Discovery Logo
Sign In
Search
Paper
Search Paper
Pricing Sign In
  • Home iconHome
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Literature Review iconLiterature Review NEW
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link
Discovery Logo menuClose menu
  • Home iconHome
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Literature Review iconLiterature Review NEW
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link

Related Topics

  • Biometric Authentication System
  • Biometric Authentication System
  • Biometric Recognition
  • Biometric Recognition
  • Biometric Identification
  • Biometric Identification
  • Biometric Security
  • Biometric Security
  • Multibiometric Systems
  • Multibiometric Systems
  • Biometric Traits
  • Biometric Traits

Articles published on Biometric system

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
4152 Search results
Sort by
Recency
  • Research Article
  • 10.1038/s41598-026-39908-3
Optimizing biometric system selection via complex spherical fuzzy einstein aggregation operators.
  • Mar 11, 2026
  • Scientific reports
  • Sehar Kanwal + 3 more

Optimizing biometric system selection via complex spherical fuzzy einstein aggregation operators.

  • Research Article
  • 10.1016/j.compbiomed.2026.111616
Interpretable evaluation of physiological signals for biometric identification.
  • Mar 10, 2026
  • Computers in biology and medicine
  • Vithurabiman Senthuran + 4 more

Interpretable evaluation of physiological signals for biometric identification.

  • Research Article
  • 10.3390/s26051634
An Efficient Finger Vein Recognition Method Based on Improved Lightweight MobileNet.
  • Mar 5, 2026
  • Sensors (Basel, Switzerland)
  • Xuhui Zhang + 4 more

Finger vein recognition has emerged as a highly robust and intrinsically stable biometric technology, demonstrating great potential in identity authentication and intelligent security applications. However, conventional methods still suffer from constraints in feature representation and computational efficiency, particularly under challenging conditions such as illumination variation, pose deviation, and noise interference. To address these challenges, this study presents an efficient finger vein recognition approach based on a lightweight convolutional neural network (LCNN) architecture. The proposed framework integrates a multi-stage image preprocessing pipeline for automatic vein region detection, advanced denoising, and refined texture enhancement, which is subsequently followed by compact feature modeling within a lightweight deep network. Extensive experiments on the public Shandong University Machine Learning and Applications-Homologous Multi-Modal Traits (SDUMLA-HMT) dataset and a self-acquired Laboratory Finger-Vein (Lab-Vein) dataset validate the superiority of the proposed method, achieving recognition accuracies of 97.1% and 98.3%, respectively, surpassing existing benchmark models. Moreover, the model demonstrates notable reductions in parameter complexity and computational cost, achieving an average inference time of only 12.6 ms, which confirms its strong real-time capability and suitability for embedded deployment. Overall, the proposed approach attains a desirable trade-off between accuracy and efficiency, offering meaningful implications for the advancement of lightweight biometric recognition systems.

  • Research Article
  • 10.48175/ijarsct-31439
AI-Based Face Recognition Attendance
  • Mar 4, 2026
  • International Journal of Advanced Research in Science Communication and Technology
  • Minal Solanki, Sanidhi Gajbhiye, Ritika Wanjari

Attendance management is an essential administrative task in educational institutions and organizations, yet traditional methods such as manual roll calls and register-based systems are time- consuming, error-prone, and vulnerable to proxy attendance. With the rapid advancement of Artificial Intelligence (AI) and computer vision technologies, automated biometric systems have emerged as efficient alternatives. This research presents the design, development, and implementation of an AI- Based Face Recognition Attendance System integrated with a real-time web dashboard for monitoring and management. The proposed system utilizes computer vision techniques for face detection and deep learning-based facial encoding for recognition. Real-time video frames captured through a webcam are processed to detect faces, extract distinctive facial features, and compare them with pre-stored facial encodings in a database. Upon successful recognition, attendance is automatically recorded along with date and timestamp information, eliminating manual intervention. The system is developed using Python, OpenCV, and a Flask-based web framework, with structured database integration for secure and organized data storage. In addition to automated attendance marking, the system incorporates a dynamic administrative dashboard that provides real-time statistics, attendance summaries, and historical trend visualization. The dashboard enhances usability by allowing administrators to manage student records, monitor attendance performance, and generate reports efficiently. Experimental evaluation demonstrates a recognition accuracy ranging from 92% to 96% under standard indoor lighting conditions, with processing time under two seconds per individual. The proposed solution reduces administrative workload, prevents proxy attendance, ensures contactless operation, and improves record accuracy. Although minor limitations exist under low-light conditions or partial facial occlusion, the system demonstrates strong reliability and scalability for practical deployment. This research highlights the effectiveness of integrating AI-driven facial recognition with web-based management systems to modernize attendance processes in educational and organizational environments..

