ARCHIVES

Original Article

Multi Factor Biometric Authentication System Using Vision Transformer and Deep Face for Scam Resistant Intelligent Online Banking Transactions

Dr.Gnana Saravanan Athimoolam1 M. Divya2 M. Jeevitha3 S.Indhu Priya4
1 Professor & Dean IQAC, Er. Perumal Manimekalai College of Engineering, Hosur, Tamil Nadu, India. 2 3 4 Department of Information Technology, Er. Perumal Manimekalai College of Engineering, Hosur, Tamil Nadu, India.

Published Online: January-April 2026

Pages: 558-562

References

1. R. Wazirali, F. F. Ashrif, and R. Ahmad, “Selective homomorphic encryption with LLE enhances privacy and scalability in doorbell face recognition,” IEEE Access, vol. 14, pp. 27650–27665, 2026.
2. M. Turk and A. Pentland, “Eigenfaces for recognition,” J. Cogn. Neurosci., vol. 3, no. 1, pp. 71– 86, 1991.
3. P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 711–720, 1997.
4. S. T. Roweis and L. K. Saul, “Nonlinear dimensionality reduction by locally linear embedding,” Science, vol. 290, no. 5500, pp. 2323–2326, 2000.
5. X. He and P. Niyogi, “Laplacian eigenmaps for dimensionality reduction and data representation,” Neural Comput., vol. 15, no. 6, pp. 1373–1396, 2003.
6. K. Chen et al., “Secure outsourcing of large-scale linear systems,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 626–636, 2014.
7. Y. Zhou and Z. Li, “Secure eigenvalue decomposition outsourcing,” IEEE Access, vol. 6, pp. 12345–12356, 2018.
8. P. Pramkaew and S. Ngamsuriyaroj, “Lightweight SVD outsourcing for big data,” IEEE Access, vol. 7, pp. 56789–56800, 2019.
9. Y. Zhang et al., “Privacy-preserving face recognition based on PCA,” IEEE Access, vol. 5, pp. 1234–1245, 2017.
10. S. Rath et al., “Security flaws in PCA-based outsourcing schemes,” IEEE Access, vol. 8, pp. 45678– 45690, 2020.
11. J. Goodfellow et al., “Generative adversarial nets,” in Proc. NeurIPS, pp. 2672–2680, 2014.
12. I. Goodfellow et al., “Deep learning,” MIT Press, 2016.
13. F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embedding for face recognition,” in Proc. CVPR, pp. 815–823, 2015.
14. O. M. Parkhi, A. Vedaldi, and A. Zisserman, “Deep face recognition,” in Proc. BMVC, pp. 1–12, 2015.
15. J. Deng et al., “ArcFace: Additive angular margin loss for deep face recognition,” in Proc. CVPR, pp. 4690–4699, 2019.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260501063

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.