[1] |
OMETOV A, PETROV S, BEZZATEEV S, et al. Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications[J]. IEEE Network, 2019, 33(2):82-88.
|
[2] |
JIANG Q, ZHANG X, ZHANG N, et al. Three-Factor Authentication Protocol Using Physical Unclonable Function for IoV[J]. Computer Communications, 2021, 173:45-55.
doi: 10.1016/j.comcom.2021.03.022
|
[3] |
JIANG Q, ZHANG N, NI J, et al. Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles[J]. IEEE Transactions on Vehicular Technology, 2020, 69(9):9390-9401.
doi: 10.1109/TVT.25
|
[4] |
SANDIP K S M, JHA V K. Multibiometric Fusion Strategy and Its Applications:A Review[J]. Information Fusion, 2019, 49(9):174-204.
doi: 10.1016/j.inffus.2018.11.018
|
[5] |
SADHYA D, SINGH S K. Construction of A Bayesian Decision Theory-Based Secure Multimodal Fusion Framework for Soft Biometric Traits[J]. IET Biometrics, 2018, 7(3):251-259.
doi: 10.1049/bme2.v7.3
|
[6] |
GSW A, TS B, KS C, et al. Robust Multimodal Biometric System Based on Optimal Score Level Fusion Model[J]. Expert Systems with Applications, 2019, 116(2):364-376.
doi: 10.1016/j.eswa.2018.08.036
|
[7] |
DWIVEDI R, DEY S. Score-Level Fusion for Cancelable Multi-Biometric Verification[J]. Pattern Recognition Letters, 2019, 126(9):58-67.
doi: 10.1016/j.patrec.2018.04.022
|
[8] |
CAMARA C, PERIS-LOPEZ P, GONZALEZ-MANZANO L, et al. Real-Time Electrocardiogram Streams for Continuous Authentication[J]. Applied Soft Computing, 2018, 68(7):784-794.
doi: 10.1016/j.asoc.2017.07.032
|
[9] |
WU C, HE K, CHEN J, et al. Liveness is Not Enough:Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks[C]// 29th USENIX Security Symposium.Berkeley:USENIX, 2020:2219-2236.
|
[10] |
GADALETA M, ROSSI M. IDNet Smartphone-Based Gait Recognition with Convolutional Neural Networks[J]. Pattern Recognition, 2016, 74(2):25-37.
doi: 10.1016/j.patcog.2017.09.005
|
[11] |
ROSS A, POH N. Multibiometric Systems:Overview,Case Studies and Open Issues[M]. Handbook of Remote Biometrics.Heidelberg:Springer, 2014:273-292.
|
[12] |
ISO. Information Technology-Biometric Presentation Attack Detection-Part 3:Testing and Reporting:ISO/IEC:30107-3:2017[S/OL]. [2017-09].https://www.iso.org/standard/67381.html.
|
[13] |
EBERZ S, PAOLETTI N, ROESCHLIN M, et al. Broken Hearted:How to Attack ECG Biometrics[C]// Network and Distributed System Security Symposium 2017(NDSS). San Diego: NDSS, 2017:1-15.
|
[14] |
PHOHAV V, SERWADDA A. When Kids' Toys Breach Mobile Phone Security[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2013:559-610.
|
[15] |
EBERZ S, LOVISOTTO G, PATANE A, et al. When Your Fitness Tracker Betrays You:Quantifying the Predictability of Biometric Features Across Contexts[C]// 2018 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2018:889-905.
|
[16] |
BALA N, GUPTA R, KUMAR A. Multimodal Biometric System Based on Fusion Techniques:A Review[J]. Information Security Journal:A Global Perspective, 2022, 31(3):289-337.
doi: 10.1080/19393555.2021.1974130
|
[17] |
刘礼才, 李锐光, 殷丽华, 等. 面向移动智能设备的多特征融合隐式鉴别机制研究[J]. 电子学报, 2016, 44(11):2713-2719.
doi: 10.3969/j.issn.0372-2112.2016.11.021
|
|
LIU Licai, LI Ruiguang, YIN Lihua, et al. Research on Multi-Feature Fusion Impact Authentication for Intelligent Mobile Device[J]. Acta Electronica Sinica, 2016, 44(11):2713-2719.
