Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (126)

Search Parameters:
Keywords = mobile biometric

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 3102 KiB  
Article
A Multicomponent Face Verification and Identification System
by Athanasios Douklias, Ioannis Zorzos, Evangelos Maltezos, Vasilis Nousis, Spyridon Nektarios Bolierakis, Lazaros Karagiannidis, Eleftherios Ouzounoglou and Angelos Amditis
Appl. Sci. 2025, 15(15), 8161; https://doi.org/10.3390/app15158161 - 22 Jul 2025
Viewed by 237
Abstract
Face recognition technology is a biometric technology, which is based on the identification or verification of facial features. Automatic face recognition is an active research field in the context of computer vision and artificial intelligence (AI) that is fundamental for a variety of [...] Read more.
Face recognition technology is a biometric technology, which is based on the identification or verification of facial features. Automatic face recognition is an active research field in the context of computer vision and artificial intelligence (AI) that is fundamental for a variety of real-time applications. In this research, the design and implementation of a face verification and identification system of a flexible, modular, secure, and scalable architecture is proposed. The proposed system incorporates several and various types of system components: (i) portable capabilities (mobile application and mixed reality [MR] glasses), (ii) enhanced monitoring and visualization via a user-friendly Web-based user interface (UI), and (iii) information sharing via middleware to other external systems. The experiments showed that such interconnected and complementary system components were able to perform robust and real-time results related to face identification and verification. Furthermore, to identify a proper model of high accuracy, robustness, and performance speed for face identification and verification tasks, a comprehensive evaluation of multiple face recognition pre-trained models (FaceNet, ArcFace, Dlib, and MobileNetV2) on a curated version of the ID vs. Spot dataset was performed. Among the models used, FaceNet emerged as a preferable choice for real-time tasks due to its balance between accuracy and inference speed for both face identification and verification tasks achieving AUC of 0.99, Rank-1 of 91.8%, Rank-5 of 95.8%, FNR of 2% and FAR of 0.1%, accuracy of 98.6%, and inference speed of 52 ms. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Image Processing)
Show Figures

Figure 1

15 pages, 770 KiB  
Data Descriptor
NPFC-Test: A Multimodal Dataset from an Interactive Digital Assessment Using Wearables and Self-Reports
by Luis Fernando Morán-Mirabal, Luis Eduardo Güemes-Frese, Mariana Favarony-Avila, Sergio Noé Torres-Rodríguez and Jessica Alejandra Ruiz-Ramirez
Data 2025, 10(7), 103; https://doi.org/10.3390/data10070103 - 30 Jun 2025
Viewed by 432
Abstract
The growing implementation of digital platforms and mobile devices in educational environments has generated the need to explore new approaches for evaluating the learning experience beyond traditional self-reports or instructor presence. In this context, the NPFC-Test dataset was created from an experimental protocol [...] Read more.
The growing implementation of digital platforms and mobile devices in educational environments has generated the need to explore new approaches for evaluating the learning experience beyond traditional self-reports or instructor presence. In this context, the NPFC-Test dataset was created from an experimental protocol conducted at the Experiential Classroom of the Institute for the Future of Education. The dataset was built by collecting multimodal indicators such as neuronal, physiological, and facial data using a portable EEG headband, a medical-grade biometric bracelet, a high-resolution depth camera, and self-report questionnaires. The participants were exposed to a digital test lasting 20 min, composed of audiovisual stimuli and cognitive challenges, during which synchronized data from all devices were gathered. The dataset includes timestamped records related to emotional valence, arousal, and concentration, offering a valuable resource for multimodal learning analytics (MMLA). The recorded data were processed through calibration procedures, temporal alignment techniques, and emotion recognition models. It is expected that the NPFC-Test dataset will support future studies in human–computer interaction and educational data science by providing structured evidence to analyze cognitive and emotional states in learning processes. In addition, it offers a replicable framework for capturing synchronized biometric and behavioral data in controlled academic settings. Full article
Show Figures

