1,953 Hits in 5.4 sec

Prototyping security test objects for use with advanced biometric authentication systems

Tsutomu Matsumoto
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
The state-of-art methodology to measure or assess security of advanced biometric authentication systems is updated.  ...  As a test object for iris authentication systems (1), so far we introduced the eye-picture-printed paper with punctured pupil part with the method to use it.  ...  We discuss how to measure the security of each biometric system against attacks using fake biometric objects.  ... 
doi:10.1145/1368310.1368313 dblp:conf/ccs/Matsumoto08 fatcat:qxcd7eg3hfgaxjezz3vtwwlvfm

An embedded biometric sensor for ubiquitous authentication

V. Conti, S. Vitabile, G. Vitello, F. Sorbello
2013 AEIT Annual Conference 2013  
Typical strategies implemented in Identity Management Systems could be useful to protect biometric information.  ...  Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications.  ...  After, the biometric template is created from these extracted points. For security constraints, the biometric templates are encrypted using AES (Advanced Encryption Standard) algorithm [12] . C.  ... 
doi:10.1109/aeit.2013.6666815 fatcat:nvfs7oxzabfozp3he3kanzxpiq

Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identityfor Industrial Internet of ThingsCritical Infrastructure Protection

Joseph Kalunga, Simon Tembo, Jackson Phiri
2020 International Journal of Advances in Scientific Research and Engineering  
The main objective of this study is to develop a prototype application for authentication and identification of legitimate Industrial IoT human entities/objects based on the mentioned two identities as  ...  associated with traditional identity authentication methods.  ...  The prototype access control system uses continuous authentication and face recognition.  ... 
doi:10.31695/ijasre.2020.33940 fatcat:psb34rqsjjbhdhths5ysstcluy

A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones

Javid Maghsoudi, Charles C. Tappert
2016 2016 European Intelligence and Security Informatics Conference (EISIC)  
Recently we are using physical biometrics like facial, finger print and iris recognition, in Smartphone authentication has mitigated the problems with user input, however, they still suffer from other  ...  , power consumption, etc. here we discuss limitations of existing authentication methods in terms of security and usability, and propose their replacements with behavioral biometric authentication mechanisms  ...  This app is useful for all Android users. In advance we are going to develop combination of any two authentications.  ... 
doi:10.1109/eisic.2016.047 dblp:conf/eisic/MaghsoudiT16 fatcat:yxucd4l3hbbl7imxpbsvfwioqu

Flexible and Transparent User Authentication for Mobile Devices [chapter]

Nathan Clarke, Sevasti Karatzouni, Steven Furnell
2009 IFIP Advances in Information and Communication Technology  
Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology.  ...  user inconvenience; and providing security throughout the period of use.  ...  Whilst this was somewhat expected given current usage (with most end-users simply using their device for telephony or texting); the few enterprise-level users of devices (using advanced features such as  ... 
doi:10.1007/978-3-642-01244-0_1 fatcat:4gwb6ddbevaphjcyltfkkwcqxe

Machine Learning Biometric Attendance System using Fingerprint Fuzzy Vault Scheme Algorithm and Multi-Task Convolution Neural Network Face Recognition Algorithm

Patrick Cerna, Mary Charlemaine, Haftom Gebreziagbher, Mesay Mengstie
2018 International Journal of Computer Applications  
Biometric technology offers an advanced verification for employees used in most schools and companies.  ...  A user interface module was develop using Visual Basic where fingerprint and face registration is done and during logging with the prototype.  ...  Its objective is to develop an embedded system, which is used for security applications and includes a microcontroller based prototype of attendance system using fingerprint sensor and face recognition  ... 
doi:10.5120/ijca2018917202 fatcat:oqyzwxylifdhdohp524tscipai

Extending identity management system with multimodal biometric authentication

Bojan Jovanovic, Ivan Milenkovic, Marija Bogicevic-Sretenovic, Dejan Simic
2016 Computer Science and Information Systems  
The authentication process can be additionally secured by using biometric data for user verification.  ...  Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data.  ...  Clients have access to the biometric devices on the virtual host. During performance tests, a custom program was used to compose message for authentication with biometric samples.  ... 
doi:10.2298/csis141030003j fatcat:dwz5baknlbfctajxguv6bck6ye

Implementing fingerprint authentication in computer-based tests

A.E. Evwiekpaefe, V.O. Eyinla
2021 Nigerian Journal of Technology  
The study examined the existing authentication method available on the Computer-based test system of Air Force Institute of Technology (AFIT), Kaduna, Nigeria and proposed the fingerprint biometric technique  ...  The fingerprint biometric authentication was developed using FlexCode SDK and implemented on DigitalPersona 4500 fingerprint reader – the recommended scanner by JAMB for fingerprint enrollment.  ...  The system was tested at Federal Polytechnic, Bida with some selected students. [7] developed a computer-based test centre using biometric fingerprint for verification/authentication and tied the MAC  ... 
doi:10.4314/njt.v40i2.14 fatcat:7kgcnh6jirfblkxiorn4tzz3xa

eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

Torben Kuseler, Ihsan Lami, Sabah Jassim, Harin Sellahewa, Sos S. Agaian, Sabah A. Jassim
2010 Mobile Multimedia/Image Processing, Security, and Applications 2010  
The use of mobile communication devices with advance sensors is growing rapidly.  ...  Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both  ...  Layers structure, makes the iPhone a perfect first candidate for a complete secure biometric authentication system.  ... 
doi:10.1117/12.850022 fatcat:qb3v6gp2rvcuhpbsckkoxvmiym

