Extend Authentication Using Sensor Technique
نویسنده
چکیده
Purpose of this research paper is to identify a person through written handwriting authentication this thesis focuses on the written handwriting authentication. Biometry offers potential for automatic personal verification and differently from other means for personal verification; biometric means are not based on the possession of anything or the knowledge of some information. Of the various biometrics, handwritingbased verification has the advantage that handwriting analysis requires no invasive measurement and is widely accepted since handwriting has long been established as the most diffuse mean for personal verification in our daily life, including commerce applications, banking transactions, automatic fund transfers, etc. Keywords— Sensor, Biometrics, SVD, Data Gloves, Handwriting
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملOrientation-Compensative Signal Registration for Owner Authentication Using an Accelerometer
Gait-based owner authentication using accelerometers has recently been extensively studied owing to the development of wearable electronic devices. An actual gait signal is always subject to change due to many factors including variation of sensor attachment. In this research, we tackle to the practical sensor-orientation inconsistency, for which signal sequences are captured at different senso...
متن کاملSecure User Authentication and Data Transfer in Wireless Sensor Network Using Elliptical Curve Algorithm and Data Session Using MD5
Wireless sensor networks (WSN) are selfgoverning sensors that are widely distributed in the respective environment. They are also referred as wireless sensor and actuator networks (WSAN). They are used to observe physical or environmental conditions, for example, temperature, sound, natural activities etc. They collect data from each active node and pass it to the network to the centralized loc...
متن کامل