References
[1]. Abozaid, A., Haggag, A., Kasban, H., & Eltokhy, M. (2019). Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion. Multimedia Tools and Applications, 78(12), 16345-16361. https://doi.org/10.1007/s11042- 018-7012-3
[2]. Adjei, J. K. (2015). Explaining the Role of Trust in Cloud Computing Services. Info, 17(1), 54-67. https://doi. org/10.1108/info-09-2014-0042
[3]. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. D., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A View of Cloud Computing, Communications of the ACM. https://doi.org/10.1145/ 1721654.1721672
[4]. Banyal, R. K., Jain, P., & Jain, V. K. (2013, September). Multi-factor authentication framework for cloud computing. In 2013 5th International Conference on Computational Intelligence, Modelling and Simulation (pp. 105-110). IEEE. https://doi.org/10.1109/CIMSim. 2013.25
[5]. Bertolini, D., Oliveira, L. S., Justino, E., & Sabourin, R. (2010). Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognition, 43(1), 387-396. https://doi.org/ 10.1016/j.patcog.2009.05.009
[6]. Bommagani, A. S., Valenti, M. C., & Ross, A. (2014, October). A framework for secure cloud-empowered mobile biometrics. In 2014 IEEE Military Communications Conference (pp. 255-261). IEEE. https://doi.org/ 10.1109/MILCOM.2014.47
[7]. Carroll, M., Van Der Merwe, A., & Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. In 2011 Information Security for South Africa (pp. 1-9). IEEE. https://doi.org/10.1109/ISSA.2011.6027519
[8]. Catteddu, D. (2009, December). Cloud Computing: Benefits, risks and recommendations for information security. In Iberic Web Application Security Conference (pp. 17-17). Springer. https://doi.org/ 10.1007/978-3-642- 16120-9_9
[9]. Choudhary, N. Y., Patil, M. R., Bhadade, U., & Chaudhari, B. M. (2013). Signature recognition and verification system using back propagation neural network. International Jorunal of IT, Engineering and Applied Sciences Research (IJIEASR), 2(1), 1-8. Retrieved from https://pdfs.semanticscholar.org/b8b3/4e31 deac1bab5ea2291a186dedcbb9500179.pdf
[10]. Choudhury, A. J., Kumar, P., Sain, M., Lim, H., & Jae- Lee, H. (2011, December). A strong user authentication framework for cloud computing. In 2011 IEEE Asia-Pacific Services Computing Conference (pp. 110-115). IEEE. https://doi.org/10.1109/APSCC.2011.14
[11]. Cremers, C. (n.d). The scyther tool generic installation instructions, CISPA − Helmholtz Center for Information Security, Saarbrücken, Germany. Retrieved from https://people.cispa.io/cas.cremers/scyther/installgeneric. html
[12]. Dey, S., Sampalli, S., & Ye, Q. (2016). MDA: Message Digest-based Authentication for mobile cloud computing. Journal of Cloud Computing, 5(1), 18. Retrieved from https://link.springer.com/article/ 10.1186/s13677-016-0068-6
[13]. Eskander, G. S., Sabourin, R., & Granger, E. (2013). Hybrid writer-independent–writer-dependent offline signature verification system. IET Biometrics, 2(4), 169- 181. https://doi.org/10.1049/iet-bmt.2013.0024
[14]. Goud, N.(n.d). Cyber Attack on Cloud Computing Company makes France News Websites go Dark. Retrieved from https://www.cybersecurity-insiders.com/ cyber-attack-on-cloud-computing-company-makesfrance- news-websites-go-dark/
[15]. Hafemann, L. G., Sabourin, R., & Oliveira, L. S. (2017). Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition, 70, 163-176. https://doi.org/ 10.1016/j.patcog.2017.05.012
[16]. Hamidi, N. A., Rahimi, G. M., Nafarieh, A., Hamidi, A., & Robertson, B. (2013). Personalized security approaches in e-banking employing flask architecture over cloud environment. Procedia Computer Science, 21, 18-24. https://doi.org/10.1016/j.procs.2013.09.005
[17]. Hossain, M. S., & Muhammad, G. (2015). Cloudassisted speech and face recognition framework for health monitoring. Mobile Networks and Applications, 20(3), 391- 399. https://doi.org/10.1007/s11036-015-0586-3
[18]. Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., Andreetto, M., & Adam, H. (2017). Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv preprint arXiv:1704. 04861. Retrieved from https://arxiv.org/pdf/1704.04 861.pdf
[19]. Hu, J., & Chen, Y. (2013, August). Offline signature verification using real adaboost classifier combination of pseudo-dynamic features. In 2013 12th International Conference on Document Analysis and Recognition (pp. 1345-1349). IEEE. https://doi.org/10.1109/ICDAR. 2013.272
[20]. Huang, C. Y., Tzeng, W. C., Tzeng, G. H., & Yuan, M. C. (2011). Derivations of information technology strategies for enabling the cloud based banking service by a hybrid MADM framework. In Intelligent Decision Technologies (pp. 123-134). Springer. Retrieved from https://link.springer.com/chapter/ 10.1007/978-3-642- 22194-1_13
