You are currently on the new version of our website. Access the old version .

170 Results Found

  • Article
  • Open Access
5 Citations
3,265 Views
23 Pages

19 April 2021

With the recent advances in mobile technologies, biometric verification is being adopted in many smart devices as a means for authenticating their owners. As biometric data leakage may cause stringent privacy issues, many proposals have been offered...

  • Article
  • Open Access
53 Citations
7,420 Views
20 Pages

24 August 2018

Biometric systems designed on wearable technology have substantial differences from traditional biometric systems. Due to their wearable nature, they generally capture noisier signals and can only be trained with signals belonging to the device user...

  • Article
  • Open Access
16 Citations
6,649 Views
18 Pages

An Approach to Biometric Verification Based on Human Body Communication in Wearable Devices

  • Jingzhen Li,
  • Yuhang Liu,
  • Zedong Nie,
  • Wenjian Qin,
  • Zengyao Pang and
  • Lei Wang

10 January 2017

In this paper, an approach to biometric verification based on human body communication (HBC) is presented for wearable devices. For this purpose, the transmission gain S21 of volunteer’s forearm is measured by vector network analyzer (VNA). Specifica...

  • Article
  • Open Access
11 Citations
7,335 Views
18 Pages

6 January 2023

Biometric systems input physical or personal human characteristics for identification, authentication, and security purposes. With the advancement in communication and intelligent security systems, biometrics are programmed to validate electronic sig...

  • Article
  • Open Access
4 Citations
3,378 Views
17 Pages

19 January 2023

In this work we present a bimodal multitask network for audiovisual biometric recognition. The proposed network performs the fusion of features extracted from face and speech data through a weighted sum to jointly optimize the contribution of each mo...

  • Article
  • Open Access
4 Citations
1,526 Views
22 Pages

8 November 2024

Recently, a new set of biometric traits, called medical biometrics, have been explored for human identity verification. This study introduces a novel framework for recognizing human identity through heart sound signals, commonly referred to as phonoc...

  • Article
  • Open Access
7 Citations
3,850 Views
19 Pages

Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication

  • Kamil Adam Kamiński,
  • Andrzej Piotr Dobrowolski,
  • Zbigniew Piotrowski and
  • Przemysław Ścibiorek

7 September 2023

This paper presents a voice biometrics system implemented in a web application as part of a two-factor authentication (2FA) user login. The web-based application, via a client interface, runs registration, preprocessing, feature extraction and normal...

  • Article
  • Open Access
3,205 Views
27 Pages

Ensemble-Based Biometric Verification: Defending Against Multi-Strategy Deepfake Image Generation

  • Hilary Zen,
  • Rohan Wagh,
  • Miguel Wanderley,
  • Gustavo Bicalho,
  • Rachel Park,
  • Megan Sun,
  • Rafael Palacios,
  • Lucas Carvalho,
  • Guilherme Rinaldo and
  • Amar Gupta

Deepfake images, synthetic images created using digital software, continue to present a serious threat to online platforms. This is especially relevant for biometric verification systems, as deepfakes that attempt to bypass such measures increase the...

  • Article
  • Open Access
13 Citations
9,200 Views
23 Pages

Bimodal Biometric Verification Using the Fusion of Palmprint and Infrared Palm-Dorsum Vein Images

  • Chih-Lung Lin,
  • Shih-Hung Wang,
  • Hsu-Yung Cheng,
  • Kuo-Chin Fan,
  • Wei-Lieh Hsu and
  • Chin-Rong Lai

12 December 2015

In this paper, we present a reliable and robust biometric verification method based on bimodal physiological characteristics of palms, including the palmprint and palm-dorsum vein patterns. The proposed method consists of five steps: (1) automaticall...

  • Article
  • Open Access
11 Citations
4,677 Views
17 Pages

16 June 2022

Recent studies have shown how motion-based biometrics can be used as a form of user authentication and identification without requiring any human cooperation. This category of behavioural biometrics deals with the features we learn in our life as a r...

  • Article
  • Open Access
6 Citations
4,086 Views
23 Pages

Multi-Biometric System Based on Cutting-Edge Equipment for Experimental Contactless Verification

  • Lukas Kolda,
  • Ondrej Krejcar,
  • Ali Selamat,
  • Kamil Kuca and
  • Oluwaseun Fadeyi

26 August 2019

Biometric verification methods have gained significant popularity in recent times, which has brought about their extensive usage. In light of theoretical evidence surrounding the development of biometric verification, we proposed an experimental mult...

  • Article
  • Open Access
12 Citations
4,012 Views
25 Pages

18 March 2022

An evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approache...

  • Article
  • Open Access
74 Citations
7,889 Views
16 Pages

20 February 2017

Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that...

