768 research outputs found

    Biometric Security for Cell Phones

    Get PDF
    Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.biometrics, security, fingerprint, face recognition, cell phones

    Identification and Security Implications of Biometrics

    Get PDF
    The usage of biometrics has become more frequent over the past couple of decades, notably due to technological advancements. Evolving technology in the field of biometrics has also led to increased accuracy of associated software, which have provided the opportunity to use a multitude of different human characteristics for identification and/or verification purposes. The current study assessed the usage of biometrics in casinos, hospitals, and law enforcement agencies using a survey methodology. Results indicated that privacy concerns related to the use of biometrics may not be as prevalent as indicated in the literature. Additionally, results indicated that the utilization of biometrics has led to increased accuracy in identification and verification processes, led to enhanced security, and would be highly recommended to other institutions. Information obtained from the literature notes the racial bias in facial recognition technologies due to algorithmic development based solely upon features of Caucasian individuals. Efforts need to be made to create facial recognition algorithms that are more racially and ethnically diverse

    Automated Fingerprint Identification System: with and without the Possibility of Correction of a Digitalised Image

    Get PDF
    According to the fact that systems for automatic processing of biometric data are constantly advancing in terms of speed and reliability, as well as in terms of adding new processing capabilities, the question of choosing the appropriate system becomes more important. In this paper the idea is to present the technical and technological solutions of the Automated Fingerprint Identification System with different operating principles, with and without the possibility of correction or coding of a digitized image. Comparisons of different systems were performed in test and production environments. The test database with 10 000 records and about half a million records of dactyloscoped persons in the production of database for testing the performance of search was used. The results have shown that there exists a statistically significant difference (p < 0.001) between examined systems in face fingerprint search according to latent fingerprint databases (which means indirect verification). In the production environment, it was found that there exists statistically significant difference (p < 0.001) in the direct and indirect verification showing advantages and disadvantages of the compared systems

    Biometric Standards Survey

    Get PDF
    This document presents a quick survey on the most important standards regarding biometric technologies, concentrating mainly in those concerning the smartcard environment

    Distributed authentication to preserve privacy through smart card based biometric matching

    Get PDF
    Bibliography: pages 135-139.This thesis focuses on privacy concerns, specifically those relating to the storage and use of biometrics. These concerns result from the fact that biometric information is unique. This uniqueness makes the biometric a very strong identifier increasing the possibility that it could be used to monitor an individual's activities. An expert can extract considerable information from a biometric scan, ranging from the age or gender to whether the individual has certain diseases

    Biometric Verification System for Automated Teller Machine (ATM)

    Get PDF
    Biometric Verification System for Automated Teller Machine (ATM) will serve as an alternative for the current verification system that uses ATM card and personal identification number (PIN) to protect against fraud and effectively eliminating most common attempts to gain unauthorized access. With biometric technology, customer can gain access to their account through smart card approach combined with biometric technology to automatically identify individuals using their distinct physical or behavioral characteristics. The main objective of this project is to solve the problems that arise from using PIN as the base of ATM verification system. These include unauthorized access into financial accounts, stealing money, ATM fraud and many more. To ensure a reliable project output, the author had outlined the scope of study for the proposed project. It involves the study of ATM system, biometrics technology, architecture, the benefits and the drawback of each approach and the current trend in the market. The development of this system will be based on the RAD methodology
    • …
    corecore