Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    DeepBio: A Deep CNN and Bi-LSTM Learning for Person Identification Using Ear Biometrics

    Anshul Mahajan*, Sunil K. Singla

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1623-1649, 2024, DOI:10.32604/cmes.2024.054468 - 27 September 2024

    Abstract The identification of individuals through ear images is a prominent area of study in the biometric sector. Facial recognition systems have faced challenges during the COVID-19 pandemic due to mask-wearing, prompting the exploration of supplementary biometric measures such as ear biometrics. The research proposes a Deep Learning (DL) framework, termed DeepBio, using ear biometrics for human identification. It employs two DL models and five datasets, including IIT Delhi (IITD-I and IITD-II), annotated web images (AWI), mathematical analysis of images (AMI), and EARVN1. Data augmentation techniques such as flipping, translation, and Gaussian noise are applied to More >

  • Open Access

    ARTICLE

    An Enhanced Hybrid Model Based on CNN and BiLSTM for Identifying Individuals via Handwriting Analysis

    Md. Abdur Rahim1, Fahmid Al Farid2, Abu Saleh Musa Miah3, Arpa Kar Puza1, Md. Nur Alam4, Md. Najmul Hossain5, Sarina Mansor2, Hezerul Abdul Karim2,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1689-1710, 2024, DOI:10.32604/cmes.2024.048714 - 20 May 2024

    Abstract Handwriting is a unique and significant human feature that distinguishes them from one another. There are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through verification. However, such systems are susceptible to forgery, posing security risks. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures or symbols. In response to these challenges, we propose an innovative hybrid technique for individual identification based on independent handwriting, eliminating the reliance on specific signatures… More >

  • Open Access

    ARTICLE

    Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches

    Jungpil Shin1,*, Md. Al Mehedi Hasan2, Md. Maniruzzaman1, Taiki Watanabe1, Issei Jozume1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1205-1222, 2024, DOI:10.32604/cmc.2024.046954 - 25 April 2024

    Abstract Person identification is one of the most vital tasks for network security. People are more concerned about their security due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprints and faces have been widely used for person identification, which has the risk of information leakage as a result of reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiable pattern, which will not be reproducible falsely by capturing psychological and behavioral information of a person using vision and sensor-based techniques. In existing studies, most… More >

  • Open Access

    ARTICLE

    Dataset of Large Gathering Images for Person Identification and Tracking

    Adnan Nadeem1,*, Amir Mehmood2, Kashif Rizwan3, Muhammad Ashraf4, Nauman Qadeer3, Ali Alzahrani1, Qammer H. Abbasi5, Fazal Noor1, Majed Alhaisoni6, Nadeem Mahmood7

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6065-6080, 2023, DOI:10.32604/cmc.2023.035012 - 28 December 2022

    Abstract This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi, Madinah, Saudi Arabia. This dataset consists of raw and processed images reflecting a highly challenging and unconstraint environment. The methodology for building the dataset consists of four core phases; that include acquisition of videos, extraction of frames, localization of face regions, and cropping and resizing of detected face regions. The raw images in the dataset consist of a total of 4613 frames obtained from video sequences. The processed images in the… More >

  • Open Access

    ARTICLE

    Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals

    V. Harshini1, T. Dhanwin1, A. Shahina1,*, N. Safiyyah2, A. Nayeemulla Khan2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1851-1867, 2023, DOI:10.32604/csse.2023.028136 - 03 November 2022

    Abstract Biometrics, which has become integrated with our daily lives, could fall prey to falsification attacks, leading to security concerns. In our paper, we use Transient Evoked Otoacoustic Emissions (TEOAE) that are generated by the human cochlea in response to an external sound stimulus, as a biometric modality. TEOAE are robust to falsification attacks, as the uniqueness of an individual’s inner ear cannot be impersonated. In this study, we use both the raw 1D TEOAE signals, as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform (CWT). We use 1D and 2D… More >

  • Open Access

    ARTICLE

    Hybrid Feature Extractions and CNN for Enhanced Periocular Identification During Covid-19

    Raniyah Wazirali1, Rami Ahmed2,*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 305-320, 2022, DOI:10.32604/csse.2022.020504 - 08 October 2021

    Abstract The global pandemic of novel coronavirus that started in 2019 has seriously affected daily lives and placed everyone in a panic condition. Widespread coronavirus led to the adoption of social distancing and people avoiding unnecessary physical contact with each other. The present situation advocates the requirement of a contactless biometric system that could be used in future authentication systems which makes fingerprint-based person identification ineffective. Periocular biometric is the solution because it does not require physical contact and is able to identify people wearing face masks. However, the periocular biometric region is a small area,… More >

Displaying 1-10 on page 1 of 6. Per Page