2021
DOI: 10.33969/ais.2021.31010
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Algorithms based Fingerprint Authentication: Systematic Literature Review

Abstract: Deep Learning algorithms (DL) have been applied in different domains such as computer vision, image detection, robotics and speech processing, in most cases, DL demonstrated better performance than the conventional machine learning algorithms (shallow algorithms). The artificial intelligence research community has leveraged the robustness of the DL because of their ability to process large data size and handle variations in biometric data such as aging or expression problem. Particularly, DL research in automa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 86 publications
0
3
0
Order By: Relevance
“…Weber looked into various legal methods for calculating an IoT architecture's privacy and security requirements [23]. A ball can be thrown in the virtual world to authenticate users, according to the work in [24]. They attained a matching accuracy of 92.86 percent in their pilot investigation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Weber looked into various legal methods for calculating an IoT architecture's privacy and security requirements [23]. A ball can be thrown in the virtual world to authenticate users, according to the work in [24]. They attained a matching accuracy of 92.86 percent in their pilot investigation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Using biometric information in such a context is referred to as soft biometrics or light biometrics. Soft biometrics has a variety of applications such as gender or age-specifc access control, video retrieval, ofering customized gender or age services, search space reduction in large biometric databases such as in both cloud and noncloud based authentication systems [4][5][6], and forensics use [1-3, 7, 8].…”
Section: Introductionmentioning
confidence: 99%
“…Examples include automatically recognizing a person in selfie-images in social media platforms [108], diagnosing diseases from scanned medical images in health care [2], autonomous driving in self-driving cars [110], facial recognition [39] or fingerprint recognition [17] in security industry, automatically adding item details from product images in retail industry [4], and searching images instead of text in visual search engine [142] [87].…”
Section: Problem Statementmentioning
confidence: 99%