References |
: |
[1]Bharathi S, Sudhakar R. Biometric recognition using finger and palm vein images. Soft Computing. 2019; 23:1843-55.
|
[Crossref] |
[Google Scholar] |
[2]Padma P, Srinivasan S. A survey on biometric based authentication in cloud computing. In international conference on inventive computation technologies 2016 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[3]Prasad PS, Devi BS, Reddy MJ, Gunjan VK. A survey of fingerprint recognition systems and their applications. In international conference on communications and cyber physical engineering 2018 (pp. 513-20). Springer, Singapore.
|
[Crossref] |
[Google Scholar] |
[4]Tekade P, Shende P. Enhancement of security through fused multimodal biometric system. In international conference on computing, communication, control and automation 2017 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[5]Parkavi R, Babu KC, Kumar JA. Multimodal biometrics for user authentication. In 11th international conference on intelligent systems and control 2017 (pp. 501-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[6]Kakkad V, Patel M, Shah M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design. 2019; 2:233-48.
|
[Crossref] |
[Google Scholar] |
[7]Nakanishi I, Maruoka T. Biometric authentication using evoked potentials stimulated by personal ultrasound. In international conference on telecommunications and signal processing (TSP) 2019 (pp. 365-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[8]Vittori P. Ultimate password: is voice the best biometric to beat hackers?. Biometric Technology Today. 2019; 2019(9):8-10.
|
[Google Scholar] |
[9]Rahmawati E, Listyasari M, Aziz AS, Sukaridhoto S, Damastuti FA, Bachtiar MM, et al. Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone. In international electronics symposium on engineering technology and applications (IES-ETA) 2017 (pp. 234-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[10]Kamelia L, Hamidi EA, Darmalaksana W, Nugraha A. Real-time online attendance system based on fingerprint and GPS in the smartphone. In international conference on wireless and telematics 2018 (pp. 1-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[11]Goicoechea-Telleria I, Garcia-Peral A, Husseis A, Sanchez-Reillo R. Presentation attack detection evaluation on mobile devices: simplest approach for capturing and lifting a latent fingerprint. In international carnahan conference on security technology 2018 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[12]Hwang D, Lee H, Bae G, Son S, Kim J. Fingerprint template management for higher accuracy in user authentication. In international conference on electronics, information, and communication 2018 (pp. 1-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[13]You L, Wang T. A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion. Soft Computing. 2019; 23(11):3843-51.
|
[Crossref] |
[Google Scholar] |
[14]Lin Y, Zhu X, Zheng Z, Dou Z, Zhou R. The individual identification method of wireless device based on dimensionality reduction and machine learning. The Journal of Supercomputing. 2019; 75:3010-27.
|
[Crossref] |
[Google Scholar] |
[15]Ma L, Jin N, Zhang Y, Xu Y. RSRP difference elimination and motion state classification for fingerprint-based cellular network positioning system. Telecommunication Systems. 2019; 71:191-203.
|
[Crossref] |
[Google Scholar] |
[16]Sadhukhan P. Performance analysis of clustering-based fingerprinting localization systems. Wireless Networks. 2019; 25:2497-510.
|
[Crossref] |
[Google Scholar] |
[17]Engelsma JJ, Arora SS, Jain AK, Paulter NG. Universal 3D wearable fingerprint targets: advancing fingerprint reader evaluations. IEEE Transactions on Information Forensics and Security. 2018; 13(6):1564-78.
|
[Crossref] |
[Google Scholar] |
[18]Sun S, Guo Z. Sweat glands extraction in optical coherence tomography fingerprints. In international conference on security, pattern analysis, and cybernetics 2017 (pp. 579-84). IEEE.
|
[Crossref] |
[Google Scholar] |
[19]Valdes-Ramirez D, Medina-Pérez MA, Monroy R, Loyola-González O, Rodríguez J, Morales A, et al. A review of fingerprint feature representations and their applications for latent fingerprint identification: trends and evaluation. IEEE Access. 2019; 7:48484-99.
|
[Crossref] |
[Google Scholar] |
[20]Makhija S, Khatwani A, Roja MM. Performance analysis of latent fingerprint enhancement techniques. In international conference on innovative mechanisms for industry applications 2017 (pp. 96-100). IEEE.
|
[Crossref] |
[Google Scholar] |
[21]Al Maqbali F, Mitchell CJ. AutoPass: an automatic password generator. In international carnahan conference on security technology 2017 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[22]Rahiemy MZ, Sukarno P, Jadied EM. Hardening the virtual password authentication scheme. In international conference on information and communication technology 2018 (pp. 429-34). IEEE.
|
[Crossref] |
[Google Scholar] |
[23]Tabrez S, Sai DJ. Pass-Matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system. In international conference on intelligent computing and control systems 2017 (pp. 776-81). IEEE.
|
[Crossref] |
[Google Scholar] |
[24]Zhang S, Zeng J, Zhang Z. Password guessing time based on guessing entropy and long-tailed password distribution in the large-scale password dataset. In international conference on anti-counterfeiting, security, and identification 2017 (pp. 6-10). IEEE.
|
[Crossref] |
[Google Scholar] |
[25]Erdem E, Sandıkkaya MT. OTPaaS—one time password as a service. IEEE Transactions on Information Forensics and Security. 2018; 14(3):743-56.