Figure 1

24 pages, 589 KiB  
Article
FaceCloseup: Enhancing Mobile Facial Authentication with Perspective Distortion-Based Liveness Detection
by Yingjiu Li, Yan Li and Zilong Wang
Computers 2025, 14(7), 254; https://doi.org/10.3390/computers14070254 - 27 Jun 2025
Viewed by 644
Abstract
Facial authentication has gained widespread adoption as a biometric authentication method, offering a convenient alternative to traditional password-based systems, particularly on mobile devices equipped with front-facing cameras. While this technology enhances usability and security by eliminating password management, it remains highly susceptible to [...] Read more.
Facial authentication has gained widespread adoption as a biometric authentication method, offering a convenient alternative to traditional password-based systems, particularly on mobile devices equipped with front-facing cameras. While this technology enhances usability and security by eliminating password management, it remains highly susceptible to spoofing attacks. Adversaries can exploit facial recognition systems using pre-recorded photos, videos, or even sophisticated 3D models of victims’ faces to bypass authentication mechanisms. The increasing availability of personal images on social media further amplifies this risk, making robust anti-spoofing mechanisms essential for secure facial authentication. To address these challenges, we introduce FaceCloseup, a novel liveness detection technique that strengthens facial authentication by leveraging perspective distortion inherent in close-up shots of real, 3D faces. Instead of relying on additional sensors or user-interactive gestures, FaceCloseup passively analyzes facial distortions in video frames captured by a mobile device’s camera, improving security without compromising user experience. FaceCloseup effectively distinguishes live faces from spoofed attacks by identifying perspective-based distortions across different facial regions. The system achieves a 99.48% accuracy in detecting common spoofing methods—including photo, video, and 3D model-based attacks—and demonstrates 98.44% accuracy in differentiating between individual users. By operating entirely on-device, FaceCloseup eliminates the need for cloud-based processing, reducing privacy concerns and potential latency in authentication. Its reliance on natural device movement ensures a seamless authentication experience while maintaining robust security. Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT Era)
Show Figures

Figure 1

43 pages, 2755 KiB  
Systematic Review
Analyzing Visitor Behavior to Enhance Personalized Experiences in Smart Museums: A Systematic Literature Review
by Rosen Ivanov and Victoria Velkova
Computers 2025, 14(5), 191; https://doi.org/10.3390/computers14050191 - 14 May 2025
Cited by 3 | Viewed by 2646
Abstract
This systematic review provides an analysis of information gathered from 33 chosen publications during the past decade. The analysis reveals the primary methodologies applied and identifies the visitor behaviors that enable personalized content delivery. Statistical and Data Analysis is the predominant methodology in [...] Read more.
This systematic review provides an analysis of information gathered from 33 chosen publications during the past decade. The analysis reveals the primary methodologies applied and identifies the visitor behaviors that enable personalized content delivery. Statistical and Data Analysis is the predominant methodology in the reviewed publications. The methodology is present in 97% of the publications. AI and Machine Learning (63.6%) and Mobile/Interactive Technologies (60.6%) are most frequently paired with this methodology. Behavioral Analytics Platforms and Mobile/Wearable Devices are the most used technologies (42.4%) for delivering personalized content. A total of 39.4% of publications utilize Location Tracking Systems. The most frequent visitor behavior analysis focuses on Interactive Engagement and Movement Patterns, which occur 72.7% of the time, before Learning Patterns and Physical Positioning, which occur 63.6% of the time. The behavioral analysis of Group Dynamics (27.3%) and Emotional Response (18.2%) represents the least common practice when museums personalize their content despite the significance of social interaction analysis among visitors. The leading content personalization methods currently include real-time personalization systems combined with AI-driven systems and location-based technologies. Personalized content delivery systems face challenges including privacy protection and scalability issues paired with expensive implementation costs, which especially affect smaller museums. Researchers should explore how new technologies, such as virtual reality, augmented reality, and advanced biometric systems, can be integrated into future developments. Full article
Show Figures