[21]. Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing, 72(10), 3826-3849. https://doi.org/10.1007/s11227-015- 1610-xv
[22]. Kumar, C. R., & Bindu, A. (2006, November). An efficient skin illumination compensation model for efficient face detection. In IECON 2006-32nd Annual Conference on IEEE Industrial Electronics (pp. 3444- 3449). IEEE. https://doi.org/10.1109/IECON.2006.348133
[23]. Kuo, C. C. J. (2017). The CNN as a guided multilayer recos transform [lecture notes]. IEEE Signal Processing Magazine, 34(3), 81-89. https://doi.org/10.1109/ MSP.2017.2671158
[24]. Lee, J. K., Ryu, S. R., & Yoo, K. Y. (2002). Fingerprintbased remote user authentication scheme using smart cards. Electronics Letters, 38(12), 554-555. https://doi. org/10.1049/el:20020380
[25]. Lee, S., Ong, I., Lim, H. T., & Lee, H. J. (2010). Two factor authentication for cloud computing. Journal of Information and Communication Convergence Engineering, 8(4), 427-432. https://doi.org/10.6109/jicce. 2010.8.4.427
[26]. Liu, W., Uluagac, A. S., & Beyah, R. (2014, April). MACA: A privacy-preser ving multi-factor cloud authentication system utilizing big data. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 518-523). IEEE. https://doi.org/ 10.1109/INFCOMW.2014.6849285
[27]. Mehra, R., & Gangwar, D. R. (2014). Enhanced offline signature recognition using neuro-fuzzy and SURF features techniques. International Journal of Computer Science and Information Technologies, 5(5). Retrieved from https://pdfs.semanticscholar.org/09d6/28a889c 944086ec52291348ddae2a6baa21d.pdf
[28]. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. https://doi.org/10.6028/NIST.SP.800- 145
[29]. Montserrat, D. M., Lin, Q., Allebach, J., & Delp, E. J. (2017). Training object detection and recognition CNN models using data augmentation. Electronic Imaging, 2017(10), 27-36. https://doi.org/10.2352/ISSN.2470- 1173.2017.10.IMAWM-163
[30]. Nagaraju, S., & Parthiban, L. (2015). Trusted framework for online banking in public cloud using multifactor authentication and privacy protection gateway. Journal of Cloud Computing, 4(1), 22. https://doi.org/ 10.1186/s13677-015-0046-4
[31]. Pang, S., Kim, D., & Bang, S. Y. (2003). Membership authentication in the dynamic group by face classification using SVM ensemble. Pattern Recognition Letters, 24(1-3), 215-225. https://doi.org/10.1016/S0167- 8655(02)00213-1
[32]. Philip, J., & Bharadi, V. A. (2016). Signature Verification SAAS implementation on Microsoft Azure cloud. Procedia Computer Science, 79, 410-418. https://doi.org/10.1016/j.procs.2016.03.053
[33]. Prasanalakshmi, B., & Kannammal, A. (2012). Secure credential federation for hybrid cloud environment with SAML enabled multifactor authentication using biometrics. International Journal of Computer Applications, 53(18). Retrieved from https://pdfs.semanticscholar.org/cf2f/440296f9e213bf5 aa81800778819bfbb132e.pdf
[34]. Rani, S., & Gangal, A. (2012). Security issues of banking adopting the application of cloud computing. International Journal of Information Technology, 5(2), 243-246.
[35]. Rivard, D., Granger, E., & Sabourin, R. (2013). Multifeature extraction and selection in writer-independent offline signature verification. International Journal on Document Analysis and Recognition (IJDAR), 16(1), 83- 103. https://doi.org/10.1007/s10032-011-0180-6
[36]. Strom, N. (2015). Scalable distributed DNN training using commodity GPU cloud computing. In 16th Annual Conference of the International Speech Communication Association. Retrieved from https://www. isca-speech.org/archive/interspeech_2015/i15_14 88.html
[37]. Sun, Y., Chen, Y., Wang, X., & Tang, X. (2014a). Deep learning face representation by joint identificationverification. In Advances in Neural Information Processing Systems (pp. 1988-1996). Retrieved from http://www.ee. cuhk.edu.hk/~xgwang/papers/sunCWTnips14.pdf
[38]. Sun, Y., Wang, X., & Tang, X. (2014b). Deep learning face representation from predicting 10,000 classes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1891-1898). Retrieved from http://mmlab.ie.cuhk.edu.hk/pdf/YiSun_CVPR14.pd
[39]. Suresh, M. C. (2010). Cloud computing: Strategic considerations for banking and financial services institutions. TCS White Papers, 1-24.
[40]. Trevathan, J., & McCabe, A. (2005). Remote handwritten signature authentication. In Proceedings of nd the 2 International Conference on e-Business and Telecommunication Networks (ICETE), United Kingdom, Volume 1, 335-339. https://doi.org/10.5220/00014192 03350339
[41]. Yan, G. (2017, July). Applicatio of cloud computing in banking: Advantages and challenges. In 2017 2nd International Conference on Politics, Economics and Law (ICPEL 2017). Atlantis Press. https://doi.org/10.2991/icpel- 17.2017.8
[42]. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future. 2010.12.006