Continuous User Identity Verification for Trusted Operators in Control Rooms [chapter]

Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli
2015 Lecture Notes in Computer Science  
Specifically tailored for the operators in the control room of the crisis management system Secure!  ...  This paper presents the authentication system design and prototype, its execution and experimental results.  ...  As future work we are building and executing several test sessions with a larger number of different operators using Secure!  ... 
doi:10.1007/978-3-319-27161-3_17 fatcat:ykklbfyk6zbjxobmm5b5glap34

A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

V. Conti, C. Militello, F. Sorbello, S. Vitabile
2009 Mobile Information Systems  
These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users.  ...  To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on  ...  The prototyped recognizer overcomes safety problems in the treatment of the biometric features (Replay Attacks) using the Advanced Encryption Standard (AES) to encrypt/decrypt biometric signatures stored  ... 
doi:10.1155/2009/284124 fatcat:34wovrlq5fb2rmjl3xv4l6i4ia

Face Recognition Using the Convolutional Neural Network for Barrier Gate System

Mochammad Langgeng Prasetyo, Achmad Teguh Wibowo, Mujib Ridwan, Mohammad Khusnu Milad, Sirajul Arifin, Muhammad Andik Izzuddin, Rr Diah Nugraheni Setyowati, Ferda Ernawan
2021 International Journal of Interactive Mobile Technologies  
Face recognition can be used for authentication, which can be implemented for preventing of criminal incidents.  ...  This re-search proposed a face recognition system using convolutional neural network to open and close the real-time barrier gate.  ...  The test results from combining the output of a facial recognition-based biometric authentication system with the CNN algorithm and a microcontroller for the barrier gate system using a confusion matrix  ... 
doi:10.3991/ijim.v15i10.20175 fatcat:ywcgbsu2kvdonb3xyiozwk4cde

Seamless Personnel Authentication using Facial Recognition and Identity-Based Identification on Mobile Devices

2019 International journal of recent technology and engineering  
Security systems for buildings are no longer an uncommon thing in daily life with increasingly complex access control systems to achieve secured building security system.  ...  In this project, we develop a prototype that utilizes a combination of biometric and cryptography based security schemes to grant access control on personnel going in and out of a building.  ...  Powered by a number-theoretically secure Identity-Based Identification (IBI) scheme in combination with a biometric-based face recognition system, our prototype achieves two-factor authentication in one  ... 
doi:10.35940/ijrte.c1009.1083s19 fatcat:hmynjtbktbgg7hmkm3c62vbmha

Security Features in Fingerprint Biometric System

Kamarul Zaman Panatik, Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, Kuala Lumpur, MALAYSIA, Kamilia Kamardin, Siti Nurhafizza Maidin, Ngu War Hlaing, Irfanuddin Shafi Ahmed, Noureen Taj, Hazilah Mad Kaidi, Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur, MALAYSIA, Wireless Communication Center, Universiti Teknologi Malaysia, Kuala Lumpur, MALAYSIA, Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, Kuala Lumpur, MALAYSIA, Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur, MALAYSIA (+3 others)
2020 International Journal of Integrated Engineering  
Introduction An automated biometric system uses the characteristics of human beings such as behavioral, physiological, and biological characteristics for the authentication of individual identity based  ...  The attacks are now evolving, becoming more complex with technological advancements. Therefore, a new way of implementing security in embedded systems must be pursued.  ...  Acknowledgement The authors fully acknowledged Ministry of Higher Education (MOHE) and Universiti Teknologi Malaysia (UTM) for the approved fund (16J46) which make this research possible.  ... 
doi:10.30880/ijie.2020.12.06.004 fatcat:2snd5gn3f5afjk32itlmu33jiu

Multi-Factor Authentication for e-Government Services using a Smartphone Application and Biometric Identity Verification

Mohammad AlRousan, Benedetto Intrigila
2020 Journal of Computer Science  
This paper proposes an authentication scheme that integrates multi-factor authentication procedures, a One-Time Password (OTP) and biometric authentication ("facial recognition" or "fingerprint") for the  ...  Therefore, a robust security solution for data in transit is becoming increasingly necessary.  ...  Biometric Identity Verification With the growing need for robust authentication schemes, the use of biometric-identity-verification-based systems has become widespread (Wang et al., 2003) .  ... 
doi:10.3844/jcssp.2020.217.224 fatcat:amsvdisopzf6tpd4xybw2yp5va
« Previous Showing results 1 — 15 out of 1,953 results