Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
User Authentication using Automated Biometrics
#1

Authentication and security have been major issues right from the beginning of the computer age. One of the emerging and efficient keys to security problem is Biometrics-a technology that strives towards identifying the identity of a living person based on biological characteristics. Biometrics possesses many advantages over conventional user authentication processes. Because a biometric is an intrinsic property of some individual they are difficult to duplicate and impossible to share. Examples of automated biometrics include fingerprints, faces, iris and speech. Even though biometric based system is more reliable and secure than conventional authentication methods, it is still possible to hack into a biometric system. There are 8 possible weak links in a generic biometric system. This paper highlights the attacks points on a fingerprint based biometric system and suggestions to alleviate them. Resubmitting of old digitally stored biometrics signals is one of the weakest links. Two techniques are proposed. One method involves hiding messages in the image and works in conjunction with the image compression method (WSQ). Other method involves checking the liveliness of the signal acquired from an intelligent sensor using a challenge/response strategy. Two key issues associated with a biometric system are privacy concern and re-issuance of identity tokens. A new technique has been proposed called cancelable biometrics in which the biometric signals are distorted using well defined transformations. The techniques proposed enhance the security of a biometric system.
Reply

#2

please replay me the full report on BIOMETRICS to [email protected]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.