2020
DOI: 10.1007/978-3-030-58359-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Authentication Using Convolutional Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…An adversary gained access to T-server Mobile and databases by using a brute-force logon technique [35]. Attackers also use deception assaults, in which they construct a false biometric sample that is similar enough to the real one to fool the system into granting access [36]. It is also essential to note that biometric systems are susceptible to social engineering attacks, in which a perpetrator manipulates or fools a user into divulging sensitive information.…”
Section: Different Attacks On Biometric Authentication Modelsmentioning
confidence: 99%
“…An adversary gained access to T-server Mobile and databases by using a brute-force logon technique [35]. Attackers also use deception assaults, in which they construct a false biometric sample that is similar enough to the real one to fool the system into granting access [36]. It is also essential to note that biometric systems are susceptible to social engineering attacks, in which a perpetrator manipulates or fools a user into divulging sensitive information.…”
Section: Different Attacks On Biometric Authentication Modelsmentioning
confidence: 99%
“…The rapid development of artificial intelligence technologies in recent years has significantly improved the quality of automatic image recognition, making it possible to segment complex scenes and highlight objects of interest both in the video stream and in data from other sensors, for example, scanning laser rangefinders [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…The information component of the problem under consideration is analyzed in articles [11,12]. Aspects of the fight against complex cybercrimes are discussed in articles [13,14]. Issues of using neural networks in research related to national security are discussed in articles [15,16].…”
Section: Introductionmentioning
confidence: 99%