  • Research Article
  • 10.1145/3800703
3D Biometrics: A Survey
  • Mar 3, 2026
  • ACM Computing Surveys
  • Min Wang + 1 more

Existing biometric systems are predominantly built upon 2D biometrics which are vulnerable to presentation attacks, and have a limited coverage of the biometric surface. 3D biometrics is emerging due to the rapid development of 3D sensing technology. 3D biometrics is effective in defending against spoofing attacks and potentially offer more robust performance under different conditions. However, there exist many challenges in developing effective 3D biometric systems in terms of 3D biometrics reconstruction and recognition. In this paper, we present a systematic survey on the latest developments of 3D biometric systems guided by our proposed taxonomy of methods for 3D biometrics.

  • Research Article
  • 10.1016/j.inffus.2026.104267
From Unimodal to Flexible: A Survey of Generalized Biometric Systems
  • Mar 1, 2026
  • Information Fusion
  • Leslie Ching Ow Tiong + 3 more

From Unimodal to Flexible: A Survey of Generalized Biometric Systems

  • Research Article
  • 10.30574/wjaets.2026.18.2.0088
Biometrics authentication trends and failures
  • Feb 28, 2026
  • World Journal of Advanced Engineering Technology and Sciences
  • Minul Mindula Subasinghe + 1 more

Biometric authentication is now central to modern identity and access management, offering stronger security and a better user experience than traditional passwords. From 2025 to 2026, advances in artificial intelligence, sensor technology, and decentralized identity models have broadened the adoption of biometric systems in consumer, business, and government sectors. However, emerging threats such as deepfakes, adversarial machine learning, and large-scale data breaches have exposed significant vulnerabilities and ethical issues. This paper reviews recent trends and shortcomings in biometric authentication, comparing major methods, including fingerprint, facial, iris, voice, and behavioral recognition. It assesses their performance, reliability, usability, scalability, and security, and examines the increasing adoption of multimodal, continuous, and privacy-preserving authentication systems. The analysis addresses key challenges, including spoofing, bias, template theft, and accessibility, to identify current system limitations. The paper proposes a layered mitigation framework that integrates technical safeguards, system design enhancements, governance measures, and user-focused strategies. It contends that the effectiveness of biometric authentication relies on both technological advancement and ethical, transparent practices that foster public trust. Addressing technical and social factors is essential to developing secure, fair, and widely accepted biometric systems.

  • Research Article
  • 10.30574/wjaets.2026.18.2.0062
Biometric-Sealed Keys Using iOS Secure Enclave for Zero-Trust On-Device Security
  • Feb 28, 2026
  • World Journal of Advanced Engineering Technology and Sciences
  • Venkata Kalyan Pasupuleti

The ongoing evolution of cybersecurity has necessitated a paradigm shift toward zero-trust architectures, in which no single component, user, or device is inherently trusted. In this context, the emerging technology of on-device security (such as iOS Secure Enclave based on biometric-sealed keys) can be regarded as a novel security system wherein cryptographic functions are hard-bound to user-specific biometric data stored within a secure, non-exportable enclave. This review discusses the technical foundation of biometric-sealed keys, privacy-preserving biometric systems, and their integration with federated identity and post-quantum cryptography. The importance of mutable biometrics, the generation of dynamic keys utilizing fuzzy logic, and low-latency encryption in relation to multi-hop authentication are further examined. Despite the considerable advantages, fallback vulnerabilities, device interoperability issues, and ethical concerns must also be considered in efforts to fully harness the potential of this technology. Privacy-first security architectures will be redefined through biometric sealing and secure execution environments that are resilient to hardware-level attacks and aligned with zero-trust principles in the modern digital ecosystem.

