[1]
K. Nandakumar, Multibiometric systems: Fusion strategies and template security. michigan state univ east lansing dept of computer science/engineering, 2008.
[3]
A. Kamal, S. Bhatt, and R.D. Reany, U.S. ,"Systems and methods for provisioning digital identities to authenticate users”, Patent No. 10,650,632, 2020
[6]
T. Sabhanayagam, V.P. Venkatesan, and K. Senthamaraikannan, "A comprehensive survey on various biometric systems", Int. J. Appl. Eng. Res., vol. 13, no. 5, pp. 2276-2297, 2018.
[7]
D. Zhong, X. Du, and K. Zhong, "Decade progress of palmprint recognition: a brief survey", Neurocomputing, 2018.
[8]
R. Kiran, and S. Soni, "A Survey on Keystroke Dynamics Based Authentication System", Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 3, no.3, 2018
[11]
"Rajeswari, P., Raju, S.V., Ashour, A. S., & Dey, N. (2017). Multifingerprint
unimodel-based biometric authentication supporting
cloud computing", Intelligent techniques in signal processing for
multimedia security, Springer, Cham, pp. 469-485, 2017.
[16]
I.M. Alsaadi, "Physiological biometric authentication systems, advantages, disadvantages and future development: A Review", Int. J. Sci.Tech. Res., vol. 4, no. 8, pp. 285-289, 2015.
[18]
G. Kaur, G. Singh, and V. Kumar, "A review on biometric recognition. Int", J. Biosci. Biotechnol., vol. 6, no. 4, pp. 69-76, 2014.
[21]
H. Srivastava, “A Comparison Based Study on Biometrics for Human
Recognition.”, IOSR J. Comp. Eng., vol.15, 2013, pp. 22-29.
[22]
A. Babich, "Biometric Authentication", Types of biometric identifiers, 2012.
[28]
R.M. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, and A.W. Senior, Guide to biometrics., Springer Science & Business Media, 2013.
[29]
J. Chirillo, and S. Blaul, Implementing biometric security., Hungry Minds, Incorporated, 2003.
[34]
M.E. Caceres, Y.L. Li, and M.P.C. De Andrada, "Universal enrollment using biometric PKI", U.S. Patent No.9, 871, 783, 2018.
[35]
J.T. Apostolos, W. Mouyos, J. Feng, and D.T. Jeffrey, “Fingerprint based smartphone user verification”, U.S. Patent No. 9,432,366, 2014.
[37]
D.M. Uliyan, S. Sadeghi, and H.A. Jalab, "Anti-spoofing method for fingerprint recognition using patch based deep learning machine", Eng. Sci. Technol. an Int. J., vol. 23, no. 2, pp. 264-273, 2020.
[38]
F. Battaglia, G. Iannizzotto, and L.L. Bello, "A biometric authentication system based on face recognition and RFID tags", Mondo Digitale, vol. 13, no. 49, pp. 340-346, 2014.
[41]
A. Mohammadi, S. Bhattacharjee, and S. Marcel, "Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets", In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).IEEE, Barcelona, Spain, 2020, pp. 2947-2951.
[42]
A. Kong, D. Zhang, and M. Kamel, "A survey of palmprint recognition", Pattern Recognit., vol. 42, no. 7, pp. 1408-1418, 2009.
[46]
I.A. Saleh, and L.M. Alzoubiady, "Decision level fusion of iris and signature biometrics for personal identification using ant colony optimization", Int. J. Eng. Innov. Technol., vol. 3, no. 11, pp. 35-42, 2014.
[47]
S. Bazrafkan, and P. Corcoran, Enhancing iris authentication on handheld devices using deep learning derived segmentation techniques.In: 2018 IEEE international conference on consumer electronics (ICCE)., IEEE: Taiwan, China, 2018, pp. 1-2.
[49]
P. Bandal, D. Pawar, A. Shrishrimal, P. Sonawane, and D.A. Godse, "Biometric Identification Using 3D Ear Recognition System", Int. J. Eng. Sci., p. 3567, 2016.
[50]
G.D. Shubinsky, and A. Sobel, U.S. Patent No. 9,076,048
[51]
D. Narayan, and S. Dubey, "A Survey Paper on Human Identification using Ear Biometrics", Int J Innov Res Sci mod Eng, vol. 2, no. 10, pp. 9-13, 2014.
[56]
S. Angle, R. Bhagtani, and H. Chheda, "Biometrics: A further
echelon of security", In: UAE International Conference on Biological
and Medical Physics, Al-Ain, UAE, 2005.
[65]
E. Alajrami, B.A. Ashqar, B.S. Abu-Nasser, A.J. Khalil, M.M. Musleh, A.M. Barhoom, and S.S. Abu-Naser, "Handwritten signature verification using deep learning", J. Interdiscip. Multidiscip. Res., vol. 3, no. 12, pp. 39-44, 2020. [IJAMR].
[66]
S.E. Zohora, A.K. Srivastava, and N. Dey, "Gas Sensing techniques
in electronic nose and its applications: A review", In: 3rd International
Conference of Electrical, Electronics, Engineering Trends.
Communication, Optimization and Sciences, Andhrapradesh, India
2016, pp. 178-183.
