References
- Atanasiu, A., & Mihailescu, M. I. (2010, June). Biometric passports (ePassports). In 2010 8th International Conference on Communications (pp. 443–446). IEEE, Bucharest, Romania.
- Avoine, G., Beaujeant, A., Hernandez-Castro, J., Demay, L., & Teuwen, P. (2016). A survey of security and privacy issues in ePassport protocols. ACM Computing Surveys (CSUR), 48(3), 47. https://doi.org/https://doi.org/10.1145/2825026
- Bay, H., Ess, A., Tuytelaars, T., & Van Gool, L. (2008). Speeded-up robust features (SURF). Computer Vision and Image Understanding, 110(3), 346–359. https://doi.org/https://doi.org/10.1016/j.cviu.2007.09.014
- Bhattacharyya, A. (1943). On a measure of divergence between two statistical populations defined by their probability distributions. Bulletin of the Calcutta Mathematical Society, 35, 99–109. https://scholar.google.com/scholar?as_q=On+a+measure+of+divergence+between+two+statistical+populations+defined+by+their+probability+distributions&as_occt=title&hl=en&as_sdt=0%2C31
- Bolle, R. M., Connell, J. H., Pankanti, S., Ratha, N. K., & Senior, A. W. (2013). Guide to biometrics. Springer Science & Business Media.
- Bradley, C. J. (2007). The algebra of geometry: Cartesian, areal and projective co-ordinates. Bath High perception, p. 492.
- Braganza, D., & Tulasi, B. (2017). RFID security issues in IoT: A comparative study. Oriental Journal of Computer Science & Technology, 10(1), 127–134. https://doi.org/https://doi.org/10.13005/ojcst/10.01.17
- Braun, T., Fung, B. C., Iqbal, F., & Shah, B. (2018). Security and privacy challenges in smart cities. Sustainable Cities and Society, 39, 499–507. https://doi.org/https://doi.org/10.1016/j.scs.2018.02.039
- Canny, J. (1986, November). A computational approach to edge detection. In IEEE Transactions on pattern analysis and machine intelligence. PAMI-8(6) (pp. 679–697).
- Cootes, T. F., Edwards, G. J., & Taylor, C. J. (1998, June). Active appearance models. In European conference on computer vision (pp. 484–498). Springer, Berlin, Heidelberg.
- Ebrahim, M., & Chong, C. W. (2013, November). Secure force: A low-complexity cryptographic algorithm for wireless sensor network (WSN). In 2013 IEEE International Conference on Control System, Computing and Engineering (pp. 557–562). Mindeb, Malaysia, IEEE.
- El Beqqal, M., & Azizi, M. (2017, April). Classification of major security attacks against RFID systems. In 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS) (pp. 1–6). Fez, Morocco, IEEE.
- Fukuchi, K. (2010, October 18). Libqrencode, a C library for encoding data in a QR code symbol. http://megaui.net/fukuchi/works/arencode
- Hammad, M., & Wang, K. (2019). Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Computers & Security, 81, 107–122. https://doi.org/https://doi.org/10.1016/j.cose.2018.11.003
- Hammad, M., Zhang, S., & Wang, K. (2019). A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication. Future Generation Computer Systems, 101, 180–196. https://doi.org/https://doi.org/10.1016/j.future.2019.06.008
- Horne, R., & Mauw, S. (2020). Discovering ePassport vulnerabilities using bisimilarity (arXiv preprint arXiv:2002.07309), Cornell University, arxiv.
- Huizinga, T., Verheul, E., Poll, E., & de Ruiter, J. (2018). Using NFC enabled android devices to attack RFID systems. Radboud University.
- ICAO. (2003). Biometrics deployment of machine readable travel documents, version 1.9, ICAO TAG MRTD/NTWG (ICAO MRTD), International Civil Aviation Organization, Montreal, Quebec, Canada.
- Ihsanto, E., Ramli, K., Sudiana, D., & Gunawan, T. S. (2020). Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks. Applied Sciences, 10(9), 3304. https://doi.org/https://doi.org/10.3390/app10093304
- Johnson, B. (2006). Hackers crack new biometric passports. (The Guardian).
- Juels, A., Molnar, D., & Wagner, D. (2005, September). Security and privacy issues in E-passports. In First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) (pp. 74-88). IEEE. Athens, Greece. https://doi.org/https://doi.org/10.1109/SECURECOMM.2005.59
- Jung, K., & Lee, S. (2015). A systematic review of RFID applications and diffusion: Key areas and public policy issues. Journal of Open Innovation: Technology, Market, and Complexity, 1(1), 9. https://www.mdpi.com/2199-8531/1/1/9
- Kakkad, V., Patel, M., & Shah, M. (2019). Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2(4), 233–248. https://doi.org/https://doi.org/10.1007/s41939-019-00049-y
- Kc, G. S., & Karger, P. A. (2005). Security and privacy issues in machine readable travel documents (MRTDs). Cryptology ePrint Archive, Report 2005. http://eprint.iacr.org/
- Khan, S., Ibrahim, M. S., Khan, K. A., & Ebrahim, M. (2015). Security analysis of secure force algorithm for wireless sensor networks (arXiv preprint arXiv:1509.00981).
