2014 IEEE International Conference on Computational Intelligence and Computing Research 2014
DOI: 10.1109/iccic.2014.7238509
|View full text |Cite
|
Sign up to set email alerts
|

Electronic transaction authentication — A survey on multimodal biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Currently, deep neural networks have shown good performance against iris spoofing attacks [200,112]. Beyond that, in [172], an iris recognition method based on random projections and sparse representations was proposed by Pillai et al This method gains high accuracy about 99%. At the same time, the method can also protect user privacy but the level is only medium.…”
Section: Replay Attack Defensementioning
confidence: 99%
“…Currently, deep neural networks have shown good performance against iris spoofing attacks [200,112]. Beyond that, in [172], an iris recognition method based on random projections and sparse representations was proposed by Pillai et al This method gains high accuracy about 99%. At the same time, the method can also protect user privacy but the level is only medium.…”
Section: Replay Attack Defensementioning
confidence: 99%
“…Kannavara and Bourbakis [1] summarized a series of biometric recognition methods based on neural networks by using voice, iris, fingerprint, palm-print and face and pointed out potential ways to improve these methods. Shunmugam and Selvakumar [2] believed that unimodal biometric methods are limited. Multimodal biometric methods are much more reliable for building up a safer authentication system.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, even though efficiency as a metric for performance may be considered the most important characteristic in most cases, a high-performance system will have reduced utility in a security application if the modality can be easily forged or if it lacks universality. Unfortunately, sources such as [10], [11] and [12] fail to provide a quantitative method for attributes' evaluation other than performance. To overcome the limitations inherent to single modality systems and in order to take advantage of different modalities' strengths, the use of multimodal biometric systems has been proposed and tested as a reliable alternative [13].…”
Section: Introductionmentioning
confidence: 99%