Optimized Authentication System with High Security and Privacy
نویسندگان
چکیده
Authentication and privacy play an important role in the present electronic world. Biometrics especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store attributes of minutia point a fingerprint directly database as user template. Existing research works have shown that from such insecure templates, original fingerprints can be constructed. If gets compromised, attacker may construct user, which is serious security issue. Security therefore important. Ali et al. designed system secure biometrics; however, their technique has various limitations not optimized. In this paper, first we proposed highly robust, optimized, fast. Secondly, unlike most apart minutiae location orientation, used quality points well to optimized Third, template constructed 3D shell shape. We rigorously evaluated on nine different databases. The obtained results experiments promising show effectiveness technique.
منابع مشابه
Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions
This paper proposes a frictionless authentication system, provides a comprehensive security analysis of and proposes potential solutions for this system. It first presents a system that allows users to authenticate to services in a frictionless manner, i.e., without the need to perform any particular authenticationrelated actions. Based on this system model, the paper analyses security problems...
متن کاملAnonymous Authentication: For Privacy and Security
Fundamental Security Technologies Anonymous Authentication: For Privacy and Security By Kazue SAKO,* Shoko YONEZAWA* and Isamu TERANISHI* *Internet Systems Research Laboratories This paper presents NEC’s activities on anonymous authentication. Anonymous authentication is a means of authorizing a user without identification. The technology serves as a breakthrough to enhance the privacy of the u...
متن کاملTrustworthy Networks, Authentication, Privacy, and Security Models
Wireless networks are gaining popularity that comes with the occurrence of several networking technologies raising from personal to wide area, from centralized to distributed, and from infrastructure-based to infrastructure-less. Wireless data link characteristics such as openness of transmission media, makes these networks vulnerable to a novel set of security attacks, despite those that they ...
متن کاملEnhancing security and privacy in biometrics-based authentication systems
Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications su...
متن کاملTowards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication
In this study, we examine the ways in which user attitudes towards privacy and security relating to mobile devices and the data stored thereon may impact the strength of unlock authentication, focusing on Android’s graphical unlock patterns. We conducted an online study with Amazon Mechanical Turk (N = 750) using self-reported unlock authentication choices, as well as Likert scale agreement/dis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10040458