Suggested Topics within your search.
Suggested Topics within your search.
-
21
Performance Evaluation of Multimodal Multifeature Authentication System Using KNN Classification
Published 2015-01-01Get full text
Article -
22
Classification of Authentic and Tampered Video Using Motion Residual and Parasitic Layers
Published 2020-01-01“…The CNN layers encode these tampering traces and are learned using transfer learning. Finally, parasitic layers classify the video clip (VC) as authentic or tampered. …”
Get full text
Article -
23
Authenticity in bakery products: Detection of pistachio fraud using NGS metabarcoding
Published 2025-06-01“…Ensuring the authenticity of food ingredients is a key aspect of food safety and quality control. …”
Get full text
Article -
24
Evaluation of the Proposed Hand Vein Authentication System using Machine Learning
Published 2025-04-01“… This paper discusses the use of a biometric system for secure authentication based on deeper exploration in hand vein patterns to derive more reliability as a good biometric trait. …”
Get full text
Article -
25
Voter Authentication Using Enhanced ResNet50 for Facial Recognition
Published 2025-05-01Get full text
Article -
26
Using ERPs to unveil the authenticity evaluation and neural response to online rumors
Published 2024-12-01Get full text
Article -
27
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Published 2015-06-01“…Biometric verification has been included in remote user authentication schemes recently. In this paper, we have proposed the use of heartbeat biometrics for its liveness property as a possible defense against spoof attacks in remote authentication. …”
Get full text
Article -
28
Security Enhancement of Biometric-Based Authentication Systems Using Smart Card
Published 2024-01-01“…By addressing the security flaws inherent in existing protocols and optimizing for performance, our scheme provides a robust and efficient solution for secure remote authentication using mobile device biometrics.…”
Get full text
Article -
29
User Authentication Method for Smart Rings Using Active Acoustic Sensing
Published 2025-01-01Get full text
Article -
30
Approach and models for using distributed ledger technology to authenticate educational documents
Published 2020-11-01“…The objectives of the article are to analyze problems with the authentication of educational documents, develop new structural solutions using block chain technology, consider two models, and evaluate their use for educational documents.Authentication of educational documents is carried out using state registers, which is a complex and resource-intensive process. …”
Get full text
Article -
31
Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning
Published 2025-03-01“…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
Get full text
Article -
32
Use of the MA-XRF Technique in the Authentication of Guignard’s Artwork Recovered by the RJ Civil Police
Published 2025-07-01“…Elemental mapping was conducted using the portable MA-XRF system, model CRONO (Bruker), on both the authenticated and unauthenticated artworks. …”
Get full text
Article -
33
Classification of Authentic and Spoofed GNSS Signals Using a Calibrated Antenna Array
Published 2025-01-01“…New optimization-based methods have been developed to use measured direction-of-arrival (DoA) information in order to classify received global navigation satellite system signals into authenticated and spoofed sets and to augment that information with pseudorange information when DoA information alone is insufficient to achieve the needed classification. …”
Get full text
Article -
34
Feasibility Study of Location Authentication for IoT Data Using Power Grid Signatures
Published 2025-01-01“…Experiments are conducted in the State of Maryland of the United States to demonstrate the feasibility of using ENV signals for location authentication of IoT data.…”
Get full text
Article -
35
Security, usability, and biometric authentication scheme for electronic voting using multiple keys
Published 2020-07-01“…To ensure authentication of local broadcast, electronic voting authentication scheme uses one-way key chains in a well-organized way. …”
Get full text
Article -
36
RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash
Published 2015-01-01Get full text
Article -
37
Evaluating the benefits and challenges of using authentic materials in EFL context for listening purpose
Published 2025-08-01“…This study addresses the research gap in using authentic listening materials by focusing on the challenges and benefits associated with authentic materials when used in, English as a Foreign Language (EFL) contexts. …”
Get full text
Article -
38
Heartbeat detection and personal authentication using a 60 GHz Doppler sensor
Published 2025-08-01“…This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
Get full text
Article -
39
Cancelable finger vein authentication using multidimensional scaling based on deep learning
Published 2025-06-01“…In this work, we proposed a novel cancelable finger vein authentication system using multidimensional scaling (MDS) based on deep learning. …”
Get full text
Article -
40
k-times attribute-based authentication scheme using direct anonymous attestation
Published 2018-12-01“…Moreover, in order to reduce user's calculation as much as possible, the underlying attribute-based encryption scheme was modified, and then the main decryption operations were outsourced by using the key binding technique of Green et al. The new scheme can be deployed on a trusted platform and support expressive authentication policies. …”
Get full text
Article