Targeted biometric impersonation.
John D. BustardJohn N. CarterMark S. NixonPublished in: IWBF (2013)
Keyphrases
- security analysis
- smart card
- user authentication
- pattern recognition
- authentication protocol
- biometric data
- personal identification
- iris recognition
- biometric systems
- biometric identification
- biometric authentication
- identity verification
- multimodal biometrics
- person authentication
- palmprint
- facial recognition
- feature level fusion
- biometric authentication systems
- target audience
- human identification
- security systems
- learning algorithm
- hand vein
- neural network