Smartphones continue to proliferate throughout our daily lives, not only in sheer quantity but also their ever-growing list of uses. They are no longer just for communication and the occasional phone game. Smartphones can be used to open garage doors, transfer money, see who is at your front door, and much, much more. With this increased dependence and use, smartphone security is critical. In this paper we propose a system to verify a user’s identity by applying a convolutional neural network (CNN) model to an image of the user’s hand while holding their device. This model aims to address situations where other more common biometrics are inaccessible or inconvenient, such as when wearing a face mask or when contact-free verification is nece...
Abstract Biometric based systems for individual authentication are increasingly becoming indispensab...
Today, data security is an increasingly hot topic, and thus also the security and reliability of end...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
The use of mobile devices is not anymore limited to personal communication but, especially with the ...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
Abstract: This paper is concerned with the authentication of people on smartphones using fingerphoto...
In this work, we propose a more realistic and efficient face-based mobile authentication technique u...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Personal mobile devices currently have access to a significant portion of their user’s private sensi...
This paper details the development of a smartphone based online system to automatically identify a p...
Smart Phones are the most widely spread devices over the world. Many people rely on their phones to ...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
As the identification process is based on the unique patterns of the users, biometrics technologies ...
Smartphones play a key role in our daily life, they can replace our watch, calendar, and mail box bu...
Abstract Biometric based systems for individual authentication are increasingly becoming indispensab...
Today, data security is an increasingly hot topic, and thus also the security and reliability of end...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
The use of mobile devices is not anymore limited to personal communication but, especially with the ...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
Abstract: This paper is concerned with the authentication of people on smartphones using fingerphoto...
In this work, we propose a more realistic and efficient face-based mobile authentication technique u...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Personal mobile devices currently have access to a significant portion of their user’s private sensi...
This paper details the development of a smartphone based online system to automatically identify a p...
Smart Phones are the most widely spread devices over the world. Many people rely on their phones to ...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
As the identification process is based on the unique patterns of the users, biometrics technologies ...
Smartphones play a key role in our daily life, they can replace our watch, calendar, and mail box bu...
Abstract Biometric based systems for individual authentication are increasingly becoming indispensab...
Today, data security is an increasingly hot topic, and thus also the security and reliability of end...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...