Search results
1 – 10 of 48Abstract
Details
Keywords
To study the mathematical image coding approaches used in two types of biometric systems, and the physical nature of those biometrics.
Abstract
Purpose
To study the mathematical image coding approaches used in two types of biometric systems, and the physical nature of those biometrics.
Design/methodology/approach
Gives details of algorithms used to encode data from images in established and new automatic iris recognition systems. Then examines face recognition techniques based on geometry, texture and three‐dimensional data.
Findings
Most commercial iris recognition systems are based on the algorithms developed by one man, John Daugman. Whilst iris systems can be used to check a person's identity against a large database of enrolled people, face recognition systems are currently only capable of use in one‐to‐one recognition mode, or in identification mode against a very small database. The iris is very distinctive and stable over time, but the face is much more variable and therefore difficult to identify with accuracy.
Originality/value
Provides the general scientific reader with some insight into the specialised field of biometric recognition.
Details
Keywords
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating…
Abstract
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public‐key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations.
Details
Keywords
Ong Thian Song, Andrew Teoh Beng Jin and Tee Connie
This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.
Abstract
Purpose
This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.
Design/methodology/approach
Study the two existing directions of biometric‐based key generation approach based on the usability, security and accuracy aspects. Discuss the requisite unresolved issues related to this approach.
Findings
The proposed Fingerhashing approach transforms fingerprint into a binary discretized representation called Fingerhash. The Reed Solomon error correction method is used to stabilize the fluctuation in Fingerhash. The stabilized Fingerhash is then XORed with a biometric key. The key can only be released upon the XOR process with another Fingerhash derived from an authentic fingerprint. The proposed method could regenerate an error‐free biometric key based on an authentic fingerprint with up to 99.83 percent success rate, leading to promising result of FAR = 0 percent and FRR = 0.17 percent. Besides, the proposed method can produce biometric keys (1,150 bit length) which are longer in size than the other prevailing biometric key generation schemes to offer higher security protection to safeguard digital contents.
Originality/value
Outlines a novel solution to address the issues of usability, security and accuracy of biometric based key generation scheme.
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Gail E. Torbet, Ian M. Marshall and Steve Jones
Explores the potential use of behavioural and physiologicalbiometric techniques in the battle against credit card fraud in theretail environment. Discusses automatic speaker and…
Abstract
Explores the potential use of behavioural and physiological biometric techniques in the battle against credit card fraud in the retail environment. Discusses automatic speaker and dynamic signature verification, fingerprint and facial recognition, retinal and iris scanning, and hand and finger geometry. The requirement for recognition performance, speed of use, usability and customer acceptance, device and card cost are considered, along with industry standards for biometric devices.
Details
Keywords
To devise a biometric‐based mechanism for enhancing security of private keys used in cryptographic applications.
Abstract
Purpose
To devise a biometric‐based mechanism for enhancing security of private keys used in cryptographic applications.
Design/methodology/approach
To enhance security of a private key, we propose a scheme that regenerates a user's private key by taking a genuine user's password, fingerprint and a valid smart card. Our scheme uses features extracted from fingerprint along with public key cryptography, cryptographic hash functions and Shamir secret sharing scheme in a novel way to achieve our desired objectives.
Findings
Despite changes in the fingerprint pattern each time it is presented, our scheme is sufficiently robust to regenerate a constant private key. As compared to conventional methods of storing a private key merely by password‐based encryption, our scheme offers more security as it requires a genuine user's password, fingerprint and a valid smart card. Key lengths up to 1024‐bit or even higher can be regenerated making the scheme compatible with the current security requirements of public key cryptosystems.
Research limitations/implications
Minutia points used for image alignment can be incorporated in the key regeneration algorithm for stronger user authentication. In this case, some alternative technique will be required for image alignment.
Practical implications
The robustness of our scheme depicts its use in practical systems where there are variations in fingerprint patterns because of sensor noise and alignment issues.
Originality/value
In this paper, we have demonstrated a novel idea of regenerating the private key of a user by using fingerprint, password and a smart card. The basic aim is to provide more security to key storage as compared to traditional methods that uses password‐based encryption for secure storage of private keys.
Details
Keywords
Abstract
Details
Keywords
In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user…
Abstract
Purpose
In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.
Design/methodology/approach
In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.
Findings
Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.
Originality/value
The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.
Details