A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Preventing Cell Phone Intrusion and Theft using Biometrics
2013
2013 IEEE Security and Privacy Workshops
Some mobile manufacturers have implemented fingerprint scanners into their phones, such as the old Fujitsu F505i [7] and the current Motorola Atrix. ...
With these types of security methods being used, there is much vulnerability. Another alternative is biometric authentication. Biometric security systems have been researched for many years. ...
Since most research studies focused on optical scanners, or stationary capacitive scanners, the experiments were based on a swipe style capacitive fingerprint reader with anti-spoofing technology; this ...
doi:10.1109/spw.2013.19
dblp:conf/sp/OhanaPC13
fatcat:hrjho3zxvzbcpd5a5ct2o3hqzu
SDUMLA-HMT: A Multimodal Biometric Database
[chapter]
2011
Lecture Notes in Computer Science
The SDUMLA-HMT database consists of face images from 7 view angles, finger vein images of 6 fingers, gait videos from 6 view angles, iris images from an iris sensor, and fingerprint images acquired with ...
In this paper, the acquisition and content of a new homologous multimodal biometric database are presented. ...
It is worth noting that AES2501 is a swipe fingerprint scanner and the image size varies in different swiping processes, which has been shown in Fig. 7(a) . ...
doi:10.1007/978-3-642-25449-9_33
fatcat:gjgg2cckxzdvpoj4qcuihn5dnq
Advanced Authentication Method by Geometric Data Analysis Based on User Behavior and Biometrics for IoT Device with Touchscreen
2021
Electronics
In the case of fingerprint recognition, additional hardware such as a fingerprint scanner is required, which causes cost issues and could be vulnerable to fingerprint theft. ...
So far, pattern, password and fingerprint authentication are the most used methods, but it is important to address various security vulnerabilities and limitations of these approaches. ...
Conflicts of Interest: The authors declare no conflict of interests. ...
doi:10.3390/electronics10212583
doaj:7b2b07b9f03d4a1787b5ca4bff9d8318
fatcat:5nyr6tw5avczrnnzfhjjul3xou
Securing ATM with OTP and Biometric
2015
International Journal on Recent and Innovation Trends in Computing and Communication
One time password (OTP) is password that validates an authentic user for only one login to the respective system. If user is unauthorized, system will not allow further access. ...
Factors that can be considered are time at when the user is accessing the machine, account number of the user, mobile number of the user, Location of the user, International Mobile station Equipment Identity ...
One biometric (fingerprint scanner) should be attached on ATM machine so that it can scan current fingerprint at the time of authentication. 5. ...
doi:10.17762/ijritcc2321-8169.150460
fatcat:wjs7xvcpqvaezf4xg4zif7kyki
A Critical Study On Fingerprint Image Sensing And Acquisition Technology
2017
Zenodo
An offline acquisition technique gets input through inked affect of the fingertip on paper and digitized with the aid of the paper with an optical scanner or video digital camera. ...
Automatic Fingerprint Recognition System (AFIS) mainly depends on the quality of the fingerprint captured during the enrollment process, even though a lot of techniques developed in literature for fingerprint ...
The scanner can reject fake fingers crafted from silicone rubber and play-doh. It supports fingerprint recognition, verification, authentication, and matching programs. ...
doi:10.5281/zenodo.1130581
fatcat:6spenq42czdzvnbcrkxfdku4tu
Assorted Directions Of Authentication In Biometric Systems
2016
Zenodo
Biometrics refers to a way of authentication in the world of computer security using various metrics linked to human characteristics. It is used for access control and recognition of individuals. ...
This paper provides the working of Biometrics System, description of its various features and various biometrics methods used in digital world of computer. ...
fingerprint scanner. ...
doi:10.5281/zenodo.51426
fatcat:pb3z64ascndpfkyosmvowpk35y
Evaluating authentication options for mobile health applications in younger and older adults
2018
PLoS ONE
pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). ...
All participants took longer to authenticate using the swipe-style fingerprint compared to other options. ...
To authenticate on the study device's fingerprint scanner, users are required to slide a finger with a firm, smooth swipe across the home button. ...
doi:10.1371/journal.pone.0189048
pmid:29300736
pmcid:PMC5754080
fatcat:rylkyeuthnf55orofynd3fd3g4
Fingerprint Image Sensing Technology: A Review of State of the Art Methods
2022
Zenodo
An offline acquisition technique gets input through inked affect of the fingertip on paper and digitized with the aid of the paper with an optical scanner or video digital camera. ...
