{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:35:37Z","timestamp":1770845737707,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11342510","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"6753-6759","source":"Crossref","is-referenced-by-count":0,"title":["Advancing AI-Enhanced Financial Security: A Review of Facial, Voice, and Medical Biometrics for Identity Verification"],"prefix":"10.1109","author":[{"given":"Zhicong","family":"Chen","sequence":"first","affiliation":[{"name":"University of Technology Sydney,Transdisciplinary School"}]},{"given":"Alice Xiaodan","family":"Dong","sequence":"additional","affiliation":[{"name":"University of Technology Sydney,Transdisciplinary School"}]},{"given":"Gareth William","family":"Peters","sequence":"additional","affiliation":[{"name":"University of California,Department of Statistics and Applied Probability,Santa Barbara"}]},{"given":"Jennifer","family":"Chan","sequence":"additional","affiliation":[{"name":"The University of Sydney,Faculty of Science"}]},{"given":"Weidong","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Technology Sydney,Transdisciplinary School"}]},{"given":"Chun-Cheng","family":"Lin","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,Dept. of Industrial Engineering &#x0026; Management"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cyber security considerations for the financial services sector","volume-title":"KPMG, White Paper","author":"Name","year":"2025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref3","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","author":"Baevski","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.56726\/irjmets44476"},{"key":"ref5","first-page":"113114","article-title":"A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities","volume-title":"Expert Systems with Applications","volume":"143","author":"Dargan","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCECE53908.2022.9793028"},{"key":"ref7","first-page":"242","article-title":"A fingerprint and finger-vein based cancelable multi-biometric system","volume-title":"Pattern Recognition","volume":"78","author":"Yang","year":"2018"},{"key":"ref8","article-title":"Connected Papers - A visual tool to explore academic papers","year":"2025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12688\/openreseurope.14289.2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00807-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence47617.2020.9058332"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISRITI54043.2021.9702822"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISAI.2016.0106"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2004.1273467"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA54958.2022.9924028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IMCOM53663.2022.9721723"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IC2PCT60090.2024.10486760"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC3N60023.2023.10541716"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS48705.2020.9074184"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/APCIT62007.2024.10673442"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DASA51403.2020.9317214"},{"key":"ref22","first-page":"123","article-title":"Cnn-based anti-spoofing two-tier multi-factor authentication system","volume-title":"Pattern Recognition Letters","volume":"126","author":"Sajjad","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC56507.2023.10083680"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550079"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CICED.2018.8592103"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTSN61422.2024.10671004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC57133.2023.10067017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389714"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I56241.2022.10073242"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IC2IE50715.2020.9274654"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2015.7130436"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/URC62276.2024.10604479"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICOECA62351.2024.00124"},{"issue":"2","key":"ref34","first-page":"103907","article-title":"Biometric m-payment systems: A multi-analytical approach to determining use intention","volume-title":"Information Management","volume":"61","author":"Li\u00e9bana-Cabanillas","year":"2024"},{"key":"ref35","first-page":"1","article-title":"Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment","volume-title":"Decision Support Systems","volume":"106","author":"Ogbanufe","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2020.217.224"},{"key":"ref37","first-page":"71","article-title":"Overview of the combination of biometric matchers","volume-title":"Information Fusion","volume":"33","author":"Lumini","year":"2017"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11342510.pdf?arnumber=11342510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:51:33Z","timestamp":1770843093000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11342510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11342510","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}