Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








347 Hits in 2.1 sec

Preventing Cell Phone Intrusion and Theft using Biometrics

Donny Jacob Ohana, Liza Phillips, Lei Chen
2013 2013 IEEE Security and Privacy Workshops  
Some mobile manufacturers have implemented fingerprint scanners into their phones, such as the old Fujitsu F505i [7] and the current Motorola Atrix.  ...  With these types of security methods being used, there is much vulnerability. Another alternative is biometric authentication. Biometric security systems have been researched for many years.  ...  Since most research studies focused on optical scanners, or stationary capacitive scanners, the experiments were based on a swipe style capacitive fingerprint reader with anti-spoofing technology; this  ... 
doi:10.1109/spw.2013.19 dblp:conf/sp/OhanaPC13 fatcat:hrjho3zxvzbcpd5a5ct2o3hqzu

SDUMLA-HMT: A Multimodal Biometric Database [chapter]

Yilong Yin, Lili Liu, Xiwei Sun
2011 Lecture Notes in Computer Science  
The SDUMLA-HMT database consists of face images from 7 view angles, finger vein images of 6 fingers, gait videos from 6 view angles, iris images from an iris sensor, and fingerprint images acquired with  ...  In this paper, the acquisition and content of a new homologous multimodal biometric database are presented.  ...  It is worth noting that AES2501 is a swipe fingerprint scanner and the image size varies in different swiping processes, which has been shown in Fig. 7(a) .  ... 
doi:10.1007/978-3-642-25449-9_33 fatcat:gjgg2cckxzdvpoj4qcuihn5dnq

Advanced Authentication Method by Geometric Data Analysis Based on User Behavior and Biometrics for IoT Device with Touchscreen

Jiwoo Lee, Sohyeon Park, Young-Gon Kim, Eun-Kyu Lee, Junghee Jo
2021 Electronics  
In the case of fingerprint recognition, additional hardware such as a fingerprint scanner is required, which causes cost issues and could be vulnerable to fingerprint theft.  ...  So far, pattern, password and fingerprint authentication are the most used methods, but it is important to address various security vulnerabilities and limitations of these approaches.  ...  Conflicts of Interest: The authors declare no conflict of interests.  ... 
doi:10.3390/electronics10212583 doaj:7b2b07b9f03d4a1787b5ca4bff9d8318 fatcat:5nyr6tw5avczrnnzfhjjul3xou

Securing ATM with OTP and Biometric

Mohammed Hamid
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
One time password (OTP) is password that validates an authentic user for only one login to the respective system. If user is unauthorized, system will not allow further access.  ...  Factors that can be considered are time at when the user is accessing the machine, account number of the user, mobile number of the user, Location of the user, International Mobile station Equipment Identity  ...  One biometric (fingerprint scanner) should be attached on ATM machine so that it can scan current fingerprint at the time of authentication. 5.  ... 
doi:10.17762/ijritcc2321-8169.150460 fatcat:wjs7xvcpqvaezf4xg4zif7kyki

A Critical Study On Fingerprint Image Sensing And Acquisition Technology

Sreeramana Aithal, Krishna Prasad K
2017 Zenodo  
An offline acquisition technique gets input through inked affect of the fingertip on paper and digitized with the aid of the paper with an optical scanner or video digital camera.  ...  Automatic Fingerprint Recognition System (AFIS) mainly depends on the quality of the fingerprint captured during the enrollment process, even though a lot of techniques developed in literature for fingerprint  ...  The scanner can reject fake fingers crafted from silicone rubber and play-doh. It supports fingerprint recognition, verification, authentication, and matching programs.  ... 
doi:10.5281/zenodo.1130581 fatcat:6spenq42czdzvnbcrkxfdku4tu

Assorted Directions Of Authentication In Biometric Systems

Shambhu Prasad Sah*, Purushottam Das
2016 Zenodo  
Biometrics refers to a way of authentication in the world of computer security using various metrics linked to human characteristics. It is used for access control and recognition of individuals.  ...  This paper provides the working of Biometrics System, description of its various features and various biometrics methods used in digital world of computer.  ...  fingerprint scanner.  ... 
doi:10.5281/zenodo.51426 fatcat:pb3z64ascndpfkyosmvowpk35y

Evaluating authentication options for mobile health applications in younger and older adults

Kelly Grindrod, Hassan Khan, Urs Hengartner, Stephanie Ong, Alexander G. Logan, Daniel Vogel, Robert Gebotys, Jilan Yang, Muhammad Khurram Khan
2018 PLoS ONE  
pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT).  ...  All participants took longer to authenticate using the swipe-style fingerprint compared to other options.  ...  To authenticate on the study device's fingerprint scanner, users are required to slide a finger with a firm, smooth swipe across the home button.  ... 
doi:10.1371/journal.pone.0189048 pmid:29300736 pmcid:PMC5754080 fatcat:rylkyeuthnf55orofynd3fd3g4

