Hybrid biometric authentication for automatic teller machine
Automated Teller Machines (ATMs) are a crucial part of modern life, providing users with the ability to conduct basic banking transactions electronically without the need for bank representatives. These machines are ubiquitous, particularly in developed countries, and their usage is expanding rapidl...
| Main Authors: | Arokiasamy, Steven R., Tomal, Md Raihanul Islam, Moorthy, Kohbalan, Mohd Daud, Kauthar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
UMPSA
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/43159/ http://umpir.ump.edu.my/id/eprint/43159/1/IJSECS-10-1-03-32-39.pdf |
Similar Items
Fingerprint based automatic teller machine
by: Steven, Arokiasamy
Published: (2018)
by: Steven, Arokiasamy
Published: (2018)
An Application of Biometric Security Identification for Automated Teller Machine
by: Zulkifli, Izyan Fatin Dalila, et al.
Published: (2020)
by: Zulkifli, Izyan Fatin Dalila, et al.
Published: (2020)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Optical character recognition using backpropagation neural network for handwritten digit characters
by: Yap, Mei Ing, et al.
Published: (2021)
by: Yap, Mei Ing, et al.
Published: (2021)
Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review
by: Kauthar, Mohd Daud, et al.
Published: (2023)
by: Kauthar, Mohd Daud, et al.
Published: (2023)
The importance of data classification using machine learning methods in microarray data
by: Jaber, Aws Naser, et al.
Published: (2021)
by: Jaber, Aws Naser, et al.
Published: (2021)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
A hybrid cryptosystem for biometric authentication and template protection
by: Jegede, Abayomi Joshua
Published: (2017)
by: Jegede, Abayomi Joshua
Published: (2017)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Currency Demand Forecasting For Automated Teller Machines (ATMs) Of Banks
by: Doss, Paul
Published: (2010)
by: Doss, Paul
Published: (2010)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Automated teller machine using UMP smart card in DB2
by: Wong, Kam Man
Published: (2012)
by: Wong, Kam Man
Published: (2012)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Improvement of the POLISAS e-request transcript system using query optimization
by: Mohd Hariz, Ibrahim, et al.
Published: (2020)
by: Mohd Hariz, Ibrahim, et al.
Published: (2020)
Pseudorotation in Jahn-Teller systems
by: Sindi, Lubna
Published: (2008)
by: Sindi, Lubna
Published: (2008)
A new hybrid teaching learning based optimization -extreme learning machine model based intrusion-detection system
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023)
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Keystroke pressure-based typing biometrics
authentication system using support vector machines
by: Martono, Wahyudi, et al.
Published: (2007)
by: Martono, Wahyudi, et al.
Published: (2007)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Moment Analysis In Biometric-Based Authentication Systems
by: Pang, Ying Han
Published: (2005)
by: Pang, Ying Han
Published: (2005)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A blind multiple watermarks based on human visual characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Non-fiducial based ECG biometric authentication using one-class support vector machine
by: Hejazi, Maryamsadat, et al.
Published: (2017)
by: Hejazi, Maryamsadat, et al.
Published: (2017)
Customers’ Trust In The Use Of Automated Teller
Machine (Atm) Services In Sokoto State, Nigeria
by: Bello Bada, Abdulrahman
Published: (2015)
by: Bello Bada, Abdulrahman
Published: (2015)
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
by: Muhammad Arif, Mohamad, et al.
Published: (2021)
by: Muhammad Arif, Mohamad, et al.
Published: (2021)
Study On The Template Protection Technique In Biometric Authentication System
by: Ong, Thian Song
Published: (2008)
by: Ong, Thian Song
Published: (2008)
Transmissibility prediction of coronavirus disease (covid-19) outbreak in early stages
by: Wong, Jordan, et al.
Published: (2021)
by: Wong, Jordan, et al.
Published: (2021)
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Offline handwritten chinese character using convolutional neural network : State-of-the-art methods
by: Zhong, Yingna, et al.
Published: (2023)
by: Zhong, Yingna, et al.
Published: (2023)
Offline handwritten Chinese character using convolutional neural network: State-of-the-art methods
by: Zhong, Yingna, et al.
Published: (2023)
by: Zhong, Yingna, et al.
Published: (2023)
Short term forecasting based on hybrid least squares support vector machines
by: Zuriani, Mustaffa, et al.
Published: (2018)
by: Zuriani, Mustaffa, et al.
Published: (2018)
ASP authentication using IP address / Kumar Mallanaidu
by: Kumar , Mallanaidu
Published: (2003)
by: Kumar , Mallanaidu
Published: (2003)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Similar Items
-
Fingerprint based automatic teller machine
by: Steven, Arokiasamy
Published: (2018) -
An Application of Biometric Security Identification for Automated Teller Machine
by: Zulkifli, Izyan Fatin Dalila, et al.
Published: (2020) -
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018) -
Optical character recognition using backpropagation neural network for handwritten digit characters
by: Yap, Mei Ing, et al.
Published: (2021) -
Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review
by: Kauthar, Mohd Daud, et al.
Published: (2023)