1,951 Hits in 10.3 sec

Signature-Based Biometric Authentication [chapter]

Srikanta Pal, Umapada Pal, Michael Blumenstein
2014 Studies in Computational Intelligence  
Biometrics evaluate a person's unique physical or behavioural traits to authenticate their identity.  ...  As biometric identifiers are unique to persons, they are more reliable in verifying identity than token-based and knowledge-based methods.  ...  A biometric scheme can either verify or identify the authentication of an individual. In verification mode, it authenticates the person's identity on the basis of his/her claimed identity.  ... 
doi:10.1007/978-3-319-05885-6_13 fatcat:g5qrfp47cng3tlgeaa62ddcuqm

A lightweight biometric signature scheme for user authentication over networks

Tansu Alpcan, Sinan Kesici, Daniel Bicher, M. Kivanç Mihçak, Christian Bauckhage, S. Ahmet Çamtepe
2008 Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08  
We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures.  ...  The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements.  ...  CONCLUSION We have investigated a lightweight biometric solution for identity verification over networks utilizing online signatures.  ... 
doi:10.1145/1460877.1460920 dblp:conf/securecomm/AlpcanKBMBC08 fatcat:oxrnyyvx7fafdpkpehd3awkv7y


D. Nali, P. C. van Oorschot, A. Adler
2008 Proceedings of the 2007 Workshop on New Security Paradigms - NSPW '07  
In the case of remote (e.g. web-based) transactions, both av-certificates and av-signatures may be used to authenticate users and verify their consent for transaction details.  ...  We propose an innovative approach to detect IDF attempts, by combining av-certificates (digitally-signed audiovisual recordings in which users identify themselves) with av-signatures (audiovisual recordings  ...  All authors thank NSPW'07 referees and attendees for fruitful suggestions and discussions on several aspects of a previous version of this paper. 7 .  ... 
doi:10.1145/1600176.1600192 dblp:conf/nspw/NaliOA07 fatcat:pnxm6slczvgirl2z6ox24tfitq


Rajdeep Das .
2013 International Journal of Research in Engineering and Technology  
In this paper we have presented a comparative study of recent advances in biometric authentication based on mainly offline Hand-written signatures.  ...  And it is for this reason biometric based authentication system have gained a lot of importance worldwide.  ...  Since today, a wide variety of applications require reliable verification schemes to confirm the identity of an individual, recognizing humans based on their body characteristics and behavior became more  ... 
doi:10.15623/ijret.2013.0212004 fatcat:plr2wqrv5vdm7hos74nj5moq6u

Enhancing security by combining biometrics and cryptography

Diana Popa, Emil Simion
2017 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)  
From the various methods used in verifying the identity of users, one more recent one is biometrics that can significantly heighten the safety and security of a system.  ...  After this methods are presented, the theoretical basis for measuring performance of a biometric system will be presented and a survey on current performance results on fuzzy vault techniques will be enumerated  ...  We decided to dive deeper into the fuzzy vault popular method of encrypting a secret using biometrics and used it as a base to show performance results obtained over the time in terms of FAR and FRR.  ... 
doi:10.1109/ecai.2017.8166461 fatcat:357p2xemsrcohd2dhe4ddv4fde

Biometric Cryptosystem Using Online Signatures [chapter]

Alisher Kholmatov, Berrin Yanikoglu
2006 Lecture Notes in Computer Science  
In this work we present a biometric cryptosystems which uses online signatures, based on the Fuzzy Vault scheme of Jules et al.  ...  The Fuzzy Vault scheme releases a previously stored key when the biometric data presented for verification matches the previously stored template hidden in a vault.  ...  As a result, online signature verification is more reliable than offline signature verification and much more commonly used as a biometric.  ... 
doi:10.1007/11902140_102 fatcat:fre4kzbikbcftfwpnc5e7r35my

A Study of Different Biometric Authentication Techniques in Cloud Computing

Akshay A. Pawle, Vrushsen P. Pawar
2017 International Journal of Engineering Research and  
This paper is a brief overview of different biometric authentication techniques used in cloud computing with their proposed methods and advantages.  ...  Cloud computing gets more work done in less time, with less people and with shared hardware and software. So, it gives great throughput with reduce cost.  ...  Signature Based Authentication Signature recognition is used to authenticate user's identity based on the traits of their unique signature. It is a behavioral characteristic of human.  ... 
doi:10.17577/ijertv6is050575 fatcat:se3q4xhlvfcjhighvikbkrucuu

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

2017 KSII Transactions on Internet and Information Systems  
A fuzzy identity based signature (FIBS) scheme allows a signer with identity ω to generate a signature which could be verified under identity ω′ if and only if ω and ω′ are within a certain distance of  ...  Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead.  ...  Thus identity-based cryptography provides a more convenient alternative to the traditional Public Key Infrastructure (PKI).  ... 
doi:10.3837/tiis.2017.05.025 fatcat:idoqdggmsjhu5debatb4kextti

