The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometric R&D has to deal with personal data. From the Universal Declaration of Human Rights, privacy of a human being shall be protected, and this is addressed in different forms in each region of the world. In the case of the European Union, Data Protection Directives, Laws and Regulation have been established, and interpreted in different ways by each European Member State. Such a diversity...
Biometrics based authentication systems face the major challenge in securing the template. Although multi-modal biometric techniques and cryptographic techniques offer security but they can be easily compromised. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e. keeping it unimodal but still offering the same security as that of the combined...
Today, several institutions of higher learning are using access cards as access control measure to gain access to their institutions and facilities. Though, these cards are simple and convenient in terms of usage, they offer the lowest security strength as they are often prone to lost, theft, forget and clone. If compromised, valuable information and asset can be stolen or destroyed. However, every...
Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where the biometric matching takes place. However, it is challenging to implement an accurate fingerprint MoC algorithm, which can execute in a short period of...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. The fuzzy vault scheme provides supreme security to the templates which are stored in a database or smart card. Compared to an ordinary system which...
Democracy is vital and powerful political source in major countries and for the established and development of democracy, elections are being practiced. Pakistan is a democratic country and still practicing the manual and expensive methods for election. That causes slow procedure, bogus entries, counting errors, misuse of ballot papers, and serious security, accessibility, and reliability faults....
Nowadays, when someone wants to make a payment with a smartcard, the user has to enter a pin code to be identified. Only biometrics is able to authenticate a user; yet biometric information is sensitive. To ensure the security and privacy of biometric data, OCC (On-Card-Comparison) has been proposed. This approach consists in storing biometric data in a secure zone on a smartcard and computing the...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. Most of the existing algorithms needs query fingerprint image used during vault decoding to be aligned with the enrolment fingerprint image used in...
Biometrics are used for security purpose. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But it can be affected by several attacks. The type 1 attack is performed at the sensor level. Differentiating a genuine biometric...
The growing direct or spoofing fraudulent attacks of thieves has motivated us to focus our prime concern on the security over money transaction. The accuracy of biometrics in identification is increasing its usage extensively. The method proposed in this paper focuses on how the money transaction in an ATM machine will be secured by providing personal identification by analyzing biometrics like fingerprints...
Biometrics are used for authentication. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But It can be affected by several attacks. In this paper the type 1 attack is discussed which is performed at the sensor level. Differentiating...
With the development of various services through the Web and especially with the emergence of electronic commerce, all suppliers of products and services are providing considerable efforts to secure against all possible fraudulent intrusions. It appears that biometrics is the only method that can satisfy the requirements of remote identity in terms of relevance and reliability. In this paper, we propose...
In a spoofing attack, an impostor masquerades as a legitimate user by replicating that user's biometrics. Although methods exist to determine whether a live person or biometric artifact is in front of a biometric sensor, spoofing attacks remain a problem.
Biometric system is a security model which could not be easily cracked or penetrated as compared to the traditional methods like password, ID card to get information. Trait information storage of a particular person in the database makes it vulnerable to template database attack. Fuzzy vault is a popular biometric cryptosystem technique that provides security to the biometric templates. The challenge...
Biometric recognition has undoubtedly made great strides over the past 50 years. To ensure that current academic research in biometrics has a positive impact on future technological developments, this paper documents some guidelines encouraging researchers to focus on high-impact problems, develop solutions that are practically viable, report results using sound experimental and evaluation protocols,...
In most human surveillance and forensic applications, key requirement is often to achieve highest possible true positive identification accuracy with a judicious compromise in accepting false positive identities. However with such scenario's in mind, there has been lack of any effort to develop adaptive security management for open set biometric recognition and most of the available prior work in...
Biometrics is the ID of humans utilizing intrinsic physical, biological, otherwise activity features, traits, or habits. Biometrics has the potential to provide this desired ability to clearly and discretely determine a person's identity with additional accuracy and security. Biometric systems primarily based on individual antecedent of advice which is referred as unimodal frameworks. Even though...
Lack of the capability of cancellability in a biometric cryptosystem makes it impossible to be deployed broadly in real applications. This is because the compromise of a template in one application often means its loss in all other applications. To solve this problem, we equip a minutiae-based fuzzy vault with cancellability by applying a polar transformation to each Delaunay triangle group so as...
The purpose of developing a biometric identification system is to identify an individual quickly and accurately based on his physiological or behavioral characteristics. The system should ensure that only a person, whose biometric data is there in the database, is accepted. In order to satisfy these requirements, the system should give a false acceptance rate (FAR) approximately equal to zero and...
Biometric based authentication can provide strong security for identifying the users. In addition, the security of biometric data is important, because most biometric data is not changeable in a lifetime. However, cancellable biometrics can stores a non-invertible transformed version of the biometric data. Namely, the biometric data is safely remained even if the storage is compromised. The cryptographic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.