • Roberto Caldelli,
  • Francesco De Natale,
  • Rocco De Nicola and
  • Domenico Vitulano
  • + 13 authors

28 February 2025

The rise of AI-generated synthetic media, or deepfakes, has introduced unprecedented opportunities and challenges across various fields, including entertainment, cybersecurity, and digital communication. Using advanced frameworks such as Generative A...

of 9