Identification of a Person Using Multimodal Biometric System

T.C. Sabareeswari, Mr.S. Lenty Stuwart
2010 International Journal of Computer Applications  
An effective fusion scheme that combines information presented by multiple domain experts based on the rank-level fusion integration method.  ...  A biometric identification system is an automatic pattern recognition system that recognizes a person by determining the authenticity of a specific physiological and/or behavioral characteristic (biometric  ...  verification system based on a global appearance representation scheme, a minutiae-based fingerprint verification system, and an online signature verification system based on HMM modeling of temporal  ... 
doi:10.5120/769-1077 fatcat:at2ry5ag55fwhliwed7xkgkx2i

Secure access system using signature verification over tablet PC

Fernando Alonso-Fernandez, Julian Fierrez-Aguilar, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez
2007 IEEE Aerospace and Electronic Systems Magazine  
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.  ...  Several remarks are also given on security and privacy of network-based signature verification. [5] F. An on-line signature verification system based on fusion of local and global information,  ...  In verification mode, an individual who desires to be recognized claims an identity, and the system compares the captured biometric data with the biometric template corresponding to the claimed identity  ... 
doi:10.1109/maes.2007.351725 fatcat:gvevwiiyz5b6jhous4j7knbpty

Fuzzy Vault scheme based on fixed-length templates applied to Dynamic Signature Verification

Wendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Judith Liu-Jimenez, Raul Sanchez-Reillo
2020 IEEE Access  
In the present paper we propose the implementation of a Fuzzy Vault (FV) scheme based on fixed-length templates with application to dynamic signature verification (DSV), where only 15 global features of  ...  As a consequence of the wide deployment of biometrics-based recognition systems, there are increasing concerns about the security of the sensitive information managed.  ...  Compared to traditional authentication methods, biometrics-based recognition systems offer greater reliability and user convenience.  ... 
doi:10.1109/access.2020.2965165 fatcat:ot4yv5ubrjeetduyxkqncjiwke

A Systematic Literature Review of the Types of Authentication Safety Practices among Internet Users

Krishnapriyaa Kovalan, Siti Zobidah Omar, Lian Tang, Jusang Bolong, Rusli Abdullah, Akmar Hayati Ahmad Ghazali, Muhammad Adnan Pitchan
2021 International Journal of Advanced Computer Science and Applications  
There are many authentication methods, such as password authentication, biometric authentication, signature authentication, and so on, to protect cloud users' data.  ...  From the findings of the study, a total of three main themes were identified: password authentication, biometric authentication, and multiple-factor authentication.  ...  Digital signature is less cumbersome compared with handwritten signature. It was suggested that a multifactor authentication model was used based on digital signature and password [25] .  ... 
doi:10.14569/ijacsa.2021.0120792 fatcat:dvypmcpy3jgwxg2gybs4olcsly

Biometric Blockchain-based Multifactor Privacy Perserving Authentication Scheme for VANETs

Myra Annatasha Umang Dineal Gumis, Travis Iran Money, Zetty Elica Affandi, Siti Najihah Sapuan, Mastura Tony, Mohd. Haziq Qayyim Safian, Nur Huda Hamka
2021 Journal of IT in Asia  
This scheme is proposed by using a new robust pseudo-identity multifactor VANET scheme based on Physical Unclonable Functions (PUF) and biometric data of the vehicle's authorized user.  ...  A biometric blockchain-based multifactor privacy-preserving authentication scheme for VANETs.  ...  This work is carried out as a short-term research-based class project.  ... 
doi:10.33736/jita.3851.2021 fatcat:mvvyhffkhbapbpvvn6yb6rdfsy

A Comparative Analysis of Biometrics Types: Literature Review

Mohammad Al Rousan, Benedetto Intrigila
2020 Journal of Computer Science  
This study provides a thorough analysis of the various biometric types, including their advantages and disadvantages.  ...  The success rate of recognition and verification is, however, substantially improved by multimodal biometric sensing and processing systems, which leverage the detection or processing of two or more behavioral  ...  with identity verification and registration errors.  ... 
doi:10.3844/jcssp.2020.1778.1788 fatcat:kca2pwzdt5d53golxrrsrto7qy

Target Dependent Score Normalization Techniques and Their Application to Signature Verification

J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzalez-Rodriguez
2005 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
In particular, a target-centric technique based on the cross-validation procedure provides the best relative performance improvement testing both with skilled (19%) and random forgeries (53%) as compared  ...  Score normalization methods in biometric verification, which encompass the more traditional user-dependent decision thresholding techniques, are reviewed from a test hypotheses point of view.  ...  Yeung for providing signature data for the experiments. J. Fierrez-Aguilar also thanks Consejeria de Educacion de la Comunidad de Madrid and Fondo Social Europeo for supporting his doctoral research.  ... 
doi:10.1109/tsmcc.2005.848181 fatcat:ujcdcy7qzzg4zmzjes72pk5hoe
« Previous Showing results 1 — 15 out of 1,951 results