Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization
暂无分享,去创建一个
[1] Andy Adler,et al. Biometric System Security , 2008 .
[2] Indu Chhabra,et al. Genetic Algorithm Implementation to Optimize the Hybridization of Feature Extraction and Metaheuristic Classifiers , 2018 .
[3] Loris Nanni,et al. Local binary patterns for a hybrid fingerprint matcher , 2008, Pattern Recognit..
[4] Naveen K. Chilamkurti,et al. IoT Resource Allocation and Optimization Based on Heuristic Algorithm , 2020, Sensors.
[5] Aleksandr Ometov,et al. Multi-Factor Authentication: A Survey , 2018, Cryptogr..
[6] Seyedali Mirjalili,et al. Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems , 2015, Neural Computing and Applications.
[7] Takeshi Shakunaga,et al. Combination of Projectional and Locational Decompositions for Robust Face Recognition , 2005, AMFG.
[8] Takeshi Shakunaga,et al. Gaussian Decomposition for Robust Face Recognition , 2006, ACCV.
[9] M. Shamim Hossain,et al. Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System , 2020, IEEE Transactions on Industrial Informatics.
[10] Jun Cai,et al. Single-Sample Face Recognition Based on Intra-Class Differences in a Variation Model , 2015, Sensors.
[11] Bruce A. Draper,et al. The Good, the Bad, and the Ugly Face Challenge Problem , 2012, Image and Vision Computing.
[12] Prabhat Kumar,et al. A Comprehensive Study on Multifactor Authentication Schemes , 2012, ACITY.
[13] M. Shamim Hossain,et al. Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.
[14] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[15] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[16] Loris Nanni,et al. A simple method for improving local binary patterns by considering non-uniform patterns , 2012, Pattern Recognit..
[17] R. Abdullah,et al. Authentication for ID cards based on colour visual cryptography and facial recognition , 2019, ICCSP.
[18] Ali A. Yassin,et al. Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device , 2019, Cryptogr..
[19] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..