  • Research Article
  • 10.58346/jisis.2026.i1.052
Immersive Visual Identity Authentication and Deepfake Detection Using Multimodal Feature Fusion for Secure Extended Reality Internet Service Environments
  • Feb 27, 2026
  • Journal of Internet Services and Information Security
  • R Sivamalar + 6 more

The rapid growth of Extended Reality (XR) Internet services has raised significant security concerns, especially for immersive visual identity authentication. Deepfake-based impersonation attacks can harm user trust and data confidentiality. Traditional biometric systems, which are mainly unimodal facial recognition, are susceptible to synthetic media manipulation and adversarial spoofing. This paper proposes an immersive visual identity authentication system, coupled with a deepfake detection system that leverages multimodal feature fusion to enhance security in XR settings. The given model integrates spatial-temporal facial representations, periocular texture representations, voice spectral representations, and behavioural motion patterns via a hybrid attention-based fusion network. An evaluation was conducted on a dataset of 18,500 authentic and 17,300 deepfake XR interaction samples. Experiments show that the multimodal fusion model achieves an authentication accuracy of 98.7%, which is much higher than that of unimodal models (face-only: 92.4%; voice-only: 89.1%). The proposed deepfake detection module achieves the following precision, recall, F1-score, and false acceptance rate (FAR): 97.9%, 98.3%, 98.1%, and 1.2%, respectively, representing a 43% decrease in spoofing vulnerability compared to traditional CNN-based detectors. Additionally, real-time viability is verified through latency analysis, with an average authentication cycle processing delay of 34 ms, which is within the constraints of immersive XR services. The results suggest that multimodal feature fusion is associated with a high level of resistance to identity verification in immersive Internet ecosystems under synthetic identity manipulation. The proposed framework will contribute to a secure, scalable, and reliable authentication infrastructure for next-generation XR-enabled digital services.

  • Research Article
  • 10.21275/sr26207024823
Explainable Deep Liveness Detection: Balancing Transparency, Security, and Compliance in Workforce and Government Biometric Systems
  • Feb 27, 2026
  • International Journal of Science and Research (IJSR)
  • Rahul Raj

Explainable Deep Liveness Detection: Balancing Transparency, Security, and Compliance in Workforce and Government Biometric Systems

  • Research Article
  • 10.1142/s1469026826500021
BFSET: A Dataset for Studying Facial Characteristics of Bearded Men and Soft Biometrics
  • Feb 25, 2026
  • International Journal of Computational Intelligence and Applications
  • Hamda Ben Elbahri + 1 more

Facial recognition and soft biometrics systems often face difficulties in the presence of facial hair, particularly beards, which significantly modify the structure and texture of the face. Existing facial datasets rarely include beard-specific annotations, limiting the robustness of models in real-world conditions. To address this limitation, we introduce BFSET (BeardFaceSet), a curated dataset comprising 4800 fully annotated facial images featuring various beard styles, densities, and poses. Each image includes precise bounding box coordinates of the beard region, enabling targeted analysis and learning. A statistical evaluation based on entropy, GLCM, and HOG features confirms the visual diversity and texture complexity of the dataset. In addition, benchmarking experiments using BFSET demonstrated improved beard detection accuracy (mAP ≈ 0.93) and recognition performance when integrated with existing datasets. BFSET is therefore a valuable resource for the development and evaluation of models that consider beards in facial recognition and soft biometrics.