  • Article
  • Open Access
10 Citations
4,978 Views
22 Pages

12 April 2022

Eye movement biometrics can enable continuous verification for highly secure environments such as financial transactions and defense establishments, as well as a more personalized and tailored experience in gaze-based human–computer interaction...

  • Article
  • Open Access
2 Citations
1,519 Views
19 Pages

25 November 2024

Background/Objectives: In contrast to traditional biometric modalities, such as facial recognition, fingerprints, and iris scans or even DNA, the research orientation towards chest X-ray recognition has been spurred by its remarkable recognition rate...

  • Article
  • Open Access
2,567 Views
13 Pages

10 September 2021

Handwriting verification is a biometric recognition field that identifies individuals’ unique characteristics contained in their handwriting. A single written character shows subtle differences depending on habits accumulated over time or the manner...

  • Article
  • Open Access
20 Citations
3,160 Views
20 Pages

24 June 2021

Nowadays, Deep Learning tools have been widely applied in biometrics. Electrocardiogram (ECG) biometrics is not the exception. However, the algorithm performances rely heavily on a representative dataset for training. ECGs suffer constant temporal va...

  • Article
  • Open Access
1 Citations
1,276 Views
36 Pages

SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access

  • Daniel Paredes-García,
  • José Álvaro Fernández-Carrasco,
  • Jon Ander Medina López,
  • Juan Camilo Vasquez-Correa,
  • Imanol Jericó Yoldi,
  • Santiago Andrés Moreno-Acevedo,
  • Ander González-Docasal,
  • Haritz Arzelus Irazusta,
  • Aitor Álvarez Muniain and
  • Yeray de Diego Loinaz

2 August 2025

The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowe...

  • Article
  • Open Access
6 Citations
3,517 Views
30 Pages

Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice

  • Krzysztof Milewski,
  • Szymon Zaporowski and
  • Andrzej Czyżewski

30 October 2023

The vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resista...

  • Article
  • Open Access
1 Citations
2,321 Views
14 Pages

Zero-FVeinNet: Optimizing Finger Vein Recognition with Shallow CNNs and Zero-Shuffle Attention for Low-Computational Devices

  • Nghi C. Tran,
  • Bach-Tung Pham,
  • Vivian Ching-Mei Chu,
  • Kuo-Chen Li,
  • Phuong Thi Le,
  • Shih-Lun Chen,
  • Aufaclav Zatu Kusuma Frisky,
  • Yung-Hui Li and
  • Jia-Ching Wang

In the context of increasing reliance on mobile devices, robust personal security solutions are critical. This paper presents Zero-FVeinNet, an innovative, lightweight convolutional neural network (CNN) tailored for finger vein recognition on mobile...

  • Article
  • Open Access
14 Citations
3,388 Views
14 Pages

Template-Driven Knowledge Distillation for Compact and Accurate Periocular Biometrics Deep-Learning Models

  • Fadi Boutros,
  • Naser Damer,
  • Kiran Raja,
  • Florian Kirchbuchner and
  • Arjan Kuijper

1 March 2022

This work addresses the challenge of building an accurate and generalizable periocular recognition model with a small number of learnable parameters. Deeper (larger) models are typically more capable of learning complex information. For this reason,...

  • Article
  • Open Access
12 Citations
4,946 Views
18 Pages

GANBA: Generative Adversarial Network for Biometric Anti-Spoofing

  • Alejandro Gomez-Alanis,
  • Jose A. Gonzalez-Lopez and
  • Antonio M. Peinado

29 January 2022

Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detect...

  • Article
  • Open Access
1,611 Views
20 Pages

Utterance-Style-Dependent Speaker Verification Using Emotional Embedding with Pretrained Models

  • Long Pham Hoang,
  • Hibiki Takayama,
  • Masafumi Nishida,
  • Satoru Tsuge and
  • Shingo Kuroiwa

25 August 2025

Biometric authentication using human physiological and behavioral characteristics has been widely adopted, with speaker verification attracting attention due to its convenience and noncontact nature. Conventional speaker verification systems remain v...

  • Article
  • Open Access
9 Citations
3,822 Views
23 Pages

Distillation of an End-to-End Oracle for Face Verification and Recognition Sensors

  • Francesco Guzzi,
  • Luca De Bortoli,
  • Romina Soledad Molina,
  • Stefano Marsi,
  • Sergio Carrato and
  • Giovanni Ramponi

2 March 2020

Face recognition functions are today exploited through biometric sensors in many applications, from extended security systems to inclusion devices; deep neural network methods are reaching in this field stunning performances. The main limitation of t...

  • Article
  • Open Access
3,169 Views
16 Pages

Online Signature Verification Systems on a Low-Cost FPGA

  • Enrique Cantó Navarro,
  • Rafael Ramos Lara and
  • Mariano López García

31 December 2021

This paper describes three different approaches for the implementation of an online signature verification system on a low-cost FPGA. The system is based on an algorithm, which operates on real numbers using the double-precision floating-point IEEE 7...