Graphical abstract

28 pages, 587 KiB  
Article
A Privacy-Preserving Authentication Scheme Using PUF and Biometrics for IoT-Enabled Smart Cities
by Chaeeon Kim, Seunghwan Son and Youngho Park
Electronics 2025, 14(10), 1953; https://doi.org/10.3390/electronics14101953 - 11 May 2025
Cited by 1 | Viewed by 520
Abstract
With the advancement of communication technology, smart cities can provide remote services to users using mobile devices and Internet of Things (IoT) sensors in real time. However, the collected data in smart cities include sensitive personal information and data transmitted over public wireless [...] Read more.
With the advancement of communication technology, smart cities can provide remote services to users using mobile devices and Internet of Things (IoT) sensors in real time. However, the collected data in smart cities include sensitive personal information and data transmitted over public wireless channels, leaving the network vulnerable to security attacks. Thus, robust and secure authentication is critical to verify legitimate users and prevent malicious attacks. This paper reviews a recent authentication scheme for smart cities and identifies its susceptibilities to attacks, including insider attacks, sensor node capture, user impersonation, and random number leakage. We propose a secure and privacy-preserving authentication scheme for smart cities to resolve these security weaknesses. The scheme enables mutual authentication by incorporating biometric features to verify identity and using the physical unclonable function to prevent physical attacks. We evaluate the security of the proposed scheme via informal and formal analyses, including Burrows–Abadi–Needham logic, the real-or-random model, and the Automated Validation of Internet Security Protocols and Applications simulation tool. Finally, we compare the performance, demonstrating that the proposed scheme has better efficiency and security than existing schemes. Consequently, the proposed scheme is suitable for resource-constrained IoT-enabled smart cities. Full article
(This article belongs to the Special Issue Intelligent Solutions for Network and Cyber Security)
Show Figures

Figure 1

35 pages, 1880 KiB  
Article
Strengthening Cybersecurity Resilience: An Investigation of Customers’ Adoption of Emerging Security Tools in Mobile Banking Apps
by Irfan Riasat, Mahmood Shah and M. Sinan Gonul
Computers 2025, 14(4), 129; https://doi.org/10.3390/computers14040129 - 1 Apr 2025
Cited by 1 | Viewed by 2109
Abstract
The rise in internet-based services has raised risks of data exposure. The manipulation and exploitation of sensitive data significantly impact individuals’ resilience—the ability to protect and prepare against cyber incidents. Emerging technologies seek to enhance cybersecurity resilience by developing various security tools. This [...] Read more.
The rise in internet-based services has raised risks of data exposure. The manipulation and exploitation of sensitive data significantly impact individuals’ resilience—the ability to protect and prepare against cyber incidents. Emerging technologies seek to enhance cybersecurity resilience by developing various security tools. This study aims to explore the adoption of security tools using a qualitative research approach. Twenty-two semi-structured interviews were conducted with users of mobile banking apps from Pakistan. Data were analyzed using thematic analysis, which revealed that biometric authentication and SMS alerts are commonly used. Limited use of multifactor authentication has been observed, mainly due to a lack of awareness or implementation knowledge. Passwords are still regarded as a trusted and secure mechanism. The findings indicate that the adoption of security tools is based on perceptions of usefulness, perceived trust, and perceived ease of use, while knowledge and awareness play a moderating role. This study also proposes a framework by extending TAM to include multiple security tools and introducing knowledge and awareness as a moderator influencing users’ perceptions. The findings inform practical implications for financial institutions, application developers, and policymakers to ensure standardized policy to include security tools in online financial platforms, thereby enhancing overall cybersecurity resilience. Full article
Show Figures