Automatic Fingerprint Recognition System (AFIS) mainly depends on the quality of the fingerprint captured during the enrollment process, even though a lot of techniques developed in literature for fingerprint ...
The scanner can reject fake fingers crafted from silicone rubber and play-doh. It supports fingerprint recognition, verification, authentication, and matching programs. ...
doi:10.5281/zenodo.7384740
fatcat:toxzg6c7tre6lllxw5wavaz4l4
Securing Online Transaction using Fingerprint Authentication with Embedded Cameras
2016
IOSR Journal of Electronics and Communication Engineering
No need of extra module for fingerprint recognition. ...
So to increase the security of online transactions we use Fingerprint recognition with credit card/debit card transaction. ...
The thermal sensor is developed by using pyro-electric material, which measures temperature changes due to the ridge-valley structure as the finger is swiped over the scanner and produces an image. ...
doi:10.9790/2834-1104011316
fatcat:7zvlcjrowbgrbh3ycztpvim6vu
Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques
2017
IOSR Journal of Computer Engineering
device.The current authentication system uses fingerprint authentication or PIN based authentication method.Biometric features are unique for every individual and hence can be widely used in fusion for ...
Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of micro-ATM ...
Proposed biometric authentication system at POS swipe machine. ...
doi:10.9790/0661-1904017477
fatcat:ojt3wsamffbmrbv7orikrw63tq
LivDet 2013 Fingerprint Liveness Detection Competition 2013
2013
2013 International Conference on Biometrics (ICB)
Submissions for the third edition were much more than in the previous editions of LivDet demonstrating a growing interest in the area. ...
The Fingerprint Liveness Detection Competition (LivDet) goal is to compare both software-based (Part 1) and hardware-based (Part 2) fingerprint liveness detection methodologies and is open to all academic ...
Unfortunately it has been shown that fingerprint scanners are vulnerable to spoof attacks, i.e. it is possible to deceive a fingerprint system with an artificial replica of a fingertip. ...
doi:10.1109/icb.2013.6613027
dblp:conf/icb/GhianiYMTMRS13
fatcat:bsa4dd7ovbepfcvxafnqhtik24
Encrypted Biometric Authenticated ATM System – An Overview
[chapter]
2021
New Frontiers in Communication and Intelligent Systems
For various purposes, we use various methods of biometric identification. Fingerprint and Iris scanning are some of the challenging and prominent methods which provide challenging patterns. ...
Taking the challenges to security into consideration, we choose to take our system ahead with the help of Fingerprint and Iris scanning. ...
At the bank, the encrypted record of biometric data of customers is stored in the system using a fingerprint scanning device and iris infrared scanner. ...
doi:10.52458/978-81-95502-00-4-62
fatcat:5v3ohnjkfbapldysmpbrhdqmxa
Detection of PARD Attack using Key based Biometric Authentication System and Fingerprint Impression
2017
International Journal of Computer Applications
As unique finger impression may likewise contain clamor; so picture de-noising systems are additionally concentrated Cross edge recurrence examination of finger impression pictures is performed by method ...
On the basis of this the automatic fingerprint recognition system for authentication and identification ie Basically there are two types of fingerprint Recognition System AFAS (Automatic Fingerprint Authentication ...
Fingerprint based biometrics A biometric system is embedded in the authentication process of an identity management system. ...
doi:10.5120/ijca2017912976
fatcat:aunianwrivde5glnvozlidrzqe
A Secure and Reliable Method to Protect USB Data
2019
APTIKOM Journal on Computer Science and Information Technologies
Nowadays USB manufacturers offer password protection and fingerprint authentication to secure the USB data. ...
In this paper, USB is devised as a highly secured portable boot medium with fingerprint authentication to secure the data. ...
Conclusion The USB devised as bootable medium with integrated fingerprint authentication provides a highly portable and secure USB system which can guarantee confidentiality for the information stored ...
doi:10.11591/aptikom.j.csit.34
fatcat:2mtkwc6tznb5vez4gkqr4fkrq4
Centralized Authentication Smart Locking System using RFID, Fingerprint, Password and GSM
2018
International Journal of Engineering & Technology
The primary aim of implemented project is design of the RFID based high security building locking system, fingerprint, GSM technology, and password. ...
The implemented building locking system works based on the RFID, Password, GSM and Fingerprint. ...
Introduction Verification of the Fingerprint is one of the real time system security systems. The Fingerprint which can be detected can be sent to the microcontroller for authentication purpose. ...
doi:10.14419/ijet.v7i3.12.16170
fatcat:ix4fatdq7za4fcodvkiu2kmdne
« Previous
Showing results 1 — 15 out of 347 results