Foolproof Security for KeyStrokeBiometrics

نویسندگان

  • M. IndraSena Reddy
  • K. Subba Reddy
  • V. Uday Kumar
چکیده

Now-a-days we are facing the majority of crimes related to security issues and these areas due to the leakage of passwords or illegal authentication. At one end, there is a continuous and tremendous improvement in the lifestyle of Humans while at the other end; the technological crimes are increasing rapidly. As there is a problem, there must be a solution. The need for a compromising technology which can be adopted is highly imperative. Technologies capable of identifying each person uniquely need to be developed. The only powerful solution for the problem of illegal authentication is Biometrics. This paper provides an overall idea of Biometrics , the typical Biometric Model, an overview of the Biometric techniques and focuses mainly on Keystroke Biometrics which is easy to implement and can provide fool proof security based on the effectiveness of the algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FoolProof: A Component Toolkit for Abstract Syntax with Variable Bindings

FOOLPROOF is intended as a component toolkit for implementation of formal languages with binding structures. It provides a coherent collection of components for many common language processing tasks, in particular those related to binding structures. FOOLPROOF consists of: a meta-language for specifying signatures with variable bindings; a signature editor for constructing well-formed signature...

متن کامل

Enhancing Security of Stored Biometric Template in Cloud Computing Using Fec

Cloud computing is an emerging technology, where services get utilized instead of owning it. It has grown out of an amalgamation of technologies, including service oriented architecture, virtualization, Web 2.0, and utility computing. Most security problems associated with cloud computing which are viewed as problems cast stem from Loss of control, Lack of trust (mechanisms) and Multi-tenancy. ...

متن کامل

A foolproof method for phase transfer of metal nanoparticles via centrifugation.

Our new approach using centrifugal force provides a simple and foolproof method for the phase transfer of metal nanoparticles to organic solvents. The centrifugation following functionalization by thiol-containing molecules on the metal nanoparticles in water pushed the metal nanoparticles down to the chloroform compulsorily.

متن کامل

Enhanced ATM Security with PII Using Otpip Algorithm

Biometric verification system is the crux of almost every security mechanism these days and failure of a biometric system can lead to grievous issues. The objective of this study is to identify the consequences when biometric verification fails during ATM transaction and hence suggest a novel enhancement mechanism for it. The security of ATM transactions can be further strengthened using the PI...

متن کامل

Failure of a “foolproof” pin-index medical pipeline system

Background The pin-index medical gas pipeline system, which complies with Japan Industrial Standard (JIS), is considered to be "foolproof" and is widely used in Japan to avoid medical gas misconnections. Case presentation The wall-mounted gas outlet used in our hospital (NSV outlet, CENTRAL UNI, Co., Ltd., Tokyo, Japan) contains multiple sockets, which connect to hoses with gas-specific pins....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013