2,184 research outputs found

    Biometric Security for Cell Phones

    Get PDF
    Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.biometrics, security, fingerprint, face recognition, cell phones

    Network Security in Biometrics

    Get PDF
    Biometric security is mostly executed in conditions with basic physical security prerequisites or that are profoundly inclined to data fraud. Biometric security-based frameworks or motors store human body qualities that don't change over a person's lifetime. These incorporate fingerprints, eye texture, voice, hand patterns and facial recognition. A person's body qualities are pre-stored in a biometric security framework or scanner, which might be accessed by approved staff. At the point when an individual strolls into an office or attempts to access a framework, the biometric scanner assesses his/her physical attributes, which are coordinated with put away records. On the off chance that a match is found, the individual is conceded get to

    Speaker Recognition in the Biometric Security Systems

    Get PDF
    At present, the importance of the biometric security increases a lot in context of the events in the world. Development of the individual biometric technologies such as the fingerprint recognition, iris or retina recognition or speaker recognition has been considered very important. However, it comes to be true that only one biometric technology is not sufficient enough. One of the most prosperous solutions might be a combination of more such technologies. This article aims at the technology of the speaker recognition and proposes a solution of its integration into a more complex biometric security system. Herein a design of the complex biometric security system is introduced based on the speaker recognition and the fingerprint authentication. A method of acquisition of a unique vector from speaker specific features is introduced as well

    Biometric security based on ECG

    Get PDF
    Recently the electrocardiogram (ECG) has been proposed as a novel biometric. This paper aims to construct a reliable ECG verification system, in terms of privacy protection. To this end, an improved expression to estimate the capacity in the autocorrelation (AC) of the ECG is derived, which not only gives an upper bound for the number of identifiable subjects using ECG, but also helps to determine the number of independent features needed for verification. This capacity derivation, to our best knowledge, is new and can be easily extended to other biometrics. In addition, we apply the Quantization Index Modulation (QIM) scheme to the verification system for template protection. Based on our database, we found that, the capacity in the AC of ECG is approximately 20 bits information contained in the 23 independent features. We have also shown that compared to unprotected systems, the QIM scheme greatly enhances privacy protection of ECG templates without significant sacrificing of the identification performance

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques

    Biometric security systems: finally, a friend?

    Get PDF
    Information systems security has broadened its meaning and significance and has started to affect our lives and behaviours. The research literature identifies five related research domains: information systems, security policies, security technologies, security assurance, and security interfaces. This paper discusses some aspects of user acceptance of biometrical measurements for the purposes of authentication and access control and concludes that initial user rejection of the commonly implemented biometrics and fear of privacy abuse have been replaced by a de facto user acceptance. It hypothesizes that there is correlation between users’ awareness of the broader consequences of a particular biometric system and the level of their acceptance of the system

    Biometric Security System for Newborn Baby

    Get PDF
    Newborn swapping and abduction in hospitals are challenging issues which occurs all over the world. Traditional method to combat this problem have their own drawbacks, here areal time solution is provided by proposed modal havRfive modules on raspberry Pi. Implemented module consisting of one camera for providing real time security against culprit who lifts the baby from cradle. Additionally a temperature sensor is used which gives the continuous updates about the baby�s health to medical staff and parents. The results of implemented modules shows that we can get the real time alert about culprit which will be easy to find out person who lifts the baby from cradle and also continuous data of temperature of baby�s body of providing time to time attention towards health. Proposed system has modules for scanning and matching of footprints of baby and hand impression of mother which provide a low cost solution to the newborn swapping rather than the expensive DNA procedures
    • …
    corecore