289 research outputs found

    Securing Inter-Organizational Workflows in Highly Dynamic Environments through Biometric Authentication

    Get PDF
    High flexibility demands of business processes in an inter-organizational context potentially conflict with existing security needs, mainly implied by regulative and legal requirements. In order to comply with these it has to be ensured that access to information within the workflow is restricted to authorized participants. Furthermore, the system might be required to prove this retrospectively. In highly flexible environments, particularly when documents leave the owner’s security domain, the scope of trust must be expendable throughout the workflow. Usage control provides practical concepts. However, user authentication remains a major vulnerability. In order to ensure effective access control the possibility of process-wide enforcement of strong authentication is needed. Inherently, strong user authentication can be realized applying biometrics, though practical reasons still slow the broad application of biometric authentication methods in common workflow scenarios. This work proposes the combination of usage control and typing biometrics to secure interorganizational workflows in highly dynamic environments. On the one hand, usage control provides high flexibility for document-centric workflows but relies on the enforcement of strong authentication. On the other hand, authentication based on typing is flexible in both deployment and application. Furthermore, the inherent privacy problem of biometrics is significantly weakened by the proposed approach

    Automatic human face detection for content-based image annotation

    Get PDF
    In this paper, an automatic human face detection approach using colour analysis is applied for content-based image annotation. In the face detection, the probable face region is detected by adaptive boosting algorithm, and then combined with a colour filtering classifier to enhance the accuracy in face detection. The initial experimental benchmark shows the proposed scheme can be efficiently applied for image annotation with higher fidelity

    IOT based Security System for Auto Identifying Unlawful Activities using Biometric and Aadhar Card

    Get PDF
    In today’s era, where thefts are consecutively increasing, especially in banks, jewelry shops, stores, ATMs, etc, there is a need to either develop a new system or to improve the existing system, due to which the security in these areas can be enhanced. However, the traditional methods (CCTV cameras, alarm buttons) to handle the security issues in these areas are still available, but they have lots of limitations and drawbacks. So, in order to handle the security issues, this paper describes how the biometric and IoT (Internet of Things) techniques can greatly improve the existing traditional security system. Our proposed system uses biometric authentication using the fingerprint and iris pattern with the strength of IoT sensors, microcontroller and UIDAI aadhar server to enhance the security model and to cut the need of keeping extra employees in monitoring the security system

    Perceptions of Risk and Security Concerns with Mobile Devices using Biometric vs Traditional Authentication Methods

    Get PDF
    Authentication methods on mobile devices provide an important layer of security. Many types of authentication methods exist, some traditional and some biometric-based. In this study, we use a survey method to examine whether the presence and type of an authentication method affect perceptions of risk and security concerns around three specific types of mobile device actions: banking, health, and activities with personally identifiable information (PII). We also survey users’ general perceptions of trust, usefulness, convenience, and ease of use toward authentication methods, both traditional and biometric. We find that users’ perceptions of risk and security concerns change when users consider the type of authentication method present on a device. While traditional methods are still more familiar to most users, we also find that perceptions of biometric-based methods are more similar to perceptions of traditional methods than in the past

    Realtime IRIS Recognition & Authentication System

    Get PDF
    Many organizations are using different kinds of automated person's identification systems which improve the user's need, satisfaction and efficiency to secure resource. The information depends on the recent developments in person's identification using Biometric technology method. By using this technology we are to ensure to identify a person weather he/she is real person or fake person. The aim is to increase the security of biometric reorganization frameworks, by adding liveness assessment in a fast, user friendly and non-intrusive manner. In this first, a user must be enroll in the system so that his biometric template can be captured. This template is securely stored in a database. This template is retrieved when an individual needs to be identified. Biometric refers to automatic identification of a person based on his/her physiological or behavioral characteristics. This offers several advantages over traditional methods involving ID cards or PIN. To implement this we are using MATLAB

    Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) as a Multi-Factor Authentication Mechanism

    Get PDF
    Previous authentication methods of establishing ones’ identity to a computer system, by using a password or presenting a token are vulnerable to circumvention by misplacement or unauthorized sharing. Biometric authentication methods offer uniqueness and permanent human physiological characteristics that are difficult to share or compromise. This study seeks to provide insight into the area of biometric as ‘something the user knows,’ and ‘something the user is.’ This concept is where the user presents multiple instances of a biometric (BIO) feature in a sequence, as one would enter a Personal Identification Number (PIN). The user authenticates to the system by presenting fingerprints, finger segments, facial recognition, or other mixture of biometric measures in a specific sequence is being called the BIO-PIN™. The main goal of the study is to examine the role of three authentication methods (username/password, BIO-PIN™, & BIO+PIN), and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ sequence, versus username/password or BIO+PIN (multiple fingerprints without sequence & a numerical PIN). Additionally, this research-in-progress (week nine of a 10-week period) examines the authentication methods when controlled for age, gender, user’s computers experience, and number of accounts. Preliminary results are presented here. The latest results will be presented along with open discussions on how innovative user authentication method can lead to additional studies
    • …
    corecore