|
[Crossref] |
[Google Scholar] |
[26]Mohamedali IA, Fadlalla Y. Securing password in static password-based authentication: a review. In sudan conference on computer science and information technology 2017 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[27]Zheng W, Jia C. CombinedPWD: a new password authentication mechanism using separators between keystrokes. In international conference on computational intelligence and security 2017 (pp. 557-60). IEEE.
|
[Crossref] |
[Google Scholar] |
[28]Hwang MS, Cahyadi EF, Chou YC, Yang CY. Cryptanalysis of kumars remote user authentication scheme with smart card. In international conference on computational intelligence and security 2018 (pp. 416-20). IEEE.
|
[Crossref] |
[Google Scholar] |
[29]Wu CJ, Chiu CT. Dry fingerprint detection for multiple image resolutions using ridge features. In international workshop on signal processing systems 2017 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[30]Tang Y, Jiang L, Hou Y, Wang R. Contactless fingerprint image enhancement algorithm based on hessian matrix and STFT. In international conference on multimedia and image processing 2017 (pp. 156-60). IEEE.
|
[Crossref] |
[Google Scholar] |
[31]Liban A, Hilles SM. Latent fingerprint enhancement based on directional total variation model with lost minutiae reconstruction. In international conference on smart computing and electronic enterprise 2018 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[32]Koptyra K, Ogiela MR. Multiply information coding and hiding using fuzzy vault. Soft Computing. 2019; 23:4357-66.
|
[Crossref] |
[Google Scholar] |
[33]Patel MB, Patel RB, Parikh SM, Patel AR. An improved OGorman filter for fingerprint image enhancement. In international conference on energy, communication, data analytics and soft computing 2017 (pp. 200-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[34]Sudiro SA, Wardhani IP, Wardijono BA, Handias B. Fingerprint matching application using hardware based artificial neural network with matlab. In 5th international conference on electrical, electronics and information engineering 2017 (pp. 66-70). IEEE.
|
[Crossref] |
[Google Scholar] |
[35]Kim H, Cui X, Kim MG, Nguyen TH. Fingerprint generation and presentation attack detection using deep neural networks. In conference on multimedia information processing and retrieval 2019 (pp. 375-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[36]Cao K, Jain A. Fingerprint synthesis: evaluating fingerprint search at scale. In international conference on biometrics 2018 (pp. 31-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[37]Nuraisha S, Shidik GF. Evaluation of normalization in fake fingerprint detection with heterogeneous sensor. In international seminar on application for technology of information and communication 2018 (pp. 83-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[38]Han K, Wang Z, Chen Z. Fingerprint image enhancement method based on adaptive median filter. In 24th Asia-Pacific conference on communications 2018 (pp. 40-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[39]Taufiq M, Ogi D. Implementing one-time password mutual authentication scheme on sharing renewed finite random sub-passwords using raspberry pi as a room access control to prevent replay attack. In international conference on electrical engineering and informatics 2018 (pp. 13-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[40]Zaki MH, Husain A, Umar MS, Khan MH. Secure pattern-key based password authentication scheme. In international conference on multimedia, signal processing and communication technologies 2017 (pp. 171-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[41]Lekshmi K, Krishnaveni KS, Aparna VK. A hopfield neural network approach for authentication of password based on fuzzy logic. In international conference on advances in computing, communications and informatics 2018 (pp. 2471-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[42]Bhola G, Kaur D, Raj M. Dynamic password authentication protocol using android device and one-way function. In international conference on wireless communications, signal processing and networking 2017 (pp. 1863-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[43]Scaria BA, Megalingam RK. Enhanced e-commerce application security using three-factor authentication. In second international conference on intelligent computing and control systems 2018 (pp. 1588-91). IEEE.
|
[Crossref] |
[Google Scholar] |
[44]Bilgi B, Tugrul B. A shoulder-surfing resistant graphical authentication method. In international conference on artificial intelligence and data processing 2018 (pp. 1-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[45]Fayyadh BE, Mansour K, Mahmoud KW. A new password authentication mechanism using 2D shapes. In international conference on computer science and information technology 2018 (pp. 113-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[46]Zhang X, Sun H, Yao B, Liu X. A technique based on the module-K super graceful labelling for designing new-type graphical passwords. In advanced information management, communicates, electronic and automation control conference 2018 (pp. 1495-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[47]Liban A, Hilles SM. Latent fingerprint enhancement based on directional total variation model with lost minutiae reconstruction. In international conference on smart computing and electronic enterprise 2018 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[48]Szymkowski M, Saeed K. A novel approach to fingerprint identification using method of sectorization. In international conference on biometrics and kansei engineering 2017 (pp. 55-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[49]Mehrubeoglu M, Nguyen V. Real-time eye tracking for password authentication. In international conference on consumer electronics 2018 (pp. 1-4). IEEE.
|
[Crossref] |
[Google Scholar] |
[50]Othman NA, Rahman MA, Sani AS, Ali FH. Directional based graphical authentication method with shoulder surfing resistant. In conference on systems, process and control 2018 (pp. 198-202). IEEE.
|
[Crossref] |
[Google Scholar] |
[51]Sudramurthy B, Al Obaidy M, Maata RL. Analysis of authentication on online purchase using honey password. In international conference on computational intelligence and computing research 2017 (pp. 1-3). IEEE.
|
[Crossref] |
[Google Scholar] |
|