  • Research Article
  • 10.65221/0114
Technology-driven election administration in Nigeria: A determinant or deterrent to fraud-tainted elections?
  • Feb 23, 2026
  • African Research Reports
  • Uchenna Obiagu + 1 more

Digital technologies have moderately reduced inflated voter accreditation figures in Nigeria; however, other forms of electoral fraud continue to undermine electoral integrity. This study argues that technology-based elections have repeatedly suffered biometric device failures because critical enabling factors—such as electricity, internet connectivity, and technical expertise—remain inadequate, hindering the smooth implementation of biometric policies. These challenges have hybridised the electoral system, as policy reversals and the adoption of manual accreditation have undermined INEC’s commitment to fully govern voter accreditation through biometric devices. The study draws on the cybernetic communication model and the frustration–aggression hypothesis for theoretical insights, and employs the documentary method for data collection, with descriptive statistics and content analysis used for data analysis. Findings indicate that biometric device failures, largely caused by infrastructural and human resource deficiencies, facilitate fraud, exacerbate electoral conflicts, and render contests highly controversial. Such failures open avenues for electoral manipulation, generating discontent that manifests in lethal violence, rejection of outcomes through litigation, and voter apathy. These results underscore the urgent need for policy reforms aimed at strengthening technological adoption and improving enabling infrastructure and human capacity, thereby maximizing the intended benefits of biometric systems in Nigerian elections.

  • Research Article
  • 10.34190/iccws.21.1.4533
Revisiting Biometrics in Cybersecurity: Do AI Methods and Zero‑Trust Architectures Drive Innovation?
  • Feb 19, 2026
  • International Conference on Cyber Warfare and Security
  • Siphesihle Sithungu + 1 more

Biometric authentication has long been regarded as a foundational element of identity verification, leveraging unique physiological and behavioral traits to enhance security beyond traditional passwords. While it offers notable advantages such as convenience and resistance to identity theft, concerns are mounting regarding privacy, susceptibility to spoofing, and the irreversibility of compromised biometric identifiers. These weaknesses are becoming increasingly critical as digital infrastructures evolve into distributed, dynamic environments in which static trust models are no longer sufficient. Moreover, several traditional modalities- such as fingerprints, iris scans, and voice recognition- have already been breached. However, Artificial Intelligence (AI) methods are reshaping this landscape by introducing adaptive and context‑aware features into biometric systems. Machine Learning (ML) techniques enhance accuracy, enable continuous authentication, and support multimodal fusion, while anomaly‑detection mechanisms improve resilience against sophisticated attacks. Generative AI (GenAI) plays a particularly significant role, though it introduces a paradox: it empowers defenders through realistic attack simulations and robustness testing, yet simultaneously equips attackers with tools for producing deepfakes and synthetic identities, thereby expanding the attack surface. In this evolving security landscape, Zero‑Trust Architectures (ZTA) have gained prominence as a model that replaces assumptions of inherent trust with continuous verification mechanisms. The use of biometric data within ZTA can enhance the reliability of identity verification; however, it also intensifies several existing issues. Biometric identifiers must be handled and stored in ways that safeguard individual privacy and align with relevant legal requirements, and the incorporation of AI‑based assessment methods introduces additional concerns regarding potential bias, transparency, and oversight. Moreover, combining AI‑supported biometric systems with Zero‑Trust principles raises further questions about scalability, system compatibility, and the broader ethical consequences of more pervasive identity monitoring. This work therefore examines the convergence of biometrics, AI, and Zero‑Trust principles from a critical perspective. It highlights the dual role of AI as both a source of innovation and a generator of new threats, while identifying opportunities for adaptive security, real‑time threat detection, and improved user experience. By analyzing technical and operational dimensions, the work proposes a roadmap for integrating biometrics into ZTA that balances innovation with accountability and supports trustworthy, resilient cybersecurity frameworks.

  • Research Article
  • 10.5296/ijssr.v13i3.23576
A Framework for the Mediating Role of Training on the Relationship Between ICT Technology Adoption and Manufacturing Performance in ADNOC UAE
  • Feb 12, 2026
  • International Journal of Social Science Research
  • Faisal Braik Mohammed Salem Al Katheeri + 3 more

Given ADNOC’s strategic push toward digital transformation, it is critical to understand how ICT adoption translates into tangible improvements in manufacturing performance. To address this, the study tested the proposed framework using 356 valid responses from ADNOC employees, analysed through SmartPLS. The model demonstrated strong fit and validity, confirming significant direct effects of biometric systems (0.155), drone technology (0.161), face detection and tracking (0.19), and two-way radio communication (0.18) on manufacturing performance, while robotics showed no direct significance. Training emerged as a critical mediator, fully mediating the effect of robotics and partially mediating the effects of drones, two-way radios, and biometric systems. No mediation was observed for face detection and tracking. These findings highlight the key role of workforce training in unlocking the full potential of ICT technologies, thereby enhancing manufacturing performance in ADNOC’s operations.

