“ Acceptance Threshold ’ s Adaptability in Fingerprint - Based Authentication Methods ”
نویسندگان
چکیده
The individuals' authentication is an necessary step in the securization process of any system including a person-machine interface. By being an automated process, it is essential that this authentication be based on infallible parameters, thus the interest for biometrics, as presented in this thesis. The study's objective is to demonstrate the soundness of the threshold's flexibility in biometric authentication systems. The emphasis is put on fingerprint-based methods. The hope is to promote the application of this kind of authentication, in areas such as electronic commerce and cellular telephony. Hence, this research paper starts by presenting the state-of-the art for both these domains. Then, the three existing authentication techniques are explained. The next step is the analysis of potential factors that will cause a threshold's modification. Subsequently, for each of the selected criteria, a computation technique for the threshold's new values is defined. A generalization of the threshold's modification procedure is then exposed. The thesis finally closes, by an implementation of a part of the proposed generic procedure. 3 Résumé L'authentification d'individus, constitue une étape incontournable de la sécurisation de tout système, présentant une interface homme-machine. Étant un processus automatisé, il est primordial qu'elle se base sur des paramètres d'identification infaillibles. D'où l'intérêt de la biométrie, comme démontré dans cette thèse. L'objectif de ce mémoire est d'établir le bien-fondé d'une certaine flexibilité, des seuils d'acceptation des systèmes d'authentification biométriques. L'emphase est mise sur les méthodes liées aux empreintes digitales. L'ambition est de promouvoir l'application de l'authentification biométrique aux domaines, tels que la téléphonie mobile et le commerce électronique. Le mémoire débute donc par dresser l'état de l'art concernant ces deux secteurs. Les trois techniques d'authentification existantes, sont ensuite exposées. L'étape suivante, représente l'analyse des potentiels facteurs de modification des seuils. Par la suite pour chacun des critères retenus, une méthode de calcul des nouvelles valeurs des seuils est définie. Une généralisation de la procédure de modification de ces seuils, est par la suite proposée. Enfin, ce mémoire termine par l'implémentation d'une partie de la procédure générique décrite.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملSecure Network Authentication Based on Biometric National Identification Number
This paper present a proposed authentication system based on fingerprint as biometric type and some of static credential personal information such as name and birth date. The system generate a Unique National Identification Number (NIDN) by combining fingerprint minutiae features with user’s personal information (name and birthdate) printed in Quick Response code (QR) image to be used as a toke...
متن کاملPersonal Authentication Using Palmprint with Sobel Code, Canny Edge and Phase Congruency Feature Extraction Method
Palmprint recognition refers to recognizing a person on the basis of palmprint features. In this paper, we have proposed a palmprint based biometric authentication method with improvement in accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, Directional operator, Wavelet transform, Fourier transform etc. are available to extract line feature ...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملAuthentication Methods Based on Digital Fingerprint Random Encryption IBC
Aiming at the problem of the storage and transmission security of fingerprint templates in datacenter computer monitoring system (DCRMS), an authentic method based on digital fingerprint random encryption IBC is proposed in this paper, combined with the feature of fingerprint vector encryption algorithms. The method is mainly based on fusion user’s fingerprint characteristic and asymmetric auth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999