2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2018
DOI: 10.23919/mipro.2018.8400203
|View full text |Cite
|
Sign up to set email alerts
|

A review of soft biometrics for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…The applications of standalone soft biometrics recognition or retrieval are experimented over the years in surveillance [164,180], social robotics [47], IoT [195], social media and mobile authentication [72,129]. These factors are strong motive to use soft biometrics for seamless authentication.…”
Section: Soft Biometrics: a Seamless Solution For Recognitionmentioning
confidence: 99%
“…The applications of standalone soft biometrics recognition or retrieval are experimented over the years in surveillance [164,180], social robotics [47], IoT [195], social media and mobile authentication [72,129]. These factors are strong motive to use soft biometrics for seamless authentication.…”
Section: Soft Biometrics: a Seamless Solution For Recognitionmentioning
confidence: 99%
“…There are numerous application areas of IoT, which include, but are not limited to: smart cities, smart agriculture, smart power grids, smart health, smart transport, smart buildings, smart living solutions, smart human settlements and other [7]. In recent years, IoT applications have increased, especially in smart cities, smart homes, smart agriculture and smart healthcare [8].…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, IoT is becoming one of the most researched topics [1]. The IoT describes a future computing scenario in which everyday physical objects will be connected to the Internet and will be able to identify themselves with other devices [2].…”
Section: Introductionmentioning
confidence: 99%
“…Contributions: The proposed work's significant contributions are: (1) We tackled a challenging security threat issue: sensor tampering, where we can see if someone harms our devices physically. Then the administrator gets notified about the harmed device.…”
Section: Introductionmentioning
confidence: 99%