  • Article
  • Open Access
16 Citations
7,367 Views
19 Pages

An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks

  • Mariusz Kurowski,
  • Andrzej Sroczyński,
  • Georgis Bogdanis and
  • Andrzej Czyżewski

12 February 2021

Handwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated analysis method for the dynamic electronic representation of handwritten signature authentication was researched. The d...

  • Feature Paper
  • Article
  • Open Access
24 Citations
8,052 Views
17 Pages

Biometric Authentication and Verification for Medical Cyber Physical Systems

  • Abdullah Alhayajneh,
  • Alessandro N. Baccarini,
  • Gary M. Weiss,
  • Thaier Hayajneh and
  • Aydin Farajidavar

14 December 2018

A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS). Preserving us...

  • Article
  • Open Access
31 Citations
3,734 Views
18 Pages

24 April 2019

Finger-vein biometrics has been extensively investigated for personal verification. A challenge is that the finger-vein acquisition is affected by many factors, which results in many ambiguous regions in the finger-vein image. Generally, the separabi...

  • Article
  • Open Access
247 Views
26 Pages

Seamless Vital Signs-Based Continuous Authentication Using Machine Learning

  • Reem Alrawili,
  • Evelyn Sowells-Boone and
  • Saif Al-Dean Qawasmeh

27 December 2025

Biometric authentication is widely regarded as more secure and reliable than conventional approaches like passwords and PINs. Nonetheless, many current systems rely on active user participation, such as fingerprint scanning or facial recognition, whi...

  • Article
  • Open Access
20 Citations
4,021 Views
14 Pages

Biometrics Verification Modality Using Multi-Channel sEMG Wearable Bracelet

  • Sherif Said,
  • Abdullah S. Karar,
  • Taha Beyrouthy,
  • Samer Alkork and
  • Amine Nait-ali

5 October 2020

Electrical biosignals have the potential for use as biometric authenticators, owing to their ability to facilitate liveness detection and concealed nature. In this work, the viability of using surface electromyogram (sEMG) as a biometric modality for...

  • Article
  • Open Access
6 Citations
4,624 Views
17 Pages

Vascular Auscultation of Carotid Artery: Towards Biometric Identification and Verification of Individuals

  • Rutuja Salvi,
  • Patricio Fuentealba,
  • Jasmin Henze,
  • Pinar Bisgin,
  • Thomas Sühn,
  • Moritz Spiller,
  • Anja Burmann,
  • Axel Boese,
  • Alfredo Illanes and
  • Michael Friebe

7 October 2021

Background: Biometric sensing is a security method for protecting information and property. State-of-the-art biometric traits are behavioral and physiological in nature. However, they are vulnerable to tampering and forgery. Methods: The proposed app...

  • Article
  • Open Access
7 Citations
2,287 Views
16 Pages

11 February 2023

Most studies on EEG-based biometry recognition report results based on signal databases, with a limited number of recorded EEG sessions using the same single EEG recording for both training and testing a proposed model. However, the EEG signal is hig...

  • Article
  • Open Access
7 Citations
9,361 Views
22 Pages

ECG Sensor Card with Evolving RBP Algorithms for Human Verification

  • Kuo-Kun Tseng,
  • Huang-Nan Huang,
  • Fufu Zeng and
  • Shu-Yi Tu

21 August 2015

It is known that cardiac and respiratory rhythms in electrocardiograms (ECGs) are highly nonlinear and non-stationary. As a result, most traditional time-domain algorithms are inadequate for characterizing the complex dynamics of the ECG. This paper...

  • Article
  • Open Access
7 Citations
3,669 Views
22 Pages

11 November 2022

Fingerprints have been used for decades to verify the identity of an individual for various security reasons. Attackers have developed many approaches to deceive a fingerprint verification system, ranging from the sensor level, where gummy fingers ar...

  • Article
  • Open Access
5 Citations
15,676 Views
16 Pages

Impact of Aging on Three-Dimensional Facial Verification

  • Farnaz Majid Zadeh Heravi,
  • Elham Farazdaghi,
  • Régis Fournier and
  • Amine Nait-ali

15 October 2019

Age progression is associated with poor performance of verification systems. Thus, there is a need for further research to overcome this problem. Three-dimensional facial aging modeling for employment in verification systems is highly serviceable, an...

  • Article
  • Open Access
39 Citations
7,412 Views
20 Pages

22 January 2020

The fact that every human has a distinctive walking style has prompted a proposal to use gait recognition as an identification criterion. Using end-to-end learning, I investigated whether the center-of-pressure (COP) trajectory is sufficiently unique...

