A Secured Fingerprint Authentication System
نویسندگان
چکیده
منابع مشابه
Wavelet Based Fingerprint Authentication System: a Review
Biometric recognition refers to the use of biological characteristics for identification and verification of individuals. Use of biometric is increasing nowadays because biometric characteristics are difficult to replicate and lifelong. Applications which require only the authorized persons to access the resources are information systems, National id systems, voter and driver registrations, doc...
متن کاملSecured Authentication Protocol System Using Images
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...
متن کاملA Secured Mutual Authentication Protocol For RFID System
Contactless automatic RFID system is intended to replace existing barcode scheme, since it has the capability of reading huge amount of data from many tags simultaneously in a respective range. Whereas, an RFID system is consist of a database server connected with many readers through wired communication and readers to tags are mostly wireless communication. This wireless connection in between ...
متن کاملFingerprint Based Biometric ATM Authentication System
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In t...
متن کاملBiometric-PKI Authentication System Using Fingerprint Minutiae
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Applied Sciences
سال: 2008
ISSN: 1812-5654
DOI: 10.3923/jas.2008.2939.2948