  • Research Article
  • 10.35314/mkks1830
Implementation of AES-128 Encryption for Fingerprint Template Protection in ESP32-Based Biometric Ticketing System
  • Feb 11, 2026
  • INOVTEK Polbeng - Seri Informatika
  • Muhammad Asep Subandri + 2 more

Biometric ticketing systems utilizing fingerprint recognition provide enhanced security and convenience for passenger identification in public transportation. However, the transmission of fingerprint templates over wireless networks without adequate cryptographic protection exposes the system to interception attacks and privacy breaches. This research implements AES-128 encryption in Cipher Block Chaining (CBC) mode to protect fingerprint templates transmitted within an ESP32-based biometric ticketing system. The implementation leverages the ESP32’s integrated mbedTLS library with hardware acceleration to achieve efficient cryptographic operations. Experimental evaluation using 10 fingerprint template samples demonstrates a 100% success rate for encryption-decryption operations. Performance measurements indicate an average encryption latency of 2.30 ms and decryption latency of 2.10 ms, with a data size overhead of 32 bytes (6.25%) due to Initialization Vector (IV) and PKCS7 padding. The results confirm that the proposed encryption scheme effectively secures biometric data transmission while maintaining system responsiveness suitable for real-time applications.

  • Research Article
  • 10.1080/02589346.2026.2622779
AI-driven border surveillance in ECOWAS: implications for migrants’ rights and data privacy in the age of cyber sovereignty
  • Feb 10, 2026
  • Politikon
  • Philippa Osim Inyang

ABSTRACT The increasing use of AI-driven surveillance technologies at West African borders marks a shift in ECOWAS’s approach to regional security, migration management, and crime control. Biometric identification systems, predictive analytics, and automated profiling, often influenced by European migration externalisation policies, are becoming central to border governance. This article critically examines the human rights implications of these technologies, focusing on their effects on migrants′ rights, data protection, and the ECOWAS principle of free movement. Through legal and policy analysis, it assesses the compatibility of AI-driven border surveillance with international and regional human rights frameworks, including the African Charter on Human and Peoples’ Rights. The article argues that while AI may enhance border security, it also deepens risks of digital authoritarianism, racialised profiling, and exclusionary migration policies. Drawing on case studies from Nigeria and Niger, it calls for stronger regional safeguards, oversight mechanisms, and human rights centred AI governance in West Africa and contributes to ongoing debates on cyber sovereignty, migration, and AI ethics in the region.

  • Research Article
  • 10.65542/djei.v2i1.17
Iris Recognition Based Deep Learning: A Survey
  • Feb 9, 2026
  • Dasinya Journal for Engineering and Informatics
  • Haval Ismael Hussein + 2 more

The iris recognition system is one of the most reliable biometric authentication systems owing to its individuality and permanence. With the introduction of deep learning concepts, especially CNNs, iris recognition models have improved tremendously in accuracy, robustness, and efficiency. We present an extensive survey summ2arizing the application of deep learning in iris recognition; covering datasets, feature extraction, architectures, and evaluation metrics. We conclude that while CNNs and transfer learning produce the best accuracy on well-constrained datasets, serious challenges lie with cross-sensor generalization and robustness under mobile or unconstrained environments. The new solutions that are generating attention, such as generation adversarial network-based augmentation and attention-driven architectures, are solution pathways to surmount data scarcity and further strengthen the adaptation capability. This survey is aimed at steering researchers and practitioners to various critical challenges and directions that have the most potential for future iris recognition systems.

