Secured network authentication using biometrics application

被引:0
|
作者
Laili, MHB [1 ]
Jamaludin, MZ [1 ]
Din, NM [1 ]
Said, NHM [1 ]
机构
[1] Univ Tenaga Nas, Kajang 43009, Selangor DE, Malaysia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.
引用
收藏
页码:368 / 370
页数:3
相关论文
共 50 条
  • [41] Authentication of Facial Images with Masks Using Periocular Biometrics
    Han, Na Yeon
    Seong, Si Won
    Ryu, Jihye
    Hwang, Hyeonsang
    Joung, Jinoo
    Lee, Jeeghang
    Lee, Eui Chul
    [J]. INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2020, PT II, 2021, 12616 : 326 - 334
  • [42] Continuous authentication on mobile devices using behavioral biometrics
    Dybczak, Jakub
    Nawrocki, Piotr
    [J]. 2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 1028 - 1035
  • [43] Geometric based remote password authentication using biometrics
    Om, Hari
    Reddy, M. Ramakrishna
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 207 - 220
  • [44] An Improved Authentication System Using Hybrid of Biometrics and Cryptography
    Oluwadamilola, Oyetola K.
    Ayodeji, Okubanjo A.
    Martins, Osifeko O.
    Olufunmi, Sanusi, I
    Rapheal, Abolade O.
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), 2017, : 457 - 463
  • [45] FKP Biometrics for Human Authentication Using Gabor Wavelets
    Hegde, Chetana
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. 2011 IEEE REGION 10 CONFERENCE TENCON 2011, 2011, : 1149 - 1153
  • [46] A Novel Architecture for Continuous Authentication using Behavioural Biometrics
    Oak, Rajvardhan
    Khare, Mrunmayec
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 767 - 771
  • [47] Development of an Enhanced Secured Authentication and Key Agreement Procedure for UMTS Network
    Vali Mohamad, Noor Mohammed
    Lakshmanan, M.
    Palanivelan, M.
    Ella, Sai Giri
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 467 - 483
  • [48] Development of an Enhanced Secured Authentication and Key Agreement Procedure for UMTS Network
    Noor Mohammed Vali Mohamad
    M. Lakshmanan
    M. Palanivelan
    Sai Giri Ella
    [J]. Wireless Personal Communications, 2020, 110 : 467 - 483
  • [49] Privacy-preserving similarity evaluation and application to remote biometrics authentication
    Kikuchi, Hiroaki
    Nagai, Kei
    Ogata, Wakaha
    Nishigaki, Masakatsu
    [J]. SOFT COMPUTING, 2010, 14 (05) : 529 - 536
  • [50] Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
    Kikuchi, Hiroaki
    Nagai, Kei
    Ogata, Wakaha
    Nishigaki, Masakatsu
    [J]. MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2008, 5285 : 3 - +