2016
DOI: 10.1007/978-3-319-44790-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Multi-fingerprint Unimodel-based Biometric Authentication Supporting Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The authors in [67] proposed a novel security model for authentication-supported cloud computing. The model introduced a new idea for a biometric security system based on fingerprint recognition.…”
Section: Solutions At Application Levelmentioning
confidence: 99%
“…The authors in [67] proposed a novel security model for authentication-supported cloud computing. The model introduced a new idea for a biometric security system based on fingerprint recognition.…”
Section: Solutions At Application Levelmentioning
confidence: 99%
“…Fingerprint enrollment process, is an essential process of fingerprint recognition system (FRS) in which the biometric data are captured from the sensor and create a digital image, then after Preprocessing applies to digital image for eliminating noise and unnecessary data after this post-processing applies to digital image and stored in the database for recognition purpose. After completing this whole process an individual is defined as enrollment in the system [3] (Fig. 1).…”
Section: Fingerprint Enrollment Processmentioning
confidence: 99%
“…In the Fingerprint verification process captured fingerprint image is one-to-one (1:1) compared with the previously stored template image in sequence to authenticate the accuracy of human beings by using matching algorithms. When two fingerprint images match each other then system validates that the applicant is original or not [3].…”
Section: Fingerprint Verification Processmentioning
confidence: 99%
See 1 more Smart Citation
“…• human-biometrics-based (e.g. via fingerprint [6], [7] or retina). The strongest protection can be reached when there is a combination of multiple identity controls.…”
Section: Technology For Prevention Of the Physical Penetration Using mentioning
confidence: 99%