  • Research Article
  • 10.15622/ia.25.1.6
Assessing the Influence of Floating-Point Bit Depth on Speaker Recognition Accuracy
  • Feb 4, 2026
  • Информатика и автоматизация
  • Nikita Kolmakov + 1 more

The article analyzes the impact of varying the bit depth (quantization) of a neural network’s output tensor on speaker recognition accuracy. This tensor represents the neural network’s latent space, containing the latent features utilized for speaker recognition tasks. Typically, 32 bits are allocated per value in the output space (the output tensors of the methods under study contain 512 values), resulting in significant memory requirements for maintaining a continuously updated database. Consequently, the "minifloat" floating-point format is of particular interest, as it enables numerical representations using only 8, 6, or 4 bits. To ensure comprehensive results, three neural network models demonstrating superior recognition performance on the test set were selected: CAM++, WavLM, and ReDimNet. These models possess unique architectural characteristics, facilitating the assessment of how bit depth reduction affects recognition accuracy across different neural network architectures. Recognition accuracy is evaluated using the Equal Error Rate (EER). The evaluation employs the English-language VoxCeleb-1 dataset, the audio characteristics of which correspond to those of a small-scale biometric system database. The relevance of this study is underscored by the increasing volume of research proposing the use of voice as a verification key. Therefore, managing large biometric datasets requires substantial storage capacity and RAM. Modern databases are continuously updated and expanded, leading to increased resource demands for their maintenance. Applying quantization to the neural network’s output tensor offers a potential solution. However, excessive reduction of the bit depth in the output tensor can lead to a significant degradation in recognition quality compared to the baseline network. The primary focus of this research is to minimize the resources required to support a biometric system without the need for additional neural network training.

  • Research Article
  • 10.3390/healthcare14030377
Ensuring Safe Newborn Delivery Through Standards: A Scoping Review of Technologies Aligned with Healthcare Accreditation and Regulatory Frameworks.
  • Feb 2, 2026
  • Healthcare (Basel, Switzerland)
  • Abdallah Alsuhaimi + 1 more

Background/Objectives: Safe delivery and correct identification of newborns are critical aspects of healthcare systems globally. The accreditation of healthcare and standards regulation significantly promotes the adoption of modern technologies to address risks related to infant abduction and misidentification. The effectiveness and extent of these mandates vary across settings and countries. Therefore, this study aims to map and explore modern technologies used for safe newborn delivery and correct identification aligned with healthcare accreditation and regulatory frameworks. Methods: This review adheres to the Preferred Reporting Items for Systematic Review and Meta-Analysis extension for scoping reviews (PRISMA-ScR) guidelines. The Problem, Intervention, Comparison, and Outcome (PICO) framework was employed to facilitate the development of the research question. This study examined studies reporting technologies such as radio frequency identification (RFID), biometric identification, and real-time monitoring across healthcare settings for infant protection through the Normalization Process Theory (NPT). Among three databases and search engines (PubMed, Google Scholar, and Web of Science). The risk of bias for each study was assessed using the AACODS Checklist, SQUIRE 2.0 Checklist, TIDieR Checklist, and JBI tools. Results: Out of 8753 records, only 27 reports were eligible to be included in this review. The most frequently reported technologies were RFID systems (11 studies, 37.9%) and biometric systems such as footprint and facial recognition (6 studies, 20.7%). Despite strong technological potential, many healthcare institutions struggled with the adoption of infant protection technologies. Accreditation systems among the high-resource settings actively mandate advanced technologies and support the integration of staff training and simulation drills. Comparably, middle- and low-income regions usually face challenges related to regulatory enforcement, infrastructure, staff readiness, and limited adoption of modern technologies. Conclusions: Accreditation and standards development are critical catalysts for the adoption of modern infant protection technology. Standards must be comprehensible, adaptable, and supported by investment in human resources and infrastructure. Future regulation must focus on strengthening enforcement, continuous quality improvement, and capacity building to achieve sustainable protection across the world.

  • Research Article
  • 10.1016/j.dsp.2025.105803
Signing EEG-based biometric authentication system using multivariate Fourier-Bessel series expansion-based entropies
  • Feb 1, 2026
  • Digital Signal Processing
  • Sai Pranavi Kamaraju + 2 more

Signing EEG-based biometric authentication system using multivariate Fourier-Bessel series expansion-based entropies

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers