Implementation of Biometric Techniques in Social Networking Sites

被引:0
作者
Sharma, Shilpi [1 ]
Sodhi, J. S. [2 ]
机构
[1] Amity Univ Noida, ASET, Comp Sci & Engn Dept, Noida, India
[2] Amity Univ, AKC Data Syst, Noida, India
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 06期
关键词
biological characteristics; authentication; encryption; privacy; Social Networking Sites; BioCrytoSystems;
D O I
10.14257/ijsia.2014.8.6.05
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of technologyprivacy threats arise while establishing communication in social networking sites. For the developers of authentication systems user's privacy and authentication have evolved as a major problem and area of concern. This research is based on an attempt to discuss the implementation of different biometric verification techniques in order to perform the authentication of users in social networking sites. It decreases the chances of illegal impersonation thus enhancing the privacy of an individual's personal data. The prime objective of this paper is to provide a new revolution in social networking sites by suggesting remedial measures for the security threats faced in the sites such as Facebook, MySpace, Twitter, Hi5, LinkedIn, Orkut, Tumbler, Flikeretc so that the goal of communication can be achieved without any security threat in mind. Application of securedbiometricsenables confirmation of personal detailsfor establishing the identity of an individual.
引用
收藏
页码:51 / 60
页数:10
相关论文
共 18 条
[1]  
Bala B.K., 2014, EUROPEAN J ACAD ESSA, V1, P6
[2]  
Feng Y., 2008, SPIE DEF SEC S INT S
[3]  
Jain A. K., 2005, INT SERIES ENG COMPU, V479
[4]   Biometrics: A grand challenge [J].
Jain, AK ;
Pankanti, S ;
Prabhakar, S ;
Hong, L ;
Ross, A .
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 2, 2004, :935-942
[5]   An introduction to biometric recognition [J].
Jain, AK ;
Ross, A ;
Prabhakar, S .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :4-20
[6]  
Klein D. V., 1990, USENIX Workshop Proceedings. UNIX Security II, P5
[7]  
Maio D, 2005, BIOMETRIC SYSTEMS TE
[8]  
Maltoni D., 2003, HDB FINGERPRINT RECO, P1388
[9]  
Pentina I., 2016, J MARKET COMMUN, V22, P36, DOI [10.1080/13527266.2013.841273, DOI 10.1080/13527266.2013.841273]
[10]   An introduction to evaluating biometric systems [J].
Phillips, PJ ;
Martin, A ;
Wilson, CL ;
Przybocki, M .
COMPUTER, 2000, 33 (02) :56-+