Fingerprint Image Sensing Technology: A Review of State of the Art Methods

K. Krishna Prasad, Dr. P.S. Aithal
2022 Zenodo  
An offline acquisition technique gets input through inked affect of the fingertip on paper and digitized with the aid of the paper with an optical scanner or video digital camera.  ...  Automatic Fingerprint Recognition System (AFIS) mainly depends on the quality of the fingerprint captured during the enrollment process, even though a lot of techniques developed in literature for fingerprint  ...  The scanner can reject fake fingers crafted from silicone rubber and play-doh. It supports fingerprint recognition, verification, authentication, and matching programs.  ... 
doi:10.5281/zenodo.7384740 fatcat:toxzg6c7tre6lllxw5wavaz4l4

Securing Online Transaction using Fingerprint Authentication with Embedded Cameras

Miss. Gayatri Kulkarni, Mrs. Deepali Raut-Dhole
2016 IOSR Journal of Electronics and Communication Engineering  
No need of extra module for fingerprint recognition.  ...  So to increase the security of online transactions we use Fingerprint recognition with credit card/debit card transaction.  ...  The thermal sensor is developed by using pyro-electric material, which measures temperature changes due to the ridge-valley structure as the finger is swiped over the scanner and produces an image.  ... 
doi:10.9790/2834-1104011316 fatcat:7zvlcjrowbgrbh3ycztpvim6vu

Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques

Priya Tawde, Dr. G. Prasanna Lakshmi
2017 IOSR Journal of Computer Engineering  
device.The current authentication system uses fingerprint authentication or PIN based authentication method.Biometric features are unique for every individual and hence can be widely used in fusion for  ...  Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of micro-ATM  ...  Proposed biometric authentication system at POS swipe machine.  ... 
doi:10.9790/0661-1904017477 fatcat:ojt3wsamffbmrbv7orikrw63tq

LivDet 2013 Fingerprint Liveness Detection Competition 2013

Luca Ghiani, David Yambay, Valerio Mura, Simona Tocco, Gian Luca Marcialis, Fabio Roli, Stephanie Schuckcrs
2013 2013 International Conference on Biometrics (ICB)  
Submissions for the third edition were much more than in the previous editions of LivDet demonstrating a growing interest in the area.  ...  The Fingerprint Liveness Detection Competition (LivDet) goal is to compare both software-based (Part 1) and hardware-based (Part 2) fingerprint liveness detection methodologies and is open to all academic  ...  Unfortunately it has been shown that fingerprint scanners are vulnerable to spoof attacks, i.e. it is possible to deceive a fingerprint system with an artificial replica of a fingertip.  ... 
doi:10.1109/icb.2013.6613027 dblp:conf/icb/GhianiYMTMRS13 fatcat:bsa4dd7ovbepfcvxafnqhtik24

Encrypted Biometric Authenticated ATM System – An Overview [chapter]

Mannat Doultani, Riddhi Khole, Nidhi Rohra, Muheet Rashid, Nachiket Joag
2021 New Frontiers in Communication and Intelligent Systems  
For various purposes, we use various methods of biometric identification. Fingerprint and Iris scanning are some of the challenging and prominent methods which provide challenging patterns.  ...  Taking the challenges to security into consideration, we choose to take our system ahead with the help of Fingerprint and Iris scanning.  ...  At the bank, the encrypted record of biometric data of customers is stored in the system using a fingerprint scanning device and iris infrared scanner.  ... 
doi:10.52458/978-81-95502-00-4-62 fatcat:5v3ohnjkfbapldysmpbrhdqmxa

Detection of PARD Attack using Key based Biometric Authentication System and Fingerprint Impression

Lovelesh Khard, Uday Chourasia, Raju Baraskar
2017 International Journal of Computer Applications  
As unique finger impression may likewise contain clamor; so picture de-noising systems are additionally concentrated Cross edge recurrence examination of finger impression pictures is performed by method  ...  On the basis of this the automatic fingerprint recognition system for authentication and identification ie Basically there are two types of fingerprint Recognition System AFAS (Automatic Fingerprint Authentication  ...  Fingerprint based biometrics A biometric system is embedded in the authentication process of an identity management system.  ... 
doi:10.5120/ijca2017912976 fatcat:aunianwrivde5glnvozlidrzqe

A Secure and Reliable Method to Protect USB Data

Alycia Sebastian
2019 APTIKOM Journal on Computer Science and Information Technologies  
Nowadays USB manufacturers offer password protection and fingerprint authentication to secure the USB data.  ...  In this paper, USB is devised as a highly secured portable boot medium with fingerprint authentication to secure the data.  ...  Conclusion The USB devised as bootable medium with integrated fingerprint authentication provides a highly portable and secure USB system which can guarantee confidentiality for the information stored  ... 
doi:10.11591/aptikom.j.csit.34 fatcat:2mtkwc6tznb5vez4gkqr4fkrq4

Centralized Authentication Smart Locking System using RFID, Fingerprint, Password and GSM

M Sai Divya, M Nagabhushana Rao
2018 International Journal of Engineering & Technology  
The primary aim of implemented project is design of the RFID based high security building locking system, fingerprint, GSM technology, and password.  ...  The implemented building locking system works based on the RFID, Password, GSM and Fingerprint.  ...  Introduction Verification of the Fingerprint is one of the real time system security systems. The Fingerprint which can be detected can be sent to the microcontroller for authentication purpose.  ... 
doi:10.14419/ijet.v7i3.12.16170 fatcat:ix4fatdq7za4fcodvkiu2kmdne
« Previous Showing results 1 — 15 out of 347 results