Secured network authentication using biometrics application

被引:0
|
作者
Laili, MHB [1 ]
Jamaludin, MZ [1 ]
Din, NM [1 ]
Said, NHM [1 ]
机构
[1] Univ Tenaga Nas, Kajang 43009, Selangor DE, Malaysia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.
引用
收藏
页码:368 / 370
页数:3
相关论文
共 50 条
  • [1] Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics
    Macek, Nemanja
    Adamovic, Sasa
    Milosavljevic, Milan
    Jovanovic, Milos
    Gnjatovic, Milan
    Trenkic, Branimir
    [J]. ACTA POLYTECHNICA HUNGARICA, 2019, 16 (01) : 45 - 62
  • [2] Design and Analysis of Secured, Revocable Iris based Biometrics Authentication System
    Supriya, V. G.
    Manjunatha, Ramachandra
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 314 - 319
  • [3] "Biometrics - Iris Recognition System" A Study of Promising Approaches for Secured Authentication
    Solanke, Sarika B.
    Deshrnukh, Ratnadeep R.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 811 - 814
  • [4] Privacy preserving, real-time and location secured biometrics for mCommerce authentication
    Kuseler, Torben
    Al-Assam, Hisham
    Jassim, Sabah A.
    Lami, Ihsan A.
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2011, 2011, 8063
  • [5] SECURED AND TRANSPARENT VOTING SYSTEM USING BIOMETRICS
    Lakshmi, Jaya
    Kalpana, S.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 343 - 350
  • [6] A Secured Model for trusted communication in Network using ZERO INTERACTION AUTHENTICATION
    Pugazendi, R.
    Jayabalan, E.
    Duraiswamy, K.
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY, 2008, : 374 - +
  • [7] Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach
    Marcos Faundez-Zanuy
    David A. Elizondo
    Miguel-Ángel Ferrer-Ballester
    Carlos M. Travieso-González
    [J]. Neural Processing Letters, 2007, 26 : 201 - 216
  • [8] Authentication of individuals using hand geometry biometrics:: A neural network approach
    Faundez-Zanuy, Marcos
    Elizondo, David A.
    Ferrer-Ballester, Miguel-Angel
    Travieso-Gonzalez, Carlos M.
    [J]. NEURAL PROCESSING LETTERS, 2007, 26 (03) : 201 - 216
  • [9] Authentication services and biometrics: Network security issues
    Benavente, OS
    Picco-Marchetti, R
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 333 - 336
  • [10] A network authentication system with multi-biometrics
    Seno, S
    Sadakane, T
    Baba, Y
    Shikama, T
    Koui, Y
    Nakaya, N
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 914 - 918