A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Approach to Biometric Identity Management Using Low Cost Equipment
2009
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
We designed a system that allows digital identity management using two-factor authentication. ...
Digital identities are becoming increasingly popular. Professional implementation relies upon a secure embedded system and two-factor authentication for managing the important credentials. ...
Further investigations on the use of low-cost equipment for digital identity management are suggested future work. Fig. 1 . 1 Fingerprint image acquired with a webcam
Fig. 2 . 2 Fig. 2. ...
doi:10.1109/iih-msp.2009.50
dblp:conf/iih-msp/MuellerS09
fatcat:33p5yaybjbcarkbsdqa2ssribi
INNOVATIVE METHODS TO ENHANCE TRANSACTION SECURITY OF BANKING APPLICATIONS
2006
Journal of Business Economics and Management
Biometric technologies such as fingerprint and facial recognition provide the means to enhance banking security. ...
Although the security‐oriented use of biometric technologies has become the most important field of development, they also enable a variety of convenience‐oriented use cases and applications. ...
However, the costs of biometric data management may be higher than access management based on password and PIN management. ...
doi:10.3846/16111699.2006.9636145
fatcat:q2is63pqfjhdla6ydrxcymy5rm
Online Learning Integrity Approaches: Current Practices and Future Solutions
2017
Online Learning
Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. ...
The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising ...
Here we use the term approach to denote a broad category or strategy. A specific implementation of an approach is called a solution or practice. ...
doi:10.24059/olj.v21i1.843
fatcat:5vwuzmwbpjgvvm3w3ndqiepnxi
Identification for Development: The Biometrics Revolution
2013
Social Science Research Network
Many of these programs use digital biometric identification technology that distinguish physical or behavioral features, such as fingerprints or iris scans, to help "leapfrog" traditional paper-based identity ...
Technology costs are falling rapidly, and it is now possible to ensure unique identity in populations of at least several hundred million with little error. ...
There are few rigorous evaluations of the merits of an identity-driven approach to development, and in particular the use of biometrics. ...
doi:10.2139/ssrn.2226594
fatcat:tbcm7dn6hfgx3f47owsbz3vria
Characteristic trade-offs in designing large-scale biometric-based identity management systems
2010
Journal of Network and Computer Applications
We use our approach to analyse the recently launched Identity Card scheme in the United Kingdom. ...
Biometric-based identity management systems are deemed to be the new solution to address the challenges of global security and citizenship. ...
Acknowledgements We are grateful to the anonymous reviewers for their valuable feedback which has helped to improve the ideas presented in this paper. ...
doi:10.1016/j.jnca.2009.12.015
fatcat:nkfnraedbjasho7i3ipihbfcwy
Fingerprint Based Approach For Examination Clearance in Higher Institutions
2017
FUOYE Journal of Engineering and Technology
The proposed examination clearance system used fingerprint identification. In identification, the system recognizes an individual by comparing his/her biometrics with every record in the database. ...
This paper addressed all the aforementioned shortcomings and revealed the effectiveness of biometric system using fingerprint for examination clearance. ...
Low cost of deployment (cost effective). ii. Simple to implement and use. iii. ...
doi:10.46792/fuoyejet.v2i1.46
fatcat:3acq7jdhpzcxrkpppxyyh3w65i
Toward trust-based multi-modal user authentication on the Web: a fuzzy approach
2007
IEEE International Fuzzy Systems conference proceedings
While most approaches focus on the initial authentication and then no further check ensure the identity of the navigating user, in this work we present a fuzzy approach to multi-modal authentication for ...
The potentiality of such an approach for generating trust-based metadata is also discussed. ...
This work was partly funded by the Italian Ministry of Research Fund for Basic Research (FIRB) under projects RBAU01CLNB_001 "Knowledge Management for the Web Infrastructure" (KIWI). and RBNE01JRK8_003 ...
doi:10.1109/fuzzy.2007.4295594
dblp:conf/fuzzIEEE/AzziniM07
fatcat:ht2cfrbyzfck5fnp2bxsnzdcgi
Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition
2018
International journal of management, technology, and social science
Authentication is using one or multiple mechanisms to show that you are who you claim to be. ...
