Global Journal of Computer Science and Technology

نویسنده

  • N. Radha
چکیده

The major concern of almost all the verification system is user authentication and security. This necessitates the development of a mechanism that ensures user security and privacy. A lot of research has been carried on this developing field and numerous techniques have been proposed earlier in literature. These traditional methods use tokens and passwords to provide security to the users. Uncertainly, it can be easily compromised by attackers and therefore it is significant to design verification system that ensures authentication. In recent years, technology has turned in favor of combining soft biometrics and cryptographic key generation technique. The principal feature of using soft biometric template is that it cannot be easily revoked by any unauthorized user. Most commonly used soft biometric features are iris, retina, face, fingerprint, voice and so on. Fuzzy vault is the framework which comprises of the combination of soft biometrics and cryptographic key generation technique. This fuzzy vault acts as an additional layer of security. This overcomes the limitation met by a biometrics system when implemented individually. This paper proposes a biometric verification system investigating the combined usage of soft biometrics features hardened by fuzzy vault scheme. This approach uses retina as a soft biometric since it is capable of providing best results. Experiments were conducted to investigate the performance of the proposed authentication system in ensuring the user security and privacy. Keywords-Authentication, Cryptography, Fuzzy Vault Scheme, Retina Feature Extraction, Retinal Soft Biometrics.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring the Performance of the Virtual Teams in Global Software Development Projects

The development teams who are geographically spread, culturally mixed and mainly depend on information and communication technology (ICT) for communication is defined as a global virtual teams (GVTs). Despite the advancement of technologies, achieving the efficient performance of GVTs remains a challenge. The reviewed literature has highlighted the importance of training and development, organi...

متن کامل

Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery

this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...

متن کامل

Global properties of a tuberculosis model with lost sight and multi-compartment of latents

A  tuberculosis (TB) model with  lost sight  and multiple latent classes  is considered and studied. We derive the basic reproduction ratio $mathcal R_0$. There is always a globally asymptotically stable equilibrium state. Depending on the value of   $mathcal{R}_0$, this state can be either endemic ($mathcal{R}_0> 1$), or infection-free ($mathcal{R}_0leq 1$). The global asymptotic stability of ...

متن کامل

Estimating Algorithms for Prediction and Spread of a Factor as a Pandemic: A Case Study of Global COVID-19 Prevalence

Background: This paper presents open-source computer simulation programs developed for simulating, tracking, and estimating the COVID-19 outbreak. Methods: The programs consisted of two separate parts: one set of programs built in Simulink with a block diagram display, and another one coded in MATLAB as scripts. The mathematical model used in this package was the SIR, SEIR, and SEIRD models re...

متن کامل

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

متن کامل

P2-CONNECTEDNESS IN L-TOPOLOGICAL SPACES

In this paper, a certain new connectedness of L-fuzzy subsets inL-topological spaces is introduced and studied by means of preclosed sets. Itpreserves some fundamental properties of connected set in general topology.Especially the famous K. Fan’s Theorem holds.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010