Abstract: This paper is concerned with the authentication of people on smartphones using fingerphoto recognition. In this work, fingerphotos are captured with the built-in camera of the smartphone. The proposed authentication method is analyzed for feasibility and implemented in a prototype as application for the Android operating system. Algorithms for the capture process are developed to ensure a minimum of quality of the captured photos to enable a reliable fingerphoto recognition. Several methods for preprocessing of the captured samples are analyzed and performant solutions to evaluate the photos are developed to enhance the recognition rates. This is achieved by evaluating a wide range of different parameters and configurations of the...
In this work the use of palmprints as an alternative biometric for smartphones is investigated and i...
With increased adoption of smartphones, security has become important like never before. Smartphones...
Abstract— Fingerprint-based user authentication is highly effective in networked services such as el...
Abstract: This work is concerned with the acquisition of fingerprints samples on smartphones with th...
Abstract: This paper details the development of a smartphone based online system to automatically id...
This paper details the development of a smartphone based online system to automatically identify a p...
The diffusion of mobile cameras and webcams is rapidly growing. Unfortunately, images produced by th...
Recent technological advancements have made face recognition a very viable identification and verif...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
Touch-based ngerprint sensor has been used in the mobile device, which can easily be hacked by an in...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Information security and verify the user's identity has become one of the biggest concerns of i...
In this paper, we propose a system that enables photoplethysmogram (PPG)-based authentication by usi...
In the next coming years, many of our basic activities such as reading an e-mail, checking our bank ...
In this work the use of palmprints as an alternative biometric for smartphones is investigated and i...
With increased adoption of smartphones, security has become important like never before. Smartphones...
Abstract— Fingerprint-based user authentication is highly effective in networked services such as el...
Abstract: This work is concerned with the acquisition of fingerprints samples on smartphones with th...
Abstract: This paper details the development of a smartphone based online system to automatically id...
This paper details the development of a smartphone based online system to automatically identify a p...
The diffusion of mobile cameras and webcams is rapidly growing. Unfortunately, images produced by th...
Recent technological advancements have made face recognition a very viable identification and verif...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
Touch-based ngerprint sensor has been used in the mobile device, which can easily be hacked by an in...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Information security and verify the user's identity has become one of the biggest concerns of i...
In this paper, we propose a system that enables photoplethysmogram (PPG)-based authentication by usi...
In the next coming years, many of our basic activities such as reading an e-mail, checking our bank ...
In this work the use of palmprints as an alternative biometric for smartphones is investigated and i...
With increased adoption of smartphones, security has become important like never before. Smartphones...
Abstract— Fingerprint-based user authentication is highly effective in networked services such as el...