Figure 1

14 pages, 2599 KiB  
Article
Rotary Paraplow: A New Tool for Soil Tillage for Sugarcane
by Cezario B. Galvão, Angel P. Garcia, Ingrid N. de Oliveira, Elizeu S. de Lima, Lenon H. Lovera, Artur V. A. Santos, Zigomar M. de Souza and Daniel Albiero
AgriEngineering 2025, 7(3), 61; https://doi.org/10.3390/agriengineering7030061 - 28 Feb 2025
Viewed by 818
Abstract
The sugarcane cultivation has used heavy machinery on a large scale, which causes soil compaction. The minimum tillage has been used to reduce the traffic of machines on the crop, but there is a lack of appropriate tools for the implementation of this [...] Read more.
The sugarcane cultivation has used heavy machinery on a large scale, which causes soil compaction. The minimum tillage has been used to reduce the traffic of machines on the crop, but there is a lack of appropriate tools for the implementation of this technique, especially in sugarcane areas. The University of Campinas—UNICAMP developed a conservation soil tillage tool called “Rotary paraplow”, the idea was to join the concepts of a vertical milling cutter with the paraplow, which is a tool for subsoiling without inversion of soil. The rotary paraplow is a conservationist tillage because it mobilizes only the planting line with little disturbance of the soil surface and does the tillage with the straw in the area. These conditions make this study pioneering in nature, by proposing an equipment developed to address these issues as an innovation in the agricultural machinery market. We sought to evaluate soil tillage using rotary paraplow and compare it with conventional tillage, regarding soil physical properties and yield. The experiment was conducted in an Oxisol in the city of Jaguariuna, Brazil. The comparison was made between the soil physical properties: soil bulk density, porosity, macroporosity, microporosity and penetration resistance. At the end, a biometric evaluation of the crop was carried out in both areas. The soil properties showed few statistically significant variations, and the production showed no statistical difference. The rotary paraplow proved to be an applicable tool in the cultivation of sugarcane and has the advantage of being an invention adapted to Brazilian soils, bringing a new form of minimal tillage to areas of sugarcane with less tilling on the soil surface, in addition to reducing machine traffic. Full article
(This article belongs to the Collection Research Progress of Agricultural Machinery Testing)
Show Figures

Figure 1

25 pages, 11115 KiB  
Article
Enhancing Banking Transaction Security with Fractal-Based Image Steganography Using Fibonacci Sequences and Discrete Wavelet Transform
by Alina Iuliana Tabirca, Catalin Dumitrescu and Valentin Radu
Fractal Fract. 2025, 9(2), 95; https://doi.org/10.3390/fractalfract9020095 - 2 Feb 2025
Cited by 1 | Viewed by 1555
Abstract
The growing reliance on digital banking and financial transactions has brought significant security challenges, including data breaches and unauthorized access. This paper proposes a robust method for enhancing the security of banking and financial transactions. In this context, steganography—hiding information within digital media—is [...] Read more.
The growing reliance on digital banking and financial transactions has brought significant security challenges, including data breaches and unauthorized access. This paper proposes a robust method for enhancing the security of banking and financial transactions. In this context, steganography—hiding information within digital media—is valuable for improving data protection. This approach combines biometric authentication, using face and voice recognition, with image steganography to secure communication channels. A novel application of Fibonacci sequences is introduced within a direct-sequence spread-spectrum (DSSS) system for encryption, along with a discrete wavelet transform (DWT) for embedding data. The secret message, encrypted through Fibonacci sequences, is concealed within an image and tested for effectiveness using the Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The experimental results demonstrate that the proposed method achieves a high PSNR, particularly for grayscale images, enhancing the robustness of security measures in mobile and online banking environments. Full article
Show Figures

Figure 1

53 pages, 1198 KiB  
Review
A Review on Secure Authentication Mechanisms for Mobile Security
by Syed Shabih Ul Hasan, Anwar Ghani, Ali Daud, Habib Akbar and Muhammad Faizan Khan
Sensors 2025, 25(3), 700; https://doi.org/10.3390/s25030700 - 24 Jan 2025
Cited by 1 | Viewed by 5641
Abstract
Cybersecurity, complimenting authentication, has become the backbone of the Internet of Things. In the authentication process, the word authentication is of the utmost importance, as it is the door through which both Mr. Right Guy and Mr. Wrong Guy can pass. It is [...] Read more.
Cybersecurity, complimenting authentication, has become the backbone of the Internet of Things. In the authentication process, the word authentication is of the utmost importance, as it is the door through which both Mr. Right Guy and Mr. Wrong Guy can pass. It is the key to opening the most important and secure accounts worldwide. When authentication is complete, surely there will be passwords. Passwords are a brain-confusing option for the user to choose when making an account during the registration/sign-up process. Providing reliable, effective, and privacy-preserving authentication for individuals in mobile networks is challenging due to user mobility, many attack vectors, and resource-constrained devices. This review paper explores the transformation and modern mobile authentication schemes, categorizing them into password, graphical, behavioral, keystroke, biometric, touchscreen, color, and gaze-based methodologies. It aims to examine the strengths and limitations focused on challenges like security and usability. Standard datasets and performance evaluation measures are also discussed. Finally, research gaps and future directions in this essential and emerging area of research are discussed. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

