Secured Remote Control Room using Biometric System
نویسندگان
چکیده
منابع مشابه
Multimodal Biometric - based Secured Authentication System using Steganography
Problem statement: The main challenge in the design of a security system for high security mobile ad OC network is how to prevent the attacks against data modification and authentication. Approach: In this novel proposed system the messages communicated between the users are encrypted by the cancellable cryptographic key generated from fingerprint features of the receiver by applying genetic op...
متن کاملSecured remote health monitoring system
Wireless medical sensor network is used in healthcare applications that have the collections of biosensors connected to a human body or emergency care unit to monitor the patient's physiological vital status. The real-time medical data collected using wearable medical sensors are transmitted to a diagnostic centre. The data generated from the sensors are aggregated at this centre and transmitte...
متن کاملSecured Electronic Voting Protocol Using Biometric Authentication
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...
متن کاملSecured Biometric Authentication using Visual Cryptography and Transforms
Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is...
متن کاملSecure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed; and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public informati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2020
ISSN: 2321-9653
DOI: 10.22214/ijraset.2020.4067