5,635 Hits in 5.5 sec

An Approach to Biometric Identity Management Using Low Cost Equipment

Robert Mueller, Raul Sanchez-Reillo
2009 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
We designed a system that allows digital identity management using two-factor authentication.  ...  Digital identities are becoming increasingly popular. Professional implementation relies upon a secure embedded system and two-factor authentication for managing the important credentials.  ...  Further investigations on the use of low-cost equipment for digital identity management are suggested future work. Fig. 1 . 1 Fingerprint image acquired with a webcam Fig. 2 . 2 Fig. 2.  ... 
doi:10.1109/iih-msp.2009.50 dblp:conf/iih-msp/MuellerS09 fatcat:33p5yaybjbcarkbsdqa2ssribi


Gregor Költzsch
2006 Journal of Business Economics and Management  
Biometric technologies such as fingerprint and facial recognition provide the means to enhance banking security.  ...  Although the security‐oriented use of biometric technologies has become the most important field of development, they also enable a variety of convenience‐oriented use cases and applications.  ...  However, the costs of biometric data management may be higher than access management based on password and PIN management.  ... 
doi:10.3846/16111699.2006.9636145 fatcat:q2is63pqfjhdla6ydrxcymy5rm

Online Learning Integrity Approaches: Current Practices and Future Solutions

Anita Lee-Post, Holly Hapke
2017 Online Learning  
Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty.  ...  The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising  ...  Here we use the term approach to denote a broad category or strategy. A specific implementation of an approach is called a solution or practice.  ... 
doi:10.24059/olj.v21i1.843 fatcat:5vwuzmwbpjgvvm3w3ndqiepnxi

Identification for Development: The Biometrics Revolution

Alan Gelb, Julia Clark
2013 Social Science Research Network  
Many of these programs use digital biometric identification technology that distinguish physical or behavioral features, such as fingerprints or iris scans, to help "leapfrog" traditional paper-based identity  ...  Technology costs are falling rapidly, and it is now possible to ensure unique identity in populations of at least several hundred million with little error.  ...  There are few rigorous evaluations of the merits of an identity-driven approach to development, and in particular the use of biometrics.  ... 
doi:10.2139/ssrn.2226594 fatcat:tbcm7dn6hfgx3f47owsbz3vria

Characteristic trade-offs in designing large-scale biometric-based identity management systems

Siraj A. Shaikh, Joseph R. Rabaiotti
2010 Journal of Network and Computer Applications  
We use our approach to analyse the recently launched Identity Card scheme in the United Kingdom.  ...  Biometric-based identity management systems are deemed to be the new solution to address the challenges of global security and citizenship.  ...  Acknowledgements We are grateful to the anonymous reviewers for their valuable feedback which has helped to improve the ideas presented in this paper.  ... 
doi:10.1016/j.jnca.2009.12.015 fatcat:nkfnraedbjasho7i3ipihbfcwy

Fingerprint Based Approach For Examination Clearance in Higher Institutions

Yakub K Saheed, Moshood A Hambali, Ismaeel A Adeniji, Akeem F Kadri
2017 FUOYE Journal of Engineering and Technology  
The proposed examination clearance system used fingerprint identification. In identification, the system recognizes an individual by comparing his/her biometrics with every record in the database.  ...  This paper addressed all the aforementioned shortcomings and revealed the effectiveness of biometric system using fingerprint for examination clearance.  ...  Low cost of deployment (cost effective). ii. Simple to implement and use. iii.  ... 
doi:10.46792/fuoyejet.v2i1.46 fatcat:3acq7jdhpzcxrkpppxyyh3w65i

Toward trust-based multi-modal user authentication on the Web: a fuzzy approach

Antonia Azzini, Stefania Marrara
2007 IEEE International Fuzzy Systems conference proceedings  
While most approaches focus on the initial authentication and then no further check ensure the identity of the navigating user, in this work we present a fuzzy approach to multi-modal authentication for  ...  The potentiality of such an approach for generating trust-based metadata is also discussed.  ...  This work was partly funded by the Italian Ministry of Research Fund for Basic Research (FIRB) under projects RBAU01CLNB_001 "Knowledge Management for the Web Infrastructure" (KIWI). and RBNE01JRK8_003  ... 
doi:10.1109/fuzzy.2007.4295594 dblp:conf/fuzzIEEE/AzziniM07 fatcat:ht2cfrbyzfck5fnp2bxsnzdcgi

Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition

Krishna Prasad K.
2018 International journal of management, technology, and social science  
Authentication is using one or multiple mechanisms to show that you are who you claim to be.  ...  But, the use of Iris may additionally have some drawbacks related to viable safety breaches.  ...  System makes use of different capturing devices with an intention to acquire biometric traits to an automated system.  ... 
doi:10.47992/ijmts.2581.6012.0046 fatcat:jwclbfyt6ng27fbkgb6fwqcclu

A Study On Key Biometric Technologies: Characteristics And Applications

M. Praveen Kumar
2018 Zenodo  
This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the uses, benefits, and applications.  ...  This template is securely stored in a central database or a smart card issued to the user. The template is retrieved when an individual needs to be identified.  ...  However, the biometric industry did not take off at that time, due to high cost, low recognition accuracy and the lack of standards and testing benchmarks with which the different approaches could be compared  ... 
doi:10.5281/zenodo.1189392 fatcat:jexf63o5v5dj5atxr3nied4tkm

Application of Machine Learning in Fingerprint Image Enhancement and Recognition: A Review

Kshitij Singh, Dr. Gireesh Kumar Dixit
Biometric characteristics helps to recognize an individual among others. Each individual has a unique biometric feature. So, an automated system is designed to recognize an individual.  ...  In today's growing AI development, biometric recognition is applied in many security systems. One of oldest and widely used authentic biometric methodology is fingerprint recognition.  ...  The above implementation was an attempt to understand how fingerprint recognition is used as a form of biometrics to recognize human identity.  ... 
doi:10.24113/ijoscience.v7i4.386 fatcat:es253g3grbcslp6txwteta5hfa

A Comparative Analysis of Biometrics Types: Literature Review

Mohammad Al Rousan, Benedetto Intrigila
2020 Journal of Computer Science  
Biometric screening systems are used to test and identify persons using their physiological or behavioral characteristics.  ...  To verify and classify people using their physiological attributes, biometric devices are used. These technologies can be classified as either behavioral or physiological biometrics.  ...  Biometric solutions are now able to achieve fast, easy-to-use authentication with high precision at relatively low cost. Biometric technologies will benefit many areas.  ... 
doi:10.3844/jcssp.2020.1778.1788 fatcat:kca2pwzdt5d53golxrrsrto7qy

Use of ePassport for Identity Management in Network-Based Citizen-Life Processes [chapter]

Pravir Chawdhry, Ioannis Vakalis
2010 IFIP Advances in Information and Communication Technology  
Digital identity management (IdM) for citizen-life processes requires trusted relationship among the service providers and users.  ...  We propose the use of ePassport as a globally interoperable trust token to bridge the gap between offline and online environments.  ...  Network-based Identity Management Current Approaches Currently there are two main approaches to network-based identity management: centralized and distributed.  ... 
doi:10.1007/978-3-642-14282-6_10 fatcat:a5zvefnbyvgcxhndphatskamqq

Various Biometric Authentication Techniques: A Review

Kalyani CH
2017 Journal of Biometrics & Biostatistics  
Biometrics refers to metrics related to human characteristics. Biometrics is a realistic authentication used as a form of identification and access control.  ...  It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are then measurable, distinctive characteristics used to label and describe individuals.  ...  Retina scanner A retinal scan is a biometric approach that makes use of the unique patterns on someone's retina to discover them.  ... 
doi:10.4172/2155-6180.1000371 fatcat:oakwmwns7vdnbplkpl6udk5azu

A distributed and cooperative user authentication framework

C. G. Hocking, S. M. Furnell, N. L. Clarke, P. L. Reynolds
2010 2010 Sixth International Conference on Information Assurance and Security  
This paper proposes a novel approach to security that leverages the collective confidence of user identity held by the multiplicity of devices present at any given time.  ...  User identity confidence is reinforced by sharing established credentials between devices, enabling them to make informed judgments on their own security position.  ...  the piece of equipment is illicitly removed or used by another.  ... 
doi:10.1109/isias.2010.5604058 dblp:conf/IEEEias/HockingFCR10 fatcat:3as44naozfcpfn7rwwkif63rva

New Pathways in Identity Management

Paul C. Clark, Glenn R. Cook, Edward L. Fisher, John D. Fulp, Valerie Linhoff, Cynthia E. Irvine
2010 IEEE Security and Privacy  
So, using passwords for verification gives only low confidence that it proves a claimed identity, yet incurs high organizational support costs.  ...  The credential service provider binds identity attributes to an identity credential. We use various scenarios to illustrate these roles.  ... 
doi:10.1109/msp.2010.183 fatcat:3vdsz5vzzbhoxokn7fjputs4ni
« Previous Showing results 1 — 15 out of 5,635 results