All Stories

Recently, several authentication protocols are being used in mobile applications. OTP is one of the most powerful authentication methods among them. However, it has some security vulnerabilities, particularly to MITM(Man-in-the-Middle) attack and MITPC/Phone(Man-in-the-PC/Phone) attack. An adversary could know a valid…

Modern smartphones are globally ubiquitous. As such, an increasing number of drivers have their smartphone in their vehicle while driving. These phones are equipped with powerful sensing, processing, and communication capabilities. This provides an opportunity to deploy smartphones in modern…

The requirement of critical tasks, where it was inconvenient, dangerous or life-threatening for a human operator to be present, gave rise the development of unmanned ground vehicles. With the beginning of an era of unmanned ground vehicles, we have to…

In this paper, we propose a new retinal verification method based on point set matching. First, image processing techniques are applied to segment the retinal image’s optic disc. The blood vessel map is generated inside the segmented optic disc region.…