13 pages, 615 KiB  
Article
Wearable Sensor-Based Behavioral User Authentication Using a Hybrid Deep Learning Approach with Squeeze-and-Excitation Mechanism
by Sakorn Mekruksavanich and Anuchit Jitpattanakul
Computers 2024, 13(12), 337; https://doi.org/10.3390/computers13120337 - 14 Dec 2024
Viewed by 1858
Abstract
Behavior-based user authentication has arisen as a viable method for strengthening cybersecurity in an age of pervasive wearable and mobile technologies. This research introduces an innovative approach for ongoing user authentication via behavioral biometrics obtained from wearable sensors. We present a hybrid deep [...] Read more.
Behavior-based user authentication has arisen as a viable method for strengthening cybersecurity in an age of pervasive wearable and mobile technologies. This research introduces an innovative approach for ongoing user authentication via behavioral biometrics obtained from wearable sensors. We present a hybrid deep learning network called SE-DeepConvNet, which integrates a squeeze-and-excitation (SE) method to proficiently simulate and authenticate user behavior characteristics. Our methodology utilizes data collected by wearable sensors, such as accelerometers, gyroscopes, and magnetometers, to obtain a thorough behavioral appearance. The suggested network design integrates convolutional neural networks for spatial feature extraction, while the SE blocks improve feature identification by flexibly recalibrating channel-wise feature responses. Experiments performed on two datasets, HMOG and USC-HAD, indicate the efficacy of our technique across different tasks. In the HMOG dataset, SE-DeepConvNet attains a minimal equal error rate (EER) of 0.38% and a maximum accuracy of 99.78% for the Read_Walk activity. Our model presents outstanding authentication (0% EER, 100% accuracy) for various walking activities in the USC-HAD dataset, encompassing intricate situations such as ascending and descending stairs. These findings markedly exceed existing deep learning techniques, demonstrating the promise of our technology for secure and inconspicuous continuous authentication in wearable devices. The suggested approach demonstrates the potential for use in individual device security, access management, and ongoing uniqueness verification in sensitive settings. Full article
(This article belongs to the Special Issue Computational Science and Its Applications 2024 (ICCSA 2024))
Show Figures

Graphical abstract

21 pages, 11115 KiB  
Review
Mobile Devices in Forest Mensuration: A Review of Technologies and Methods in Single Tree Measurements
by Robert Magnuson, Yousef Erfanifard, Maksymilian Kulicki, Torana Arya Gasica, Elvis Tangwa, Miłosz Mielcarek and Krzysztof Stereńczak
Remote Sens. 2024, 16(19), 3570; https://doi.org/10.3390/rs16193570 - 25 Sep 2024
Cited by 5 | Viewed by 3464
Abstract
Mobile devices such as smartphones, tablets or similar devices are becoming increasingly important as measurement devices in forestry due to their advanced sensors, including RGB cameras and LiDAR systems. This review examines the current state of applications of mobile devices for measuring biometric [...] Read more.
Mobile devices such as smartphones, tablets or similar devices are becoming increasingly important as measurement devices in forestry due to their advanced sensors, including RGB cameras and LiDAR systems. This review examines the current state of applications of mobile devices for measuring biometric characteristics of individual trees and presents technologies, applications, measurement accuracy and implementation barriers. Passive sensors, such as RGB cameras have proven their potential for 3D reconstruction and analysing point clouds that improve single tree-level information collection. Active sensors with LiDAR-equipped smartphones provide precise quantitative measurements but are limited by specific hardware requirements. The combination of passive and active sensing techniques has shown significant potential for comprehensive data collection. The methods of data collection, both physical and digital, significantly affect the accuracy and reproducibility of measurements. Applications such as ForestScanner and TRESTIMATM have automated the measurement of tree characteristics and simplified data collection. However, environmental conditions and sensor limitations pose a challenge. There are also computational obstacles, as many methods require significant post-processing. The review highlights the advances in mobile device-based forestry applications and emphasizes the need for standardized protocols and cross-device benchmarking. Future research should focus on developing robust algorithms and cost-effective solutions to improve measurement accuracy and accessibility. While mobile devices offer significant potential for forest surveying, overcoming the above-mentioned challenges is critical to optimizing their application in forest management and protection. Full article
Show Figures