But, the use of Iris may additionally have some drawbacks related to viable safety breaches. ...
System makes use of different capturing devices with an intention to acquire biometric traits to an automated system. ...
doi:10.47992/ijmts.2581.6012.0046
fatcat:jwclbfyt6ng27fbkgb6fwqcclu
A Study On Key Biometric Technologies: Characteristics And Applications
2018
Zenodo
This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the uses, benefits, and applications. ...
This template is securely stored in a central database or a smart card issued to the user. The template is retrieved when an individual needs to be identified. ...
However, the biometric industry did not take off at that time, due to high cost, low recognition accuracy and the lack of standards and testing benchmarks with which the different approaches could be compared ...
doi:10.5281/zenodo.1189392
fatcat:jexf63o5v5dj5atxr3nied4tkm
Application of Machine Learning in Fingerprint Image Enhancement and Recognition: A Review
2021
SMART MOVES JOURNAL IJOSCIENCE
Biometric characteristics helps to recognize an individual among others. Each individual has a unique biometric feature. So, an automated system is designed to recognize an individual. ...
In today's growing AI development, biometric recognition is applied in many security systems. One of oldest and widely used authentic biometric methodology is fingerprint recognition. ...
The above implementation was an attempt to understand how fingerprint recognition is used as a form of biometrics to recognize human identity. ...
doi:10.24113/ijoscience.v7i4.386
fatcat:es253g3grbcslp6txwteta5hfa
A Comparative Analysis of Biometrics Types: Literature Review
2020
Journal of Computer Science
Biometric screening systems are used to test and identify persons using their physiological or behavioral characteristics. ...
To verify and classify people using their physiological attributes, biometric devices are used. These technologies can be classified as either behavioral or physiological biometrics. ...
Biometric solutions are now able to achieve fast, easy-to-use authentication with high precision at relatively low cost. Biometric technologies will benefit many areas. ...
doi:10.3844/jcssp.2020.1778.1788
fatcat:kca2pwzdt5d53golxrrsrto7qy
Use of ePassport for Identity Management in Network-Based Citizen-Life Processes
[chapter]
2010
IFIP Advances in Information and Communication Technology
Digital identity management (IdM) for citizen-life processes requires trusted relationship among the service providers and users. ...
We propose the use of ePassport as a globally interoperable trust token to bridge the gap between offline and online environments. ...
Network-based Identity Management
Current Approaches Currently there are two main approaches to network-based identity management: centralized and distributed. ...
doi:10.1007/978-3-642-14282-6_10
fatcat:a5zvefnbyvgcxhndphatskamqq
Various Biometric Authentication Techniques: A Review
2017
Journal of Biometrics & Biostatistics
Biometrics refers to metrics related to human characteristics. Biometrics is a realistic authentication used as a form of identification and access control. ...
It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are then measurable, distinctive characteristics used to label and describe individuals. ...
Retina scanner A retinal scan is a biometric approach that makes use of the unique patterns on someone's retina to discover them. ...
doi:10.4172/2155-6180.1000371
fatcat:oakwmwns7vdnbplkpl6udk5azu
A distributed and cooperative user authentication framework
2010
2010 Sixth International Conference on Information Assurance and Security
This paper proposes a novel approach to security that leverages the collective confidence of user identity held by the multiplicity of devices present at any given time. ...
User identity confidence is reinforced by sharing established credentials between devices, enabling them to make informed judgments on their own security position. ...
the piece of equipment is illicitly removed or used by another. ...
doi:10.1109/isias.2010.5604058
dblp:conf/IEEEias/HockingFCR10
fatcat:3as44naozfcpfn7rwwkif63rva
New Pathways in Identity Management
2010
IEEE Security and Privacy
So, using passwords for verification gives only low confidence that it proves a claimed identity, yet incurs high organizational support costs. ...
The credential service provider binds identity attributes to an identity credential. We use various scenarios to illustrate these roles. ...
doi:10.1109/msp.2010.183
fatcat:3vdsz5vzzbhoxokn7fjputs4ni
« Previous
Showing results 1 — 15 out of 5,635 results