Secured network authentication using biometrics application

被引:0
|
作者
Laili, MHB [1 ]
Jamaludin, MZ [1 ]
Din, NM [1 ]
Said, NHM [1 ]
机构
[1] Univ Tenaga Nas, Kajang 43009, Selangor DE, Malaysia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.
引用
收藏
页码:368 / 370
页数:3
相关论文
共 50 条
  • [31] Authentication of Smartphone Users Using Behavioral Biometrics
    Alzubaidi, Abdulaziz
    Kalita, Jugal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1998 - 2026
  • [32] Continuous authentication using biometrics: An advanced review
    Dahia, Gabriel
    Jesus, Leone
    Pamplona Segundo, Mauricio
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 10 (04)
  • [33] Ear Acoustic Biometrics Using Inaudible Signals and Its Application to Continuous User Authentication
    Mahto, Shivangi
    Arakawa, Takayuki
    Koshinaka, Takafumi
    [J]. 2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 1407 - 1411
  • [34] Secured and flexible user authentication protocol for wireless sensor network
    Prabu, P.
    Senthilnathan, T.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2020, 8 (04) : 253 - 265
  • [35] SECURE AND EFFICIENT TRANSMISSION IN WIRELESS NETWORK USING KEY AUTHENTICATION BASED SECURED MULTICASTING TECHNIQUE
    Gopalakrishnan, S.
    GaneshKumar, P.
    [J]. ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [36] DAKOTA: Continuous Authentication with Behavioral Biometrics in a Mobile Banking Application
    Barlas, Yunus
    Basar, Okan Engin
    Akan, Yasemin
    Isbilen, Mustafa
    Alptekin, Gulfem Isiklar
    Incel, Ozlem Durmaz
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 298 - 303
  • [37] Context Independent Continuous Authentication using Behavioural Biometrics
    Mondal, Soumik
    Bours, Patrick
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY AND BEHAVIOR ANALYSIS (ISBA), 2015,
  • [38] An Approach for Secure Identification and Authentication for Biometrics using Iris
    Patil, Chandrashekar M.
    Gowda, Sushmitha
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 421 - 424
  • [39] Behavioral Biometrics Authentication Using Gesture-Based
    Alariki, Ala Abdulhakim
    Manaf, Azizah Abdul
    [J]. ADVANCED SCIENCE LETTERS, 2014, 20 (02) : 492 - 495
  • [40] Behavioural biometrics authentication tested using EyeWriter technology
    Tait, Bobby L.
    [J]. PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, : 105 - 113