  • Article
  • Open Access
18 Citations
6,582 Views
27 Pages

3 May 2020

This paper presents the development of a hybrid feature—dorsal hand vein and dorsal geometry—modality for human recognition. Our proposed hybrid feature extraction method exploits two types of features: dorsal hand geometric-related and l...

  • Article
  • Open Access
26 Citations
10,111 Views
13 Pages

5 August 2021

Emotions play an indicative and informative role in the investigation of farm animal behaviors. Systems that respond and can measure emotions provide a natural user interface in enabling the digitalization of animal welfare platforms. The faces of fa...

  • Article
  • Open Access
17 Citations
6,253 Views
25 Pages

Behavioral Acoustic Emanations: Attack and Verification of PIN Entry Using Keypress Sounds

  • Sourav Panda,
  • Yuanzhen Liu,
  • Gerhard Petrus Hancke and
  • Umair Mujtaba Qureshi

26 May 2020

This paper explores the security vulnerability of Personal Identification Number (PIN) or numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or passwords) as means of verifying the legitimacy of a user. Today, PEDs are...

  • Article
  • Open Access
5 Citations
2,990 Views
18 Pages

Interval-Based LDA Algorithm for Electrocardiograms for Individual Verification

  • Chulseung Yang,
  • Gi Won Ku,
  • Jeong-Gi Lee and
  • Sang-Hyun Lee

31 August 2020

This paper presents an interval-based LDA (Linear Discriminant Analysis) algorithm for individual verification using ECG (Electrocardiogram). In this algorithm, at first, unwanted noise and power-line interference are removed from the ECG signal. The...

  • Article
  • Open Access
3 Citations
9,147 Views
23 Pages

Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

  • George S. Eskander Ekladious,
  • Robert Sabourin and
  • Eric Granger

Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as s...

  • Review
  • Open Access
2 Citations
4,100 Views
44 Pages

17 March 2025

This work presents a comprehensive and chronologically ordered survey of existing studies and data sources on Electrocardiogram (ECG) based biometric recognition systems. This survey is organized in terms of the two main goals pursued in it: first, a...

  • Article
  • Open Access
43 Citations
10,276 Views
24 Pages

29 December 2018

Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud. Due to the fact that biometric data like fingerprint and iri...

  • Article
  • Open Access
5 Citations
4,641 Views
19 Pages

18 April 2019

Finger-vein biometrics have been extensively investigated for person verification. One of the open issues in finger-vein verification is the lack of robustness against variations of vein patterns due to the changes in physiological and imaging condit...

  • Article
  • Open Access
3 Citations
3,023 Views
21 Pages

An Improved Fuzzy Vector Signature with Reusability

  • Ilhwan Lim,
  • Minhye Seo,
  • Dong Hoon Lee and
  • Jong Hwan Park

14 October 2020

Fuzzy vector signature (FVS) is a new primitive where a fuzzy (biometric) data w is used to generate a verification key (VKw), and, later, a distinct fuzzy (biometric) data w′ (as well as a message) is used to generate a signature (σw&pri...

  • Article
  • Open Access
1 Citations
3,647 Views
22 Pages

17 June 2020

It has recently been shown in Re-Identification (Re-ID) work that full-body images of people reveal their somatotype, even after change in apparel. A significant advantage of this biometric trait is that it can easily be captured, even at a distance,...

  • Review
  • Open Access
65 Citations
13,220 Views
23 Pages

A Review of Homomorphic Encryption for Privacy-Preserving Biometrics

  • Wencheng Yang,
  • Song Wang,
  • Hui Cui,
  • Zhaohui Tang and
  • Yan Li

29 March 2023

The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability,...

  • Article
  • Open Access
8 Citations
4,263 Views
16 Pages

Auditory Perception Based Anti-Spoofing System for Human Age Verification

  • Muhammad Ilyas,
  • Alice Othmani,
  • Régis Fournier and
  • Amine Nait-ali

8 November 2019

Biometric systems are considered an efficient component for identification in the developing modern technologies. The aim of biometric systems is to verify or determine the identity of a user through his/her biological and behavioral characteristics....

  • Article
  • Open Access
8 Citations
3,108 Views
18 Pages

6 January 2024

Biometric recognition techniques have become more developed recently, especially in security and attendance systems. Biometrics are features attached to the human body that are considered safer and more reliable since they are difficult to imitate or...

  • Article
  • Open Access
24 Citations
4,018 Views
23 Pages

Efficient Implementation of Homomorphic and Fuzzy Transforms in Random-Projection Encryption Frameworks for Cancellable Face Recognition

  • Abeer D. Algarni,
  • Ghada M. El Banby,
  • Naglaa F. Soliman,
  • Fathi E. Abd El-Samie and
  • Abdullah M. Iliyasu

To circumvent problems associated with dependence on traditional security systems on passwords, Personal Identification Numbers (PINs) and tokens, modern security systems adopt biometric traits that are inimitable to each individual for identificatio...

of 4