Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective
نویسندگان
چکیده
e-Governance is the use of internet technology as a platform for exchanging information, providing services and transacting with citizens, businesses, and other arms of government. e-Governance as an administration tool provides a sound strategy to strengthen overall governance. It not only improves accountability, transparency and efficiency of government processes, but also facilitates sustainable and inclusive growth. e-Governance as a societal tool provides a mechanism of direct delivery of public services to the marginal segments of the society in the remotest corners, without having to deal with intermediaries. e-Governance also deals with the sensitive data of governance, so it requires a sound protected, and impenetrable
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملSoft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous Authentication system prevents the intruders from invoking the system. A new framework for continuous user authentication that primarily u...
متن کاملOn estimating performance indices for biometric identification
Pattern Recognition, vol. 42, no. 9, pp. 1803-1815, September, 2009. On Estimating Performance Indices for Biometric Identification Jay Bhatnagar, Ajay Kumar Biometrics Research Laboratory Department of Electrical Engineering, Indian Institute of Technology Delhi Hauz Khas, New Delhi 110 016, INDIA Abstract This paper investigates an information theoretic approach for formulating performance in...
متن کامل