The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authentication is the procedure which permits a sender and receiver of data to validate each other. On the off chance that the sender and receiver of data can't legitimately confirm each other, there is no trust in the activity or data gave by either party. This paper talks about where and when can the service providers use the various authentication models adopted and the comparison between two authentication...
Recently under the lights of mega Indian Aadhaar [2] project, Indian government has been trying to initiate a robust linkage between several financial inclusion schemes (such as NREGA and MNREGA) and biometric based personal authentication mechanism. This will ensure a corruption free realization and management of such policies. Among commonly used biometric traits, fingerprint is the most accepted...
Developing a vision-based efficient and automatic pain intensity measurement system requires the understanding of the relationship between self-reported pain intensity and pain expression in the facial videos. In this paper, we first demonstrate how pain expression in facial video frames may not match with the self-reported score. This is because the pain and non-pain frames are not always visually...
Security verification relies on using direct tests manually prepared. Test preparation often requires intensive efforts from experts with in-depth domain knowledge. This work presents an approach to learn from direct tests written by an expert. After the learning, the learned model acts as a surrogate for the expert to produce new tests. The learning software comprises a database for accumulating...
Electronic voting is often seen as a tool for making the electoral process more efficient and for increasing trust in its management. It is a decision system which summarizes opinion of a large set of users. This work aims to create a decision system which can be customized for various applications. The goal of the decision system is to remain low cost and portable. While adhering to these goals,...
Password authentication systems can be used anywhere and at anytime where passwords are maintained in the central database. Systems are prone to attacks by intruders compromising the authentication. Password based authentication and key exchange protocols using a single server stores the sensitive user password where large user passwords are exposed. The proposed system is used to secure the system...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
The main aim of this paper is to provide multilevel authentication in biometric systems. Multimodal biometric is the usage of multiple biometric indicators by personal identification systems for identifying the individuals. Multimodal authentication provides more level of authentication than unimodal biometrics which uses only one biometric data such as fingerprint or face or palm print or iris. In...
The construction of university campus public information system is one of the basic units in the establishment of wisdom city, and it is the inevitable outcome of the information society evolved to the system integration stage. It provides a reasonable, efficient and humane modern quality service. This is conducive to the resources integration, sharing management and interactive applications, so as...
The Research paper deals with the fingerprint detection and Authentication using feature extraction based on minutiae. Several concepts of image processing like image enhancement, image segmentation, image binarization and morphology are used in it. Various algorithms are developed to complete the above-mentioned task and for minutiae matching. The calculations are equipped for discovering correspondences...
The security of digital information over the internet has gained prominence over the years due to the flourishing e-commerce. The traditional ways of personal identification like knowledge-based methods (i.e. passwords, ID cards) and token based methods no longer suffice the need of secure transmission of critical data online. To overcome this shortcoming, Biometrics can be used instead of passwords...
Face recognition has been gaining popularity for long time in various fields of human computer interaction. Moreover face recognition technique is widely used for automatic biometric security control, document verification, criminal investigation etc. In this paper we propose a new approach of using PCA based face recognition method for human verification. PCA based method seems to be interested due...
Today, several institutions of higher learning are using access cards as access control measure to gain access to their institutions and facilities. Though, these cards are simple and convenient in terms of usage, they offer the lowest security strength as they are often prone to lost, theft, forget and clone. If compromised, valuable information and asset can be stolen or destroyed. However, every...
The banking sector is a very important sector in our present day generation where almost every human has to deal with the bank either physically or online. In dealing with the banks, the customers and the banks face the chances of been trapped by fraudsters. Examples of fraud include insurance fraud, credit card fraud, accounting fraud, etc. Detection of fraudulent activity is thus critical to control...
This study examines the quality of the image in different irises during iris recognition. The main purpose of this study is to provide reliable evidence pertaining to the superiority of the iris to other biometrics particularly in the presence of noise coming with images captured by the iris. The study mainly used the iris database CASIA-IrisV3-interval as input. It also examined and applied iris...
As the cyber-attack trends are shifted from the volumetric attacks to the multi-layered attacks, it is more difficult for the IT administrators to find those attack attempts within their system and networks. However, vulnerability assessment is not easy due to the complex connections between multi-layered applications, servers, and networks. There are many security functionalities, but it is hard...
This paper discusses user behaviour and interactions for multimodal authentication system. Multimodal means, multiple authentication methods are provided for user to access a web application. The supported methods are password, digital certificate, and one-time password (OTP). Users are able to select any methods based on user's preference; personalizing authentication. Nevertheless, the availability...
Online banking is getting popularity due to location independence, 24/7 services and responsiveness. Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, Man-In-The-Middle (MITM) attack and the evolving sophistication of compromise techniques. One time password (OTP)...
A secure identification scheme for JPEG 2000 code-streams is proposed in this paper. The aim is to securely identify JPEG 2000 images generated from the same original image, without decoding images. Features used for the identification are extracted from header parts in a JPEG 2000 codestream. The proposed scheme does not provide any false negative matches under various compression ratios, while most...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.