The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is very important in present day life. In this computer-networked world, most of the activities are computer based, and the data transactions arc protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords might be related to an individual that can lead to dictionary attacks. Indeed, remembering...
Considering the development of mobile payment systems and feasibility and suitability of payment protocols we need to provide security requirements of users as well. In this paper we first introduce LMPP and MPCP protocols and show how these two protocols are unable to satisfy anonymity and unlinkability of merchant to issuer. Then we propose a lightweight mobile payment protocol that is based on...
Biometric-based authentication for smart handheld devices promises to provide a reliable and alternate security mechanism compared to traditional methods such as pins, patterns, and passwords. Although fingerprints are a viable source for authentication, they generally require installation of an additional hardware such as optical and swipe sensors on mobile devices, and are only available in expensive,...
According to the supplementary information hypothesis in psychology, facial motion benefits the perception of identity for human. In this study, we propose a face authentication framework which exploits facial dynamics with appearance to effectively improve the authentication performance. In our face authentication scenario, users are guided to make smile expression and the identity behind smile dynamics...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
As Electrocardiogram (ECG) signals is concern, the second lead is most dominant among the twelve leads. Many techniques are available for human authentication purpose but most of them are untrusted and unsecured. Biometric based authentication system is secure, unique and more reliable for an individual. It deals with the human biometric characteristics such as teeth, face, finger, iris, voice, signature...
Frauds attacking the automated teller machine has increased over the decade which has motivated us to use the biometrics for personal identification to procure high level of security and accuracy This paper describes a system that replaces the ATM cards and PINs by the physiological biometric fingerprint and iris authentication. Moreover, the feature of one time password (OTP) imparts privacy to the...
Password managers address the usability challenge of authentication, i.e., to manage the effort in creating, memorising, and entering complex passwords for an end-user. Offering features such as creating strong passwords, managing increasing number of complex passwords, and auto-filling of passwords for variable contexts, their security is as critical as the assets being protected by the passwords...
Ocular recognition on smartphone authentication applications are gaining popularity in academic research and in the commercial sector where operators are requesting reliable and robust biometric authentication. The wide acceptance of such ocular based authentication systems also depends on the verification performance on large scale testing with different data subject ethnic groups and platforms....
Finger-vein, as a secure and convenient biometric characteristic in nature, has been widely studied for authentication in recent years. In this paper, we propose an efficient finger-vein extraction algorithm based on random forest training and regression with efficient local binary pattern feature. By integrating with a vein pattern matching method which is robust to finger misalignment, we achieved...
Recent years have witnessed the use of biometric recognition systems in increasing number of applications with the number of users growing at a steady pace. However, security and privacy problems have arisen from this upsurge of interest to biometric systems. Template protection methods solve such security and privacy problems where unpredictability is a crucial goal. Here, we study the unpredictability...
The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice...
Biometric is being increasingly used for authentication of user. During enrolment, an enrolment biometric template is generated from the user's raw biometric data. This template is typically stored in the authentication database and used for matching with the template generated when the user presents himself/herself for login. The stored enrolment template can be vulnerable and lead to security problems...
Gender estimation for security and forensic purposes is not a trivial task. Recently, researchers provided methods for predicting gender based on face-images, fingerprint ridge density, body shape, voice and gait. No research to date have been concerned with using one's image aesthetic preferences for predicting gender. Cognitively and psychologically, males and females have different visual aesthetic...
Passwords are like a shared symmetric secret which the user know and the online service to whom the user needs to authenticate knows. And as a user subscribes to more and more online service, he reuses the secret to authenticate itself. Due to this, now it's not only two who knows the secret, anyone who intercepts the secret, can then reuse into all the online services the user has subscribed. Moreover...
Involving smartphone users in the smart transportation system is growing in this digital era. To encourage people to use public transportation, we develop a mobile application through gamification technique to support user involvement on public transportation in Indonesia. The system is called Bandung Smart Transportation Systems (BSTS), and reward system is adopted to give users more benefits. The...
Biometric technologies are used to grant specific users access to services and data. The access control is usually performed at the start of a session that spans over a period of time. Continuous authentication aims at insuring the identity of the user over this period of time, and not only at its start. Multi-biometrics aims at increasing the accuracy, robustness and usability of biometrics systems...
Multihoming is among the features of SCTP (Stream Control Transmission Protocol), which makes it more robust and efficient than TCP(Transmission Control Protocol)but more vulnerable under attack. Nevertheless, a strong security can degrade the QoS(Quality of Service) by adding additional delay. Therefore, we propose in this paper, a secure authentication protocol that supports the establishment of...
We present a graphical representation for palm vein patterns for use as biometric identifiers. The palm vein image captured from an infra red camera is converted into a spatial graph. After image enhancement and binarisation, the palm vein features are extracted from the skeleton using a novel two stage spur removal technique. The location of the features and the connections between them are used...
We describe the design and implementation of Single Sign-On authentication solution that uses a Near Field Communication enabled mobile phone. Such a solution relieves the users from remembering multiple username and passwords when authenticating themselves to various services on the internet. Mobile phones are today's ubiquitous computing devices, used for a wide variety of purposes including authentication,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.