Secured network authentication using biometrics application

被引:0
|
作者
Laili, MHB [1 ]
Jamaludin, MZ [1 ]
Din, NM [1 ]
Said, NHM [1 ]
机构
[1] Univ Tenaga Nas, Kajang 43009, Selangor DE, Malaysia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.
引用
收藏
页码:368 / 370
页数:3
相关论文
共 50 条
  • [21] Activity related authentication using prehension biometrics
    Drosou, Anastasios
    Ioannidis, Dimosthenis
    Tzovaras, Dimitrios
    Moustakas, Konstantinos
    Petrou, Maria
    PATTERN RECOGNITION, 2015, 48 (05) : 1743 - 1759
  • [22] Authentication Using Pulse-Response Biometrics
    Martinovic, Ivan
    Rasmussen, Kasper
    Roeschlin, Marc
    Tsudik, Gene
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 108 - 115
  • [23] Cloud Computing Authentication using Cancellable Biometrics
    Soyjaudah, Krishnaraj Madhavjee Sunjiv
    Ramsawock, Gianeswar
    Khodabacchus, Muhammad Yaasir
    AFRICON, 2013, 2013, : 533 - 536
  • [24] Secured Authentication Using Image Shield Protection
    Matheswaran, P.
    Priyadharshini, H.
    Shalini, R.
    Thilagavathi, M.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 269 - 274
  • [25] Secured SAML Cloud Authentication using Fingerprint
    Khodabacchus, Muhammad Yaasir
    Soyjaudah, Krishnaraj Madhavjee Sunjiv
    Ramsawock, Gianeshwar
    2017 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING APPLICATIONS (NEXTCOMP), 2017, : 151 - 156
  • [26] Human Authentication Using Face and Fingerprint Biometrics
    Darwish, Ashraf A.
    Zaki, Walaa M.
    Saad, Omar M.
    Nassar, Nadia M.
    Schaefer, Gerald
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 274 - 278
  • [27] Architecture for synchronous multiparty authentication using biometrics
    Noronha, SJ
    Dorai, C
    Ratha, NK
    Bolle, RM
    AUDIO-BASED AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 2688 : 609 - 616
  • [28] Smartphone Authentication System Using Periocular Biometrics
    Raja, Kiran B.
    Raghavendra, R.
    Stokkenes, Martin
    Busch, Christoph
    2014 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2014,
  • [29] Authentication Using Pulse-Response Biometrics
    Rasmussen, Kasper B.
    Roeschlin, Marc
    Martinovic, Ivan
    Tsudik, Gene
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [30] A Robust Authentication System Using Multiple Biometrics
    Monwar, Md. Maruf
    Gavrilova, Marina
    COMPUTER AND INFORMATION SCIENCE, 2008, 131 : 189 - 201