2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) 2021
DOI: 10.1109/icacite51222.2021.9404735
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Biometric Identification and Verification System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…The convolution process applies to both the textual data network and the image, capturing similar components within the overall picture. The size of the resulting network without padding is determined by (12).…”
Section: Sequential Feature Score Rank Fusionmentioning
confidence: 99%
See 1 more Smart Citation
“…The convolution process applies to both the textual data network and the image, capturing similar components within the overall picture. The size of the resulting network without padding is determined by (12).…”
Section: Sequential Feature Score Rank Fusionmentioning
confidence: 99%
“…Data fusion is regarded as a very challenging undertaking due to a number of factors, including, i) the complexity of the data, ii) the fact that the processes depend on n variables without being all measurably dependent, and iii) the difficulty of utilizing the advantages of each set while ignoring the disadvantages in heterogeneous data sets [12]. Random processes, computational intelligence, heuristic optimization, and other methods are utilized in data fusion.…”
Section: Introductionmentioning
confidence: 99%
“…The FAR and FRR are metric approaches that employ biometric authentication to rate the biometric sensors' ease and the biometric system's security, respectively. These two metrics highlight the compromise between the system's ease and security (Kaur N. , 2021). FAR is a measure used in biometric authentication systems to calculate how frequently the system mistakenly accepts a fraud or unauthorized user as a legitimate user (Eq 4).…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…As a research topic in computer vision and pattern recognition that has been conducted for 50 years, has grow rapidly in the recent years and is considered as one of the most successful systems for its convenience, accuracy and has a wide range of applications [1]. In comparison to fingerprint recognition systems which need specific devices to obtain clear fingerprints, or voice verification systems that may suffer from noise and tone changes, face recognition systems are both consistent and easier to obtain inputs from non-ideal environments using inexpensive cameras [2]. It has gradually become an inseparable part of the modern identification system and extensively used in areas such as law enforcement, security, and consumer electronics.…”
Section: Introductionmentioning
confidence: 99%