Biometrics in Cyber Security

被引:5
|
作者
Kour, Jaspreet [1 ]
Hanmandlu, M. [2 ]
Ansari, A. Q. [3 ]
机构
[1] Galgotias Coll Engn & Technol, Greater Noida 201306, India
[2] Indian Inst Technol Delhi, New Delhi 110016, India
[3] Jamia Millia Islamia, New Delhi 110025, India
关键词
Cyber security; biometrics; fingerprint recognition; fuzzy features; invariant moment features; FINGERPRINT; WAVELET;
D O I
10.14429/dsj.66.10800
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM.
引用
收藏
页码:600 / 604
页数:5
相关论文
共 50 条
  • [21] Biometrics for Home Networks Security
    Ansari, Imran S.
    Qutbuddin, Ahmad S.
    [J]. 2009 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT: SCORED 2009, PROCEEDINGS, 2009, : 136 - 138
  • [22] A Survey of Biometrics Security System
    Uddin, Mohammed Nasir
    Sharmin, Selina
    Ahmed, Abu Hasnat Shohel
    Hasan, Emrul
    Hossain, Shahadot
    Muniruzzaman
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (10): : 16 - 23
  • [23] Cyber security
    Boughton, Nick
    [J]. CHEMISTRY & INDUSTRY, 2019, 83 (04) : 38 - 38
  • [24] Cyber(in)security
    Szczypiorski, Krzysztof
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (01) : 243 - 248
  • [25] Cyber security
    Sandström, E
    Weiss, J
    [J]. 2005 CIGRE/IEEE PES International Symposium, 2005, : 282 - 289
  • [26] CYBER SECURITY
    Sonntag, Michael
    [J]. IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 313 - 323
  • [27] Cyber Security
    Welander, Peter
    [J]. CONTROL ENGINEERING, 2009, 56 (01) : 40 - 43
  • [28] Cyber security
    Colias, M
    [J]. HOSPITALS & HEALTH NETWORKS, 2004, 78 (05): : 60 - +
  • [29] Taxonomy of cyber security metrics to measure strength of cyber security
    Gupta Bhol S.
    Mohanty J.R.
    Kumar Pattnaik P.
    [J]. Materials Today: Proceedings, 2023, 80 : 2274 - 2279
  • [30] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18