Figure 1

16 pages, 1194 KiB  
Article
CoreTemp: Coreset Sampled Templates for Multimodal Mobile Biometrics
by Jaeho Yoon, Jaewoo Park, Jungyun Kim and Andrew Beng Jin Teoh
Appl. Sci. 2024, 14(12), 5183; https://doi.org/10.3390/app14125183 - 14 Jun 2024
Viewed by 1618
Abstract
Smart devices have become the core ingredient in maintaining human society, where their applications span basic telecommunication, entertainment, education, and even critical security tasks. However, smartphone security measures have not kept pace with their ubiquitousness and convenience, exposing users to potential security breaches. [...] Read more.
Smart devices have become the core ingredient in maintaining human society, where their applications span basic telecommunication, entertainment, education, and even critical security tasks. However, smartphone security measures have not kept pace with their ubiquitousness and convenience, exposing users to potential security breaches. Shading light on shortcomings of traditional security measures such as PINs gives rise to biometrics-based security measures. Open-set authentication with pretrained Transformers especially shows competitive performance in this context. Bringing this closer to practice, we propose CoreTemp, a greedy coreset sampled template, which offers substantially faster authentication speeds. In parallel with CoreTemp, we design a fast match algorithm where the combination shows robust performance in open-set mobile biometrics authentication. Designed to resemble the effects of ensembles with marginal increment in computation, we propose PIEformer+, where its application with CoreTemp has state-of-the-art performance. Benefiting from much more efficient authentication speeds to the best of our knowledge, we are the first to attempt identification in this context. Our proposed methodology achieves state-of-the-art results on HMOG and BBMAS datasets, particularly with much lower computational costs. In summary, this research introduces a novel integration of greedy coreset sampling with an advanced form of pretrained, implicitly ensembled Transformers (PIEformer+), greatly enhancing the speed and efficiency of mobile biometrics authentication, and also enabling identification, which sets a new benchmark in the relevant field. Full article
(This article belongs to the Special Issue Advanced Technologies in Gait Recognition)
Show Figures

Figure 1

14 pages, 761 KiB  
Article
Online Signature Biometrics for Mobile Devices
by Katarzyna Roszczewska and Ewa Niewiadomska-Szynkiewicz
Sensors 2024, 24(11), 3524; https://doi.org/10.3390/s24113524 - 30 May 2024
Cited by 3 | Viewed by 1240
Abstract
This paper addresses issues concerning biometric authentication based on handwritten signatures. Our research aimed to check whether a handwritten signature acquired with a mobile device can effectively verify a user’s identity. We present a novel online signature verification method using coordinates of points [...] Read more.
This paper addresses issues concerning biometric authentication based on handwritten signatures. Our research aimed to check whether a handwritten signature acquired with a mobile device can effectively verify a user’s identity. We present a novel online signature verification method using coordinates of points and pressure values at each point collected with a mobile device. Convolutional neural networks are used for signature verification. In this paper, three neural network models are investigated, i.e., two self-made light SigNet and SigNetExt models and the VGG-16 model commonly used in image processing. The convolutional neural networks aim to determine whether the acquired signature sample matches the class declared by the signer. Thus, the scenario of closed set verification is performed. The effectiveness of our method was tested on signatures acquired with mobile phones. We used the subset of the multimodal database, MobiBits, that was captured using a custom-made application and consists of samples acquired from 53 people of diverse ages. The experimental results on accurate data demonstrate that developed architectures of deep neural networks can be successfully used for online handwritten signature verification. We achieved an equal error rate (EER) of 0.63% for random forgeries and 6.66% for skilled forgeries. Full article
(This article belongs to the Special Issue Sensor-Based Behavioral Biometrics)
Show Figures

