The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although iris is known as the most accurate and face as the most accepted in biometrics, these distinct modalities encounter variability in data in real-world applications. Such limitation can be overcome by a multimodal system based on both traits. Additionally, by conditioning the multimodal fusion on quality, useful information can be extracted from lower quality measures rather than rejecting...
Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, electronic identification (eID) schemes have been introduced that involve many service providers (SPs) and identity providers (IDPs) which verify the identity of users...
Security patterns are generic solutions that can be applied since early stages of software life to overcome recurrent security weaknesses. Their generic nature and growing number make their choice difficult, even for experts in system design. To help them on the pattern choice, this paper proposes a semi-automatic methodology of classification and the classification itself, which exposes relationships...
Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person in the narration chain. In this study, we propose a novel approach completely based on the content of each Hadith. For each category of hadiths (authentic and non-authentic), we...
Canonical Correlation Analysis (CCA) is a standard tool in statistical analysis that measures the linear relationship between two data sets. In this paper, a multi-biometric approach which combines palm print feature and palm vein feature based on Canonical Correlation Analysis is proposed. First, using a series of pre-processing and extracted the ROI (Region of interest) which has enhanced of the...
Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed...
This paper presents a spatial biometric watermarking scheme for multimodal authentication system. This method embeds the face features (watermark) into the fingerprint image (cover) via a generated secret key to locate the pixels to be watermarked while preserving the fingerprint minutia points. The face features are extracted using Orthogonal Locality Preserving Projections technique. The proposed...
Palmprint recognition has become the novel and effective technology in biological recognition fields. The contactless palmprint recognition is the mainstream way with its unique advantages. However, hand pose variations, rotations, translations, complicated backgrounds are the common problems in contactless palmprint recognition. To solve these problems, this paper proposes a palmprint recognition...
According to muhaddithun, hadith is 'what was transmitted on the authority of The Prophet (PBUH): his deeds, sayings, tacit approvals, or description of his physical features and moral behaviors'. These days, there are an increasing number of studies in Information Technology (IT) has been done on hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted...
These days, there are an increasing number of studies in ICT has been done on the hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the Ahadith where most of them are based on the matching of test Ahadith with the authentic Ahadith in the database. However, there are limited computerized-based studies to authenticate the ahadith...
Biometrics can provide more privacy and reliability to recognize a person, based on physiological information or bio-signals of him which is specific and inherent of that person and cannot be disguised by other individuals. Photoplethysmogram (PPG) is often considered as one of the non-invasive easy to access bio-signals of human being that is replete with information about cardiac activity, respiration,...
Periocular characteristics are being used as a supplementary feature for the biometric systems employing iris characteristics to mitigate effects of the noisy iris on authentication performance. In the same lines, ocular characteristics are also used to enhance the performance of face based systems under the impact of pose, expression and illumination. However, the iris and face systems are operated...
In this paper we propose a fraud-aware security architecture framework for improved telephone banking experience that enables easy set-up of framework in real environment. The proposed architecture is purely derived from requirements collected from 10 banks for experimental research and development and therefore capable of fully supporting practical testing, experimentation and deployment of standard...
Recognizing low quality fingerprints is important while identifying a person in watch-list and fraudulent scams which is equally important to authenticate legitimate user. Flat or dab fingerprints and rolled fingerprints are being acquired from people by many biometric agencies across the world from their respective governments. But at times un-identification of legitimate users and fault recognition...
SMS service is a basic feature that has been built into the cell phone, since a function of exchanging messages are practical and easily understood by all mobile phone users, when SMS is used for negative purposes then it can be used as evidence of the law. This applications was designed to help search a text messages as evidence in a crime that use SMS as a medium of communication, This Application...
Fingerprints as biometric authenticators are rapidly increasing in popularity, with fingerprint scanners available on many modern smartphones and laptops. Because these authenticators are non-revocable, special care must be taken to prevent leakage of the representative feature information of a user's fingerprint. While secure multiparty computation protocols have been designed to maintain fingerprint...
The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently there only exist damage control efforts such as remote wiping the device's memory or GPS tracking, but nothing to notify users of theft while it takes place. We propose such a mechanism which utilizes the unique...
Palmprint has rich texture information, and palmprint recognition is a very promising biometric identification technology. To study online palmprint identification technology under non-contact mode, a novel and simple method for online palmprint identification technology is presented, and a palmprint recognition simulation system is designed in this paper. Firstly, based on the coordinate position...
The security and privacy of RFID (Radio Frequency Identification) systems becomes an important subject especially for low cost RFID tags. A lot of authentication protocols were proposed to insure the security and in the same time meet the resource limitations. In this paper, we proposed an ultralight weight authentication approach based on permutation, XOR and rotation functions. As a result, the...
A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. The restricted computation ability and limited memory space of low-cost tags make existing RFID systems vulnerable. EPC Class 1 Generation 2 (EPC-C1G2) is the most popular standard for low cost passive RFID tags. For improving security of this standard; many security schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.