2019
DOI: 10.1007/s10916-019-1391-5
|View full text |Cite
|
Sign up to set email alerts
|

A Multimodal Authentication for Biometric Recognition System using Intelligent Hybrid Fusion Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Prabu et al [44] exploited the effective linear binary pattern and scaled invariant Fourier transform to process and store the biometrics of hand type and iris into database, and then utilized neural network and Bayesian network classifier to detect, due to mix the two biological features together, the recognition is inefficient. Musab et al [45] exploited CNN (Convolutional Neural Network) to improve the recognition effect of face recognition.…”
Section: Inaccurate Identification Problems and Solutionsmentioning
confidence: 99%
“…Prabu et al [44] exploited the effective linear binary pattern and scaled invariant Fourier transform to process and store the biometrics of hand type and iris into database, and then utilized neural network and Bayesian network classifier to detect, due to mix the two biological features together, the recognition is inefficient. Musab et al [45] exploited CNN (Convolutional Neural Network) to improve the recognition effect of face recognition.…”
Section: Inaccurate Identification Problems and Solutionsmentioning
confidence: 99%
“…Other studies [50,51] introduced a feature-ranking algorithm and the outcomes were assessed for the kernel-NN classifier prototypical formed sideways with the suggested procedure, an ID of 90.44% for the 1st structure, 94.44% for the 2nd structure, and 87.22% for the 3rd structure has effectively been achieved. Sohrabi et al [52] introduced a structure for consumers' interactive sketching construction is accessible and client interactive designs are used for client ID in the e-Commerce surroundings.…”
Section: Related Workmentioning
confidence: 99%
“…Public key cryptography (asymmetric cryptography) is the most widely used type of cryptography to secure data in most fields. On the other hand, symmetric cryptography is mostly used in the military field [24][25][26][27][28][29][30][31].…”
Section: Cryptography Involves Mathematics and Computermentioning
confidence: 99%