Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective

نویسندگان

  • Ajeet Singh Poonia
  • Govind Singh Tanwar
چکیده

e-Governance is the use of internet technology as a platform for exchanging information, providing services and transacting with citizens, businesses, and other arms of government. e-Governance as an administration tool provides a sound strategy to strengthen overall governance. It not only improves accountability, transparency and efficiency of government processes, but also facilitates sustainable and inclusive growth. e-Governance as a societal tool provides a mechanism of direct delivery of public services to the marginal segments of the society in the remotest corners, without having to deal with intermediaries. e-Governance also deals with the sensitive data of governance, so it requires a sound protected, and impenetrable

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition

Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous Authentication system prevents the intruders from invoking the system. A new framework for continuous user authentication that primarily u...

متن کامل

On estimating performance indices for biometric identification

Pattern Recognition, vol. 42, no. 9, pp. 1803-1815, September, 2009. On Estimating Performance Indices for Biometric Identification Jay Bhatnagar, Ajay Kumar Biometrics Research Laboratory Department of Electrical Engineering, Indian Institute of Technology Delhi Hauz Khas, New Delhi 110 016, INDIA Abstract This paper investigates an information theoretic approach for formulating performance in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014