Secured network authentication using biometrics application

被引:0
作者
Laili, MHB [1 ]
Jamaludin, MZ [1 ]
Din, NM [1 ]
Said, NHM [1 ]
机构
[1] Univ Tenaga Nas, Kajang 43009, Selangor DE, Malaysia
来源
2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING | 2002年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.
引用
收藏
页码:368 / 370
页数:3
相关论文
共 50 条
[41]   Behavioral Biometrics Authentication Using Gesture-Based [J].
Alariki, Ala Abdulhakim ;
Manaf, Azizah Abdul .
ADVANCED SCIENCE LETTERS, 2014, 20 (02) :492-495
[42]   Behavioural biometrics authentication tested using EyeWriter technology [J].
Tait, Bobby L. .
PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, :105-113
[43]   Geometric based remote password authentication using biometrics [J].
Om, Hari ;
Reddy, M. Ramakrishna .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5) :207-220
[44]   Continuous authentication on mobile devices using behavioral biometrics [J].
Dybczak, Jakub ;
Nawrocki, Piotr .
2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, :1028-1035
[45]   Authentication of Facial Images with Masks Using Periocular Biometrics [J].
Han, Na Yeon ;
Seong, Si Won ;
Ryu, Jihye ;
Hwang, Hyeonsang ;
Joung, Jinoo ;
Lee, Jeeghang ;
Lee, Eui Chul .
INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2020, PT II, 2021, 12616 :326-334
[46]   An Improved Authentication System Using Hybrid of Biometrics and Cryptography [J].
Oluwadamilola, Oyetola K. ;
Ayodeji, Okubanjo A. ;
Martins, Osifeko O. ;
Olufunmi, Sanusi, I ;
Rapheal, Abolade O. .
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), 2017, :457-463
[47]   A Novel Architecture for Continuous Authentication using Behavioural Biometrics [J].
Oak, Rajvardhan ;
Khare, Mrunmayec .
2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, :767-771
[48]   FKP Biometrics for Human Authentication Using Gabor Wavelets [J].
Hegde, Chetana ;
Shenoy, P. Deepa ;
Venugopal, K. R. ;
Patnaik, L. M. .
2011 IEEE REGION 10 CONFERENCE TENCON 2011, 2011, :1149-1153
[50]   Development of an Enhanced Secured Authentication and Key Agreement Procedure for UMTS Network [J].
Vali Mohamad, Noor Mohammed ;
Lakshmanan, M. ;
Palanivelan, M. ;
Ella, Sai Giri .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) :467-483