A network authentication system with multi-biometrics

被引:4
|
作者
Seno, S [1 ]
Sadakane, T [1 ]
Baba, Y [1 ]
Shikama, T [1 ]
Koui, Y [1 ]
Nakaya, N [1 ]
机构
[1] Mitsubishi Electr Corp, Informat Technol R&D Ctr, Kamakura, Kanagawa 2478501, Japan
关键词
biometrics; network authentication system; workflow;
D O I
10.1109/APCC.2003.1274231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of the recent increase of incidents over the Internet and other networks, the role of authentication techniques to prevent unauthorized access by malicious users becomes more significant.. User authentication methods can be classified into three categories: (1) methods based on human memory such as passwords, (2) methods based on physical devices such as magnetic or IC cards, and (3) methods based on biometrics such as fingerprint and iris. As the first two categories cannot escape vulnerabilities caused by forgetfulness or losses, the third category attracts much attention in these, days. This paper proposes a network authentication system with multi-biometrics to support various, applications where user authentication is necessary. In particular, it can provide authentication services to a workflow process that is a typical intranet application. The paper also discusses the prototype implementations developed after the proposed system and their evaluation.
引用
收藏
页码:914 / 918
页数:5
相关论文
共 50 条
  • [21] Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques
    Allano, Lorene
    Morris, Andrew C.
    Sellahewa, Harin
    Garcia-Salicetti, Sonia
    Koreman, Jacques
    Jassim, Sabah
    Ly-Van, Bao
    Wu, Dalei
    Dorizzi, Bernadette
    BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION III, 2006, 6202
  • [22] Synthesis Score Level Fusion Based Multifarious Classifier for Multi-Biometrics Applications
    Vaijayanthimala, J.
    Padma, T.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2019, 9 (08) : 1673 - 1680
  • [23] Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach
    Walia, Gurjit Singh
    Aggarwal, Kartik
    Singh, Kuldeep
    Singh, Kunwar
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 54 - 66
  • [24] Multi-biometrics 2D and 3D ear recognition
    Yan, P
    Bowyer, KW
    AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 503 - 512
  • [25] Quality-Based Conditional Processing in Multi-Biometrics: Application to Sensor Interoperability
    Alonso-Fernandez, Fernando
    Fierrez, Julian
    Ramos, Daniel
    Gonzalez-Rodriguez, Joaquin
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (06): : 1168 - 1179
  • [26] Authentication services and biometrics: Network security issues
    Benavente, OS
    Picco-Marchetti, R
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 333 - 336
  • [27] Secured network authentication using biometrics application
    Laili, MHB
    Jamaludin, MZ
    Din, NM
    Said, NHM
    2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING, 2002, : 368 - 370
  • [28] Multimodal Biometrics Security System For Authentication
    Maheshwari, A.
    DoraiRangaswamy, M. A.
    2016 SECOND INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING AND MANAGEMENT (ICONSTEM), 2016, : 146 - 150
  • [29] Multi-Modal Biometrics for Mobile Authentication
    Aronowitz, Hagai
    Li, Min
    Toledo-Ronen, Orith
    Harary, Sivan
    Geva, Amir
    Ben-David, Shay
    Rendel, Asaf
    Hoory, Ron
    Ratha, Nalini
    Pankanti, Sharath
    Nahamoo, David
    2014 IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2014), 2014,
  • [30] Multi-biometrics Based Crypto-biometric Session Key Generation and Sharing Protocol
    Kanade, Sanjay
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    MM&SEC 11: PROCEEDINGS OF THE 2011 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2011, : 109 - 114