Figure 1

14 pages, 546 KiB  
Review
Wearable Sensors in Other Medical Domains with Application Potential for Orthopedic Trauma Surgery—A Narrative Review
by Carolina Vogel, Bernd Grimm, Meir T. Marmor, Sureshan Sivananthan, Peter H. Richter, Seth Yarboro, Andrew M. Hanflik, Tina Histing and Benedikt J. Braun
J. Clin. Med. 2024, 13(11), 3134; https://doi.org/10.3390/jcm13113134 - 27 May 2024
Cited by 4 | Viewed by 2125
Abstract
The use of wearable technology is steadily increasing. In orthopedic trauma surgery, where the musculoskeletal system is directly affected, focus has been directed towards assessing aspects of physical functioning, activity behavior, and mobility/disability. This includes sensors and algorithms to monitor real-world walking speed, [...] Read more.
The use of wearable technology is steadily increasing. In orthopedic trauma surgery, where the musculoskeletal system is directly affected, focus has been directed towards assessing aspects of physical functioning, activity behavior, and mobility/disability. This includes sensors and algorithms to monitor real-world walking speed, daily step counts, ground reaction forces, or range of motion. Several specific reviews have focused on this domain. In other medical fields, wearable sensors and algorithms to monitor digital biometrics have been used with a focus on domain-specific health aspects such as heart rate, sleep, blood oxygen saturation, or fall risk. This review explores the most common clinical and research use cases of wearable sensors in other medical domains and, from it, derives suggestions for the meaningful transfer and application in an orthopedic trauma context. Full article
Show Figures

Figure 1

14 pages, 2920 KiB  
Article
Zero-FVeinNet: Optimizing Finger Vein Recognition with Shallow CNNs and Zero-Shuffle Attention for Low-Computational Devices
by Nghi C. Tran, Bach-Tung Pham, Vivian Ching-Mei Chu, Kuo-Chen Li, Phuong Thi Le, Shih-Lun Chen, Aufaclav Zatu Kusuma Frisky, Yung-Hui Li and Jia-Ching Wang
Electronics 2024, 13(9), 1751; https://doi.org/10.3390/electronics13091751 - 1 May 2024
Viewed by 1929
Abstract
In the context of increasing reliance on mobile devices, robust personal security solutions are critical. This paper presents Zero-FVeinNet, an innovative, lightweight convolutional neural network (CNN) tailored for finger vein recognition on mobile and embedded devices, which are typically resource-constrained. The model integrates [...] Read more.
In the context of increasing reliance on mobile devices, robust personal security solutions are critical. This paper presents Zero-FVeinNet, an innovative, lightweight convolutional neural network (CNN) tailored for finger vein recognition on mobile and embedded devices, which are typically resource-constrained. The model integrates cutting-edge features such as Zero-Shuffle Coordinate Attention and a blur pool layer, enhancing architectural efficiency and recognition accuracy under various imaging conditions. A notable reduction in computational demands is achieved through an optimized design involving only 0.3 M parameters, thereby enabling faster processing and reduced energy consumption, which is essential for mobile applications. An empirical evaluation on several leading public finger vein datasets demonstrates that Zero-FVeinNet not only outperforms traditional biometric systems in speed and efficiency but also establishes new standards in biometric identity verification. The Zero-FVeinNet achieves a Correct Identification Rate (CIR) of 99.9% on the FV-USM dataset, with a similarly high accuracy on other datasets. This paper underscores the potential of Zero-FVeinNet to significantly enhance security features on mobile devices by merging high accuracy with operational efficiency, paving the way for advanced biometric verification technologies. Full article
(This article belongs to the Special Issue Emerging Artificial Intelligence Technologies and Applications)
Show Figures

Figure 1

Back to TopTop