Search results

1 – 10 of 118
To view the access options for this content please click here
Article

P.K. Janbandhu and M.Y. Siyal

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…

Abstract

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object. This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. It also suggests two schemes for biometric signature using two existing and widely used digital signature algorithms, RSA and DSA, and discusses the problems associated with them individually. Speed of both schemes (based on iris recognition) is measured and compared with the help of JAVA implementation for both approaches.

Details

Information Management & Computer Security, vol. 9 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Abstract

Details

Sensor Review, vol. 24 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article

Yingzi Eliza Du

To overview the iris cameras, iris recognition systems, and their applications.

Abstract

Purpose

To overview the iris cameras, iris recognition systems, and their applications.

Design/methodology/approach

Introduced and examined commercially available or lab prototype iris cameras and systems to compare their functionalities and applications.

Findings

Each kind of camera has its advantage and disadvantage. From the application view, each iris recognition system has its unique values.

Originality/value

This paper offers latest updates and essential information on iris recognition cameras and systems. It can benefit busy engineers, researchers, and managers who are interested in biometrics, security, and new technologies.

Details

Sensor Review, vol. 26 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article

Juline E. Mills, Matthew Meyers and Sookeun Byun

The purpose of this paper is to review viable biometric technologies and examine their applicability in the hospitality and tourism businesses.

Abstract

Purpose

The purpose of this paper is to review viable biometric technologies and examine their applicability in the hospitality and tourism businesses.

Design/methodology/approach

First, the different types of biometrics in the market with their advantages and disadvantages are reviewed, followed by a discussion of current applications within the hospitality and tourism sector.

Findings

Potential business impacts of biometrics are identified such as increased consumer convenience, operational efficiency, and security. Meanwhile, despite its great benefits, consumers' privacy concerns that are raised during biometric data collection and management processes may keep the technology from realizing its full potential.

Research limitations/implications

The paper only presents a glimpse of what may be done with the technology, as the potential extent of its usage is bound only by management's imagination while the possibilities that the technology brings to industry may be numerous.

Practical implications

Hospitality and tourism companies must have clear goals and logical approaches for usage and implementation of biometric technologies. They also need to be acutely aware of any privacy, guest perceptions, attitude towards, and trust factors that may surround the usage of biometric technologies. Moreover, corporate responsibility and ethical usage of the information obtained from biometrics may influence guest willingness to use the technology.

Originality/value

The paper has value in that there has been a lack of research on the impact of biometrics on the service industry, as well as user concerns towards the technology, rather than system development.

Details

Journal of Hospitality and Tourism Technology, vol. 1 no. 3
Type: Research Article
ISSN: 1757-9880

Keywords

To view the access options for this content please click here
Article

Christine Connolly

To study the mathematical image coding approaches used in two types of biometric systems, and the physical nature of those biometrics.

Abstract

Purpose

To study the mathematical image coding approaches used in two types of biometric systems, and the physical nature of those biometrics.

Design/methodology/approach

Gives details of algorithms used to encode data from images in established and new automatic iris recognition systems. Then examines face recognition techniques based on geometry, texture and three‐dimensional data.

Findings

Most commercial iris recognition systems are based on the algorithms developed by one man, John Daugman. Whilst iris systems can be used to check a person's identity against a large database of enrolled people, face recognition systems are currently only capable of use in one‐to‐one recognition mode, or in identification mode against a very small database. The iris is very distinctive and stable over time, but the face is much more variable and therefore difficult to identify with accuracy.

Originality/value

Provides the general scientific reader with some insight into the specialised field of biometric recognition.

Details

Sensor Review, vol. 26 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article

V. Zorkadis and P. Donos

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic…

Abstract

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article

Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication…

Abstract

Purpose

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.

Design/methodology/approach

By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.

Findings

The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.

Research limitations/implications

The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.

Originality/value

The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article

Naveed Riaz, Ayesha Riaz and Sajid Ali Khan

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and…

Abstract

Purpose

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.

Design/methodology/approach

In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.

Findings

Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.

Originality/value

This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.

Details

Sensor Review, vol. 38 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article

Ashish Chandra, Roger Durand and Samantha Weaver

The purpose of this paper is to provide an understanding of the utilization, attitudes, and concerns of health care consumers and providers about biometrics.

Abstract

Purpose

The purpose of this paper is to provide an understanding of the utilization, attitudes, and concerns of health care consumers and providers about biometrics.

Design/methodology/approach

Data were analyzed from a survey of 324 adult subjects, including 167 “health care consumers” and 157 “healthcare providers.”

Findings

Health care providers were found more accepting of biometric technologies than consumers, a finding that seems to follow from more familiarity and experience with those technologies. Feelings about the potential uses and limitations of biometrics were found to be more differentiated among providers than consumers. Yet, concerns about privacy and the need for information limits were identifiable as important feelings among providers and consumers alike. Finally, demographic characteristics only weakly to modestly distinguished concerns about privacy and confidentiality among health care consumers and providers.

Research limitations/implications

The findings reported here suggest the need for additional research into the types of biometrics adopted in diverse health care settings and into the nature of innovators or early adopters.

Practical implications

If biometrics is to gain acceptance, there seems to be a need for different promotion strategies for providers and consumers. Also, concerns for personal privacy will need to be considered.

Originality/value

This paper fills an important gap in understanding the uses, feelings, and concerns about biometrics among health care consumers and providers.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 2 no. 1
Type: Research Article
ISSN: 1750-6123

Keywords

To view the access options for this content please click here
Article

Norman Desmarais

Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating…

Abstract

Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public‐key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations.

Details

Library Hi Tech, vol. 18 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 118