Filters








1,736 Hits in 14.7 sec

Multi-Level Security for Internet Banking Services

Sowjanya V.L., Mrs. K. Santosh Jhansi
2017 IJARCCE  
This paper proposing an alternate method by applying authentication via multi-level user verification by applying biometrics an application in the service of sessions. 627 CASHMA authentication server  ...  Developing biometric solution permit substituting username and password with biometric information during session establishment, however in such a methodology still a single verification is considered  ...  CONCLUSION We exploited the novel possibility introduced by biometrics to define security for continuous authentication that improves security and usability of user session.  ... 
doi:10.17148/ijarcce.2017.65120 fatcat:zoanhr77ibb3jgpoz3oygtptte

A Survey on User Identity Verification for Secure Login Session

Swati Borude, Pratiksha Chokhar, Neha Bhosale, Ashwini Palve, M. N. Kale
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
The proposed system detects misuses of computer resources and prevents malicious activities based on multi-modal biometric continuous authentication.  ...  A secure protocol is defined for constant authentication through continuous user verification. Biometric techniques suggest solution for secure, trusted and protected authentication.  ...  The system doesn't apply the ADVISE method to evaluate the security of a whole company's system architecture.  ... 
doi:10.23956/ijarcsse/v7i3/0186 fatcat:qrrqo2rrqnc3dpkvv5citlq344

Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems

Mohamad El-Abed, Patrick Lacharme, Christophe Rosenberger
2012 2012 5th IAPR International Conference on Biometrics (ICB)  
Despite this, none platform exists for the security evaluation of biometric systems. Hence, the aim of this paper is to present an on-line platform for the security evaluation of biometric systems.  ...  The key benefits of the presented platform are twofold. First, it provides biometrics community an evaluation tool to assess biometric systems in term of security.  ...  Towards this goal, the aim of this work is to present a web-based automated evaluation platform towards the security evaluation of biometric authentication systems.  ... 
doi:10.1109/icb.2012.6199793 dblp:conf/icb/El-AbedLR12 fatcat:bky5sswchfe53j3wfcveonhm4u

Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System [chapter]

Sanggyu Shin, Yoichi Seto
2015 Lecture Notes in Computer Science  
Recently, there is a widespread use of biometric authentication systems. This is because biometric systems have become open and large scale and enrolment and authentication systems are separate.  ...  Moreover, there is still no work on the systematic study of the safety of biometric authentication systems.  ...  In the security requirement for a biometric authentication system, the cancelable biometric techniques are not exclusive but are one of the measures technologies.  ... 
doi:10.1007/978-3-319-24369-6_46 fatcat:n4soaqld55grjgowffowj5u334

A Systematic Literature Review of the Types of Authentication Safety Practices among Internet Users

Krishnapriyaa Kovalan, Siti Zobidah Omar, Lian Tang, Jusang Bolong, Rusli Abdullah, Akmar Hayati Ahmad Ghazali, Muhammad Adnan Pitchan
2021 International Journal of Advanced Computer Science and Applications  
It is highly recommended to implement three-factor authentication and multi-biometric model in the future, as it provides a higher surveillance level in terms of information security among cloud computing  ...  The authentication system is one of the most important methods for maintaining information security in smart devices.  ...  27 A Highly Secure Multi-Factor Authentication System Using Biometrics to Enhance Privacy in Internet of Things (IoT) Multifactor authentication Password (textual & login key) & biometric (palm  ... 
doi:10.14569/ijacsa.2021.0120792 fatcat:dvypmcpy3jgwxg2gybs4olcsly

Continuous Biometric Verification for Non-Repudiation of Remote Services

E. Schiavone, A. Ceccarelli, A. Bondavalli
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
To meet these challenges, in this paper, we propose two solutions for non-repudiation of remote services based on multi-biometric continuous authentication.  ...  Further, non-repudiation should be guaranteed by mechanisms that do not reduce the usability of the system or application.  ...  We are also planning a model-based, quantitative security evaluation in order to assess the likelihood and impact of attacks on the system, under different scenarios, system settings, and attackers' profiles  ... 
doi:10.1145/3098954.3098969 dblp:conf/IEEEares/SchiavoneCB17 fatcat:5p33mzy5ufdrvnq77l5vg24zqi

Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN]

Benson-Emenike Mercy E., Sam-Ekeke Doris C.
2017 International Journal of Applied Information Systems  
This paper considers a multi-biometric system involving a combination of three biometric traits: iris, fingerprint and face in order to make authentication cheaper and more reliable.  ...  With those possibilities comes risk of fraud, theft of personal data, or even theft of identity. One of the ways to prevent this is through biometric authentication system.  ...  For secure authentication, this research considers a trimodal multi-biometric authentication system with fingerprint, iris, and face modalities.  ... 
doi:10.5120/ijais2017451699 fatcat:5x73mduy6rcb5b33y4ldfvu37q

