Extend Authentication Using Sensor Technique

نویسنده

  • Suresh Kumar Kashyap
چکیده

Purpose of this research paper is to identify a person through written handwriting authentication this thesis focuses on the written handwriting authentication. Biometry offers potential for automatic personal verification and differently from other means for personal verification; biometric means are not based on the possession of anything or the knowledge of some information. Of the various biometrics, handwritingbased verification has the advantage that handwriting analysis requires no invasive measurement and is widely accepted since handwriting has long been established as the most diffuse mean for personal verification in our daily life, including commerce applications, banking transactions, automatic fund transfers, etc. Keywords— Sensor, Biometrics, SVD, Data Gloves, Handwriting

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Orientation-Compensative Signal Registration for Owner Authentication Using an Accelerometer

Gait-based owner authentication using accelerometers has recently been extensively studied owing to the development of wearable electronic devices. An actual gait signal is always subject to change due to many factors including variation of sensor attachment. In this research, we tackle to the practical sensor-orientation inconsistency, for which signal sequences are captured at different senso...

متن کامل

Secure User Authentication and Data Transfer in Wireless Sensor Network Using Elliptical Curve Algorithm and Data Session Using MD5

Wireless sensor networks (WSN) are selfgoverning sensors that are widely distributed in the respective environment. They are also referred as wireless sensor and actuator networks (WSAN). They are used to observe physical or environmental conditions, for example, temperature, sound, natural activities etc. They collect data from each active node and pass it to the network to the centralized loc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012