[67]
J.A. Trivedi, “Voice identification system using neuro-fuzzy approach”,
Int. j. adv. res. comput. sci. tech, vol 2, 2014.
[68]
J. Jangir, B.K. Singh, and M.I. Ali, "Voice Identification Secure
System by Statistical Model of Speech Signal Using Normalization
Technique", Int. J. Eng., vol. 3, no. 1, 2014.
[71]
A. Boles, and P. Rad, "Voice biometrics: Deep learning-based
voiceprint authentication system", In: 2017 12th System of Systems
Engineering Conference (SoSE), Waikoloa, Hawaii, USA, 2017
[72]
D. Lymberopoulos, J. Liu, and H. Wang, “User-authentication
gestures”, U.S. Patent No. 9,710,632, 2015.
[73]
A.S. George, E. Roy, A. Antony, and M. Job, "An efficient gait recognition system for human identification using", Neural Netw., 2017.
[76]
Q. Zou, Y. Wang, Q. Wang, Y. Zhao, and Q. Li, "Deep Learning-Based Gait Recognition Using Smartphones in the Wild", IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3197-3212, 2020.
[78]
C. Wright, and D. Stewart, "One-shot-learning for visual lip-based biometric authentication", In: International Symposium on Visual Computing, Lake Tahoe, NV, USA, 2019, pp. 405-417.
[79]
A. Weiss, A. Ramapanicker, P. Shah, S. Noble, and L. Immohr, Mouse movements biometric identification: A feasibility study. Proc. Student/Faculty Research Day CSIS., Pace University: White Plains, NY, 2007.
[80]
M. Antal, and N. Fejér, "Mouse dynamics based user recognition using deep learning. Acta Universitatis Sapientiae", Informatica, vol. 12, no. 1, pp. 39-50, 2020.
[82]
M. Chowdhury, J. Gao, and R. Islam, "Biometric authentication using facial recognition", International Conference on Security and Privacy in Communication Systems, 2016pp. 287-295
[83]
S.C. Chong, A.B.J. Teoh, and D.C.L. Ngo, "Iris authentication using privatized advanced correlation filter", In: International Conference on Biometrics, Hong Kong, China, 2006, pp. 382-388.
[86]
M. Ortega, C. Marino, M.G. Penedo, M. Blanco, and F. Gonzalez, "Biometric authentication using digital retinal images", In: Proceedings of the 5th WSEAS international conference on Applied computer science, Hangzhou, China, 2006, pp. 422-427.
[87]
M. Shahin, A. Badawi, and M. Kamel, "Biometric authentication using fast correlation of near infrared hand vein patterns", Int J Biol Med Sci, vol. 2, no. 3, pp. 141-148, 2007.
[91]
M. Marzotti, and C. Nardini, "Biometric authentication using
voice", TDDC03 Projects, Spring, 2006.
[105]
V. Joshi, M. Raval, P. Rege, and S. Parulkar, "Multistage VQ based exact authentication for biometric images. Computer Society of India (CSI)", J. Comput., vol. 2, no. 1-2, pp. R3-R25, 2013.
[107]
C. Li, B. Ma, Y. Wang, and Z. Zhang, "Protecting biometric templates using authentication watermarking", In: Pacific-Rim Conference on Multimedia, Shanghai, China, 2010, pp. 709-718.
[109]
T. Hoang, D. Tran, and D. Sharma, "Remote multimodal biometric
authentication using bit priority-based fragile watermarking", In:
Pattern Recognition, 2008. ICPR 2008. 19th International Conference
IEEE, Tampa, Florida, USA, 2008, pp 1-4.
[110]
R. Thanki, V. Dwivedi, K. Borisagar, and S. Borra, "A watermarking algorithm for multiple watermarks protection using svd and compressive sensing", Informatica, vol. 41, no. 4, pp. 479-493, 2017.
[114]
A. Javed, M. Fasihullah, M.A. Munir, I. Usman, M.F. Shafique, T. Bashir, and M.A. Khan, "A new additive watermarking technique for multimodal biometric identification", J. Basic Appl. Sci. Res., vol. 3, no. 7, pp. 935-942, 2013.
[115]
P.T. Selvy, V. Palanisamy, and S. Elakkiya, "A novel watermarking of images based on wavelet based contourlet transform energized by biometrics", WSEAS Trans. Comput., vol. 12, pp. 105-115, 2013.
[116]
P. Rege, "Biometric Watermarking", In: National Seminar on
Computer Vision and Image Processing, Rajkot, India, 2012
[117]
V. Inamdar, and P. Rege, "Face features based biometric watermarking
of digital image using singular value decomposition for
fingerprinting", International journal of security and its applications,
vol. 6, no. 2, pp. 47-60, 2012.
[121]
V. Inamdar, P. Rege, and M. Arya, "Offline handwritten signature based blind biometric watermarking and authentication technique using biorthogonal wavelet transform", Int. J. Comput. Appl., vol. 11, no. 1, pp. 19-27, 2010.
[122]
V. Jundale, and S. Patil, "Biometric speech watermarking technique in images using wavelet transform", IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), pp. 33-39, 2010.