نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

2015
Christina-Angeliki Toli Bart Preneel

This research is focused on giving a comprehensive overview of the secure biometric systems field, analysing it from privacy enhancing technology (PET) perspective. The widespread use of biometric systems, the nature of the shared data, the kinds of use cases and the applications introduce privacy risks. Along these line, we are trying to respond to the matters of: “Can really biometrics be cha...

2010
N. Radha S. Karthikeyan

The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to ...

2010
Anil K. Jain Ajay Kumar

Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a perso...

2012
Sonu Agrawal Sushil Kumar Sangeeta Agrawal

Events, such as major attacks, exposed weakness in most sophisticated security systems. Various supervision agencies are now more motivated to improve security data based on body or behavioral uniqueness, often called biometrics. Pin or password-based authentication procedures are too easy to crack. Face recognition is non-intrusive since it is based on images recorded by a distant camera, and ...

Journal: :Journal of Research and Practice in Information Technology 2008
Vijayakrishnan Pasupathinathan Josef Pieprzyk Huaxiong Wang

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal fo...

2013
Renu Bhatia

Biometrics is a growing technology, which has been widely used in forensics, secured access and prison security. A biometric system is fundamentally a pattern recognition system that recognizes a person by determining the authentication by using his different biological features i.e. Fingerprint, retina-scan, iris scan, hand geometry, and face recognition are leading physiological biometrics an...

2005
Emin Martinian Sergey Yekhanin Jonathan Yedidia Jonathan S. Yedidia

We consider the secure biometric storage problem and develop a solution using syndrome codes. Specifically, biometrics such as fingerprints, irises, and faces are often used for authentication, access control, and encryption instead of passwords. While it is well known that passwords should never be stored in the clear, current systems often store biometrics in the clear and are easily compromi...

2013
Lex Fridman Ariel Stolerman Sayandeep Acharya Patrick Brennan Patrick Juola Rachel Greenstadt Moshe Kam

I dentity verification for access control presents a trade-off between maximizing the probability of intruder detection and minimizing the cost for the legitimate user in terms of distractions and hardware requirements. In recent years, researchers have extensively explored behavioral biometric systems to address this challenge. 1 These systems rely on input devices, such as the keyboard and mo...

2015
Mikhail Gofman Sinjini Mitra Kevin Cheng Nicholas Smith

Biometric authentication is a promising approach to access control in consumer mobile devices. Most current mobile biometric authentication techniques, however, authenticate people based on a single biometric modality (e.g., iPhone 6 uses only fingerprints), which limits resistance to trait spoofing attacks and ability to accurately identify users under uncontrolled conditions in which mobile d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید