scholarly journals A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

2009 ◽  
Vol 5 (2) ◽  
pp. 105-124 ◽  
Author(s):  
V. Conti ◽  
C. Militello ◽  
F. Sorbello ◽  
S. Vitabile

The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae) and fingerprint macro features (singularity points) for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys), are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.

2014 ◽  
Vol 931-932 ◽  
pp. 1437-1440
Author(s):  
Anongporn Salaiwarakul

The secure remote biometric authentication protocol proposed in this paper solves the problem from the nature of the biometric data. The proposed protocol preserves the privacy of the users biometric data when it is transmitted in the protocol. The liveness property of the protocol guarantees that the biometric data used to authenticate the user comes from the live presentation of the user. The most important property related with the intentional authentication; it confirms that the purpose of the user authentication correspondences to the users purpose. The proposed secure remote biometric authentication protocol promises three properties so that the user is confident with the security level that the protocol offers and it guarantees that the protocol does not manipulate with an intruder.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1819
Author(s):  
Rasa Bruzgiene ◽  
Konstantinas Jurgilas

Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.


Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 910
Author(s):  
Tong-Yuen Chai ◽  
Bok-Min Goi ◽  
Wun-She Yap

Biometric template protection (BTP) schemes are implemented to increase public confidence in biometric systems regarding data privacy and security in recent years. The introduction of BTP has naturally incurred loss of information for security, which leads to performance degradation at the matching stage. Although efforts are shown in the extended work of some iris BTP schemes to improve their recognition performance, there is still a lack of a generalized solution for this problem. In this paper, a trainable approach that requires no further modification on the protected iris biometric templates has been proposed. This approach consists of two strategies to generate a confidence matrix to reduce the performance degradation of iris BTP schemes. The proposed binary confidence matrix showed better performance in noisy iris data, whereas the probability confidence matrix showed better performance in iris databases with better image quality. In addition, our proposed scheme has also taken into consideration the potential effects in recognition performance, which are caused by the database-associated noise masks and the variation in biometric data types produced by different iris BTP schemes. The proposed scheme has reported remarkable improvement in our experiments with various publicly available iris research databases being tested.


2019 ◽  
Vol 2019 ◽  
Author(s):  
Job Mwaura

In the past few years, Kenya’s digital landscape has transformed and this has been made possible by proliferation of the usage of digital technologies, particularly - mobile phones. Due to increased access to digital technologies, faster internet speeds, increased securitization among other issues, data on individuals in online spaces has also increased. Recently, the government rolled out a National Integrated Identity Management System (NIIMS) which is meant to capture biometric data but this has generated a huge debate online in Kenya under the hashtag #ResistHudumaNamba. This paper will therefore examine the following issues: What has contributed to the decline of trust between the government and its citizens when it comes to internet technologies? What are the actual sentiments given for and against in the introduction of Huduma Number? What are the underlying reasons for continued registration of individuals in Kenya? This research will be a qualitative research study. Data will be generated from social media sites (Twitter and Facebook), as well as blog posts and newspaper articles. A discourse analysis of the events around #ResistsHudumaNamba in these sources will be done so as to answer the research questions. This research has the potential to contribute to literature on trust in sub-Saharan Africa as well as establish trust issues between government and citizens when digital technologies are involved.


2016 ◽  
Vol 2 (6) ◽  
Author(s):  
PANKAJ ,

Multimodal biometric innovation in light of unique mark and finger knuckle has pulled in footing among scientists as of late. Despite the fact that Uni-modular framework offers many focal points, it has certain intrinsic shortcomings which deny it of the appeal. Uni-modular unique finger impression biometric frameworks performed singular acknowledgment in light of a particular wellspring of biometric data. However the match score esteem must be enhanced by working with low quality little closer view zone biometric pictures. In fact, the confirmation forms delivered by Finger Knuckle Print (FKP) brings about higher relative changes. The distortions between FKP pictures of same finger are of higher extent. The unimodal biometric check framework frequently gets influenced after accomplishing higher match score esteem. Besides, bimodal check framework does not accomplish higher security level which prompts to lesser combination score esteem. To diminish relative change on multimodal biometric framework, NonFracture based Fingerprint and Finger-Knuckle print Biometric Score Fusion (NFF-BSF) component is proposed in this paper. At first, particular estimation of match score is measured utilizing multimodal fitting coarse grained dissemination work. Multimodal fitting coarse grained dissemination capacity is utilized to work with low quality petite frontal area biometric pictures that accomplish high fitting score on the test and preparing biometric pictures. Also, Non-Fracture misshapening handling is completed in NFF-BSF instrument to diminish the adjustment fit as a fiddle of protest by utilizing bend length on biometric picture surfaces. At last, a coordinating technique in NFF-BSF instrument is utilized to decrease the relative changes. Thus, the relative changes on multimodal biometric framework expands the match score combination esteem. Investigation is directed on variables, for example, certifiable acknowledgment rate, coordinating score combination level and blunder rate on multimodal coordinating


Author(s):  
David Zhang ◽  
Fengxi Song ◽  
Yong Xu ◽  
Zhizhen Liang

A biometric system can be regarded as a pattern recognition system. In this chapter, we discuss two advanced pattern recognition technologies for biometric recognition, biometric data discrimination and multi-biometrics, to enhance the recognition performance of biometric systems. In Section 1.1, we discuss the necessity, importance, and applications of biometric recognition technology. A brief introduction of main biometric recognition technologies are presented in Section 1.2. In Section 1.3, we describe two advanced biometric recognition technologies, biometric data discrimination and multi-biometric technologies. Section 1.4 outlines the history of related work and highlights the content of each chapter of this book.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2985 ◽  
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
Jiankun Hu ◽  
Ahmed Ibrahim ◽  
Guanglou Zheng ◽  
...  

Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.


2017 ◽  
Vol 2017 ◽  
pp. 1-17 ◽  
Author(s):  
Mun-Kyu Lee ◽  
Jin Yoo ◽  
Hyeonjin Nam

User authentication is a process in which a user of a system proves his/her identity to acquire access permission. An effective user authentication method should be both secure and usable. In an attempt to achieve these two objectives, Bianchi et al. recently proposed novel unimodal PIN-entry methods that use either audio or vibration cues. This paper analyzes the security of their method, in particular, the vibration version of one of their proposals, Timelock. A probabilistic analysis and real attack experiment reveal that the security level guaranteed by Timelock is lower than that claimed in Bianchi et al.’s paper. As countermeasures to this problem, three PIN-entry methods are proposed and a usability study is performed. According to the result of this study, a simple modification may improve the security significantly while retaining the design philosophy of unimodal systems. In addition, the proposed methods address the PIN compatibility issue of Timelock and they can be used to enter a legacy numerical PIN without any change in the PIN.


Sign in / Sign up

Export Citation Format

Share Document