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud [chapter]

Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki
2014 Lecture Notes in Computer Science  
There must be a balance between security and privacy during secure authentication design.  ...  Here a survey of security and privacy issues for biometrics based remote authentication in cloud is briefly presented and the research gaps are identified to attract more research on this domain in near  ...  Table 1 . 1 Quantitative Analysis of Few Biometric Features Topic Additional Security Features Evaluation Metrics Estimated Values Fingerprint verification with image enhance- ment [4] No Equal  ... 
doi:10.1007/978-3-662-45237-0_12 fatcat:7e574x3oirfgtil2rji47feiz4

Symmetric Groups of Authentications and Key Management with Session Based Automated Key Updation

K. Gunalan
2019 International Journal for Research in Applied Science and Engineering Technology  
factor), such as a password or biometrics, of the user is stored.  ...  Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with a server to set up a session key where pre-registered information (aka. authentication  ...  need for secure multi-factor authentication schemes.  ... 
doi:10.22214/ijraset.2019.4660 fatcat:5pyoosltsfcvtlidpck4rrymcq

Multi-modal Biometric Protection System Using SURF Filter with BioHashing Algorithm

Bedad Fatima, Adjoudj Réda
2019 Traitement du signal  
This article presents a revocable multi-biometric scheme to secure multi-biometric data and focusses on the BioHashing method which is a recent technique capable of addressing the reversal of the confidentiality  ...  Therefore, secure and revocable multi-biometric templates protection schemes are required to ensure multi-biometric system integrity and user privacy.  ...  As a result, the effectiveness of security in multi-biometric systems is observed.  ... 
doi:10.18280/ts.360303 fatcat:vzyr4rv66bd4fe54z5pxgtv4oe

Multibiometric systems: A comparative study of multi-algorithmic and multimodal approaches

Mohammad Imran, Ashok Rao, G. Hemantha Kumar
2010 Procedia Computer Science  
In this paper, we present a comparative analysis of Multi-algorithmic and Multimodal approaches.  ...  Subsequently, the different combinations of algorithms are also evaluated in our experiment.  ...  However, sometimes a single biometric system fails to authenticate the identity of a person due to insufficient information or by spoofing.  ... 
doi:10.1016/j.procs.2010.11.026 fatcat:3mrruzwsa5cuhndfv7lafgra3a

Towards the Security Evaluation of Biometric Authentication Systems

Mohamad El-Abed, Romain Giot, Baptiste Hemery, Jean Jacques Schwartzmann, Christophe Rosenberger
2012 International Journal of Engineering and Technology  
In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems.  ...  The proposed methodology produces a security index which characterizes the overall security level of biometric systems.  ...  ACKNOWLEDGMENT The authors would like to thank the French Research Ministry for their financial support of this work.  ... 
doi:10.7763/ijet.2012.v4.373 fatcat:gjb2lruqvfc6hnuhk2xqjlfcny

Biometric technology in banking institutions: 'The customers' perspectives'

Abraham Morake, Lucas T. Khoza, Tebogo Bokaba
2021 South African Journal of Information Management  
need for security and simplicity in the authentication of retail payments, digital banking and financial technology through the application of biometric systems.Method: The study employed quantitative  ...  possible security measures or systems to ensure or enhance security for financial business activities.Conclusion: Based on the findings of the study, it is recommended that businesses must adopt the new  ...  Acknowledgements My gratitude to Alpha and Omega, Creator of heaven and earth.  ... 
doi:10.4102/sajim.v23i1.1407 fatcat:ihdxaqxiw5gednxcrjqsaop4oa

Cancelable Face Template Protection using Transform Features for Cyberworld Security

Firdous Kausar
2020 International Journal of Advanced Computer Science and Applications  
The cancelable biometric is a solution to rid of privacy problems in traditional biometric systems.  ...  Biometrics authentication is used in different cybersecurity systems for user authentication purpose.  ...  First, they use an individual template to derive a single multi-biometric template. Securing distinctive formats of a user independently is not empowering approach in term of security.  ... 
doi:10.14569/ijacsa.2020.0110142 fatcat:6ete2dwc7vdqdmh7rve2t747p4

Biometric Technologies in Recognition Systems: A Survey

Shihab A. Shawkat1, Raya N. Ismail2
2019 Tikrit Journal of Pure Science  
In this paper, a comprehensive overview have been provided on the major issues of biometric systems including general biometric system architecture, major biometric traits, biometric systems performance  ...  Biometric systems employ physiological and/or behavioral characteristics of people to verify their identities.  ...  The metrics used to evaluate a biometric system depends on whether the objective of the biometric system is identification or verification.  ... 
doi:10.25130/j.v24i6.899 fatcat:p54v2opjtnfczh3fagzk2zvyji
« Previous Showing results 1 — 15 out of 1,736 results