Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Secure Authentication Using Automated Biometrics
Post: #1

Authentication and security have been major issues right from the beginning of the computer age. One of the emerging and efficient keys to security problems is Biometrics- a technology that strives towards identifying the identity of a living person based on biological characteristics. Biometrics possesses many advantages over conventional user authentication processes. Because a biometric is an intrinsic property of some individual they are difficult to duplicate and impossible to share. Examples of automated biometrics include fingerprints, faces, iris and speech. Even though biometric based system is more reliable and secure than conventional authentication methods, it is still possible to hack into a biometric system. There are 8 possible weak links in a generic biometric system. This paper highlights the attack points on a fingerprint based biometric system and suggestions to alleviate them. Resubmitting of old digitally stored biometrics signals is one of the weakest links. Two techniques are proposed. One method involves hiding messages in the image and works in conjunction with the image compression method (WSQ). Other method involves checking the liveliness of the signal acquired from an intelligent sensor using a challenge/response strategy. Two key issues associated with a biometric system are privacy concern and re-issuance of identity tokens. A new technique has been proposed called cancelable biometrics in which the biometric signals are distorted using well defined transformations. The techniques proposed enhance the security of a biometric system.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: biometrics in secure e transaction powerpoint presentation, biometrics authentication systems ppt free download, introduction biometrics in secure e transaction, e voting using biometrics, security system using biometrics, biometrics in secure e transaction ppts free download, online voting system using biometrics,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Automated Distribution System computer science crazy 12 8,877 04-04-2015 10:57 AM
Last Post: seminar report asees
  EMBEDDED SECURITY SYSTEM IN AUTOMATED TELLER MACHINE seminar class 2 1,939 30-09-2013 10:56 AM
Last Post: computer topic
  Image Authentication Techniques computer science crazy 2 3,435 15-11-2012 12:24 PM
Last Post: seminar details
  Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANE computer science crazy 2 1,991 16-03-2012 09:47 AM
Last Post: seminar paper
  Gen2-Based RFID Authentication Protocol for Security and Privacy computer science crazy 4 3,619 17-05-2011 11:05 AM
Last Post: Rockzzzzz
Last Post: seminar surveyer
  GPRS ENABLED SECURE REMOTE PATIENT MONITORING SYSTEM seminar surveyer 0 1,206 22-12-2010 02:31 PM
Last Post: seminar surveyer
Bug Authentication and Authorization using Biometric Device seminar projects crazy 1 2,199 07-10-2010 12:35 PM
Last Post: projectsofme
  User Authentication using Automated Biometrics computer science crazy 1 978 15-08-2009 11:13 PM
Last Post: sabil
  AUTOMATED INSPECTION OF AIRCRAFT computer science crazy 0 988 17-04-2009 08:16 PM
Last Post: computer science crazy