Abstract: The swift progression of technology has resulted in a surge in digital transactions, necessitating robust authentication mechanisms to avert fraudulent activities. Because genuine and ...