Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Inferences From Interactions With Smart Devices: Security Leaks And Defenses, Diksha Shukla
Inferences From Interactions With Smart Devices: Security Leaks And Defenses, Diksha Shukla
Dissertations - ALL
We unlock our smart devices such as smartphone several times every day using a pin, password, or graphical pattern if the device is secured by one. The scope and usage of smart devices' are expanding day by day in our everyday life and hence the need to make them more secure. In the near future, we may need to authenticate ourselves on emerging smart devices such as electronic doors, exercise equipment, power tools, medical devices, and smart TV remote control. While recent research focuses on developing new behavior-based methods to authenticate these smart devices, pin and password still remain primary …
Limited-Data Automatic Speaker Verification Algorithm Using Band-Limitedphase-Only Correlation Function, Ángel Pedroza, José De La Rosa, José De Jesus Villa, Aldonso Becerra
Limited-Data Automatic Speaker Verification Algorithm Using Band-Limitedphase-Only Correlation Function, Ángel Pedroza, José De La Rosa, José De Jesus Villa, Aldonso Becerra
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, a new method to deal with automatic speaker verification based on band-limited phaseonly correlation (BLPOC) is proposed. The aim of this study is to validate the use of the BLPOC function as a new limited-data automatic speaker verification technique. Although some speaker verification techniques have high accuracy, efficiency usually depends on the extraction of complex theoretical information from speech signals and the amount of the data for training the algorithms. The BLPOC function is a high-accuracy biometric technique traditionally implemented in human identification by fingerprints (through image-matching). When applying the BLPOC function in automatic speaker verification through …
Textured Contact Lens Based Iris Presentation Attack In Uncontrolled Environment, Daksha Yadav
Textured Contact Lens Based Iris Presentation Attack In Uncontrolled Environment, Daksha Yadav
Graduate Theses, Dissertations, and Problem Reports
The widespread use of smartphones has spurred the research in mobile iris devices. Due to their convenience, these mobile devices are also utilized in unconstrained outdoor conditions. At the same time, iris recognition in the visible spectrum has developed into an active area of research. These scenarios have necessitated the development of reliable iris recognition algorithms for such an uncontrolled environment. Additionally, iris presentation attacks such as textured contact lens pose a major challenge to current iris recognition systems.
Motivated by these factors, in this thesis, a detailed analysis of the effect of textured contact lenses on iris recognition in …