doi: 10.3969/j.issn.0372-2112.2016.11.021
|
[18] |
姜奇, 文悦, 张瑞杰, 等. 面向智能手机的自适应触屏持续认证方案[J]. 电子学报, 2022, 50(5):1131-1139.
doi: 10.12263/DZXB.20210624
|
|
JIANG Qi, WEN Yue, ZHANG Ruijie, et al. An Adaptive Touchscreen Based Continuous Authentication Scheme for Smart Phones[J]. Acta Electronica Sinica, 2022, 50(5):1131-1139.
doi: 10.12263/DZXB.20210624
|
[19] |
KHODADOUST J, MEDINA-PEREZ M A, MONROY R, et al. A Multibiometric System Based on the Fusion of Fingerprint,Finger-Vein,and Finger-Knuckle-Print[J]. Expert Systems with Applications, 2021, 176:114687.
doi: 10.1016/j.eswa.2021.114687
|
[20] |
AIZI K, OUSLIM M. Score Level Fusion in Multi-Biometric Identification Based on Zones of Interest[J]. Journal of King Saud University-Computer and Information Sciences, 2022, 34(1):1498-1509.
|
[21] |
PUROHIT H, AJMERA P K. Optimal Feature Level Fusion for Secured Human Authentication in Multimodal Biometric System[J]. Machine Vision and Applications, 2021, 32(1):1-12.
doi: 10.1007/s00138-020-01119-9
|
[22] |
SITOVAZ, SEDENKA J, YANG Q, et al. HMOG:New Behavioral Biometric Features for Continuous Authentication of Smartphone Users[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(5):877-892.
doi: 10.1109/TIFS.2015.2506542
|
[23] |
HANMANDLU M, GROVER J, GUREJA A, et al. Score Level Fusion of Multimodal Biometrics Using Triangular Norms[J]. Pattern Recognition Letters, 2011, 32(14):1843-1850.
doi: 10.1016/j.patrec.2011.06.029
|
[24] |
VEERAMACHANENI K K, OSADCIW L A, VARSHNEY P K. An Adaptive Multimodal Biometric Management Algorithm[J]. IEEE Transactions on Systems,Man and Cybernetics, 2005, 35(3):344-356.
|
[25] |
KUMAR A, KANHANGAD V, ZHANG D. A New Framework for Adaptive Multimodal Biometrics Management[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):92-102.
doi: 10.1109/TIFS.2009.2031892
|
[26] |
SINGH M, SINGH R, ROSS A. A Comprehensive Overview of Biometric Fusion[J]. Information Fusion, 2019, 52:187-205.
doi: 10.1016/j.inffus.2018.12.003
|
[27] |
VATSA M, R SINGH, NOORE A, et al. On the Dynamic Selection of Biometric Fusion Algorithms[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3):470-479.
doi: 10.1109/TIFS.2010.2056683
|
[28] |
EDWARDS T, HOSSAIN M S. Effectiveness of Deep Learning on Serial Fusion Based Biometric Systems[J]. IEEE Transactions on Artificial Intelligence, 2021, 2(1):28-41.
doi: 10.1109/TAI.2021.3064003
|
[29] |
WALIA G S, SINGH T, SINGH K, et al. Robust Multimodal Biometric System Based on Optimal Score Level Fusion Model[J]. Expert Systems with Applications, 2019, 116(2):364-376.
doi: 10.1016/j.eswa.2018.08.036
|
[30] |
ALAGARSAMY S B, MURUGAN K. Multimodal of Ear and Face Biometric Recognition Using Adaptive Approach Runge-Kutta Threshold Segmentation and Classifier with Score Level Fusion[J]. Wireless Personal Communications, 2022, 124(2):1061-1080.
doi: 10.1007/s11277-021-09394-z
|
[31] |
ZHANZ H, ZHANG J, LI Y, et al. Adaptive Particle Swarm Optimization[J]. IEEE Transactions on Systems,Man,and Cybernetics, 2009, 39(6):1362-1381.
|
[32] |
YANG Q, PENG G, NGUYEN D T, et al. A Multimodal Data Set for Evaluating Continuous Authentication Performance in Smartphones[C]// Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. New York: ACM, 2014:358-359.
|