- Knight, W. (2006). Hackers clone radio-chip passports. New Scientist.
- Kundra, S., Dureja, A., & Bhatnagar, R. (2014, September). The study of recent technologies used in E-passport system. In 2014 IEEE global humanitarian technology Conference-South Asia Satellite (GHTC-SAS) (pp. 141–146). IEEE, Trivandrum, India.
- Laurie, A. (2007). Rfidiot. http://rfidiot.org/
- The Ministry of the Interior and Kingdom Relations. (2005). 2b or not to 2b, The Netherlands. http://www.minbzk.nl/contents/pages/43760/evaluatierapport1.pdf/
- Mohite, S., Kulkarni, G., & Sutar, R. (2013). RFID security issues. International Journal of Engineering Research & Technology (IJERT), 2(9), 746–748. https://www.researchgate.net/profile/Gurudatt_Kulkarni/publication/258251156_RFID_Security_Issues/links/0deec5279d1df4ee5b000000.pdf
- Monar, D., Juels, A., & Wagner, D. (2005). Security and privacy issues in e-passports (Cryptology ePrint Archive, Report 2005/095).
- Owen, S. (2014). zxing-Multi-format 1D/2D barcode image processing library with clients for Android, Java. Github.
- Pal, K. (2019). Radio frequency identification systems security challenges in supply chain management. In Smart devices, applications, and protocols for the IoT (pp. 220–242). IGI Global. https://www.igi-global.com/chapter/radio-frequency-identification-systems-security-challenges-in-supply-chain-management/225899
- Querini, M., & Italiano, G. F. (2014). Reliability and data density in high capacity color barcodes. Computer Science and Information Systems, 11(4), 1595–1615. https://doi.org/https://doi.org/10.2298/CSIS131218054Q
- Rajaraman, V. (2017). Radio frequency identification. Resonance, 22(6), 549–575. https://doi.org/https://doi.org/10.1007/s12045-017-0498-6
- Reid, D. (2006). E-passports at risk from cloning. BBC Click, 17, 12. http://www2.hawaii.edu/~strev/ICS614/materials/BBC%20-%20security%20-%20ePassports%20at%20risk%20from%20cloning%20%202006-12-17.pdf
- Ryan, D. (2018, January). Watch how easy it is for your RFID card to be cloned by hackers. Identicard. https://insights.identicard.com/blog/watch-how-easy-it-is-for-your-rfid-card-to-be-cloned-by-hackers-ideo
- Schouten, B., & Jacobs, B. (2009). Biometrics and their use in e-passports. Image and Vision Computing, 27(3), 305–312. https://doi.org/https://doi.org/10.1016/j.imavis.2008.05.008
- Simonyan, K., Parkhi, O. M., Vedaldi, A., & Zisserman, A. (2013, September). Fisher vector faces in the wild. BMVC, 2(3), 4. https://www.robots.ox.ac.uk/~vgg/publications/2013/Simonyan13/extras/simonyan13_ext.pdf
- Smiley, S. (2016, June). 7 types of security attacks on RFID systems. RFID insider. https://blog.atlasrfidstore.com/7-types-security-attacks-rfid-systems#disqus_thread
- Statham, P., Rejman-Greene, M., Schouten, B. A. M., Savastano, M., & Mansfield, T. (2003). Roadmap to successful deployments of biometrics from the user and system integrator (Technical report, Centre for Mathematics and Computer Science, CWI Report PNA- E0303, 1386-3711), Stichting Centrum voor Wiskunde en Informatica.
- Stegmann, M. B. (2003, November). The AAM-API: An open source active appearance model implementation. In International Conference on Medical Image Computing and Computer-Assisted Intervention (pp. 951–952). Springer, Berlin, Heidelberg.
- Ullah, A. (2018). IoT: Applications of RFID and Issues. International Journal of Internet of Things and Web Services, 3,1–5. https://www.iaras.org/iaras/filedownloads/ijitws/2018/022-0001(2018).pdf
- Vidit, J., & Amitabha, M. (2002). The Indian face database. http://www.face-rec.org/databases/
- Viola, P., & Jones, M. (2001). Robust real-time object detection. International Journal of Computer Vision, 57(2), 137–154. https://doi.org/https://doi.org/10.1023/B:VISI.0000013087.49260.fb
- White, D., Kemp, R. I., Jenkins, R., Matheson, M., & Burton, A. M. (2014). Passport officers’ errors in face matching. PLoS One, 9(8), e103510. https://doi.org/https://doi.org/10.1371/journal.pone.0103510
- Wing. (2015, February). Top 10 RFID security concerns and threats. https://securitywing.com/top-10-rfid-security-concerns-threats/
- Yang, Y., Guo, B., Wang, Z., Li, M., Yu, Z., & Zhou, X. (2019). BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Networks, 84, 9–18. https://doi.org/https://doi.org/10.1016/j.adhoc.2018.09.015
- Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scaledistributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528. https://doi.org/https://doi.org/10.1145/1218556.1218559