Need and Challenges of Driving License Authentication Using Biometrics
|
|
- Ross Franklin
- 5 years ago
- Views:
Transcription
1 Need and Challenges of Driving License Authentication Using Biometrics Divya Gangamwar Akash Bande Pallavi Gaykar Dr. Nilesh J Uke Professor, ABSTRACT License authentication is a very difficult task for the government to monitor, now a days. To check non-licensees as of driving, the very unfailing person recognition system is biometric verification. Biometrics studies commonly include fingerprint, face, iris, voice, signature, and hand geometry recognition and verification. Among these available biometric traits fingerprint proves to be one of the best traits providing good mismatch ratio and also reliable. Our proposed system consists of a smart card capable of storing the finger print of a particular person. While issuing the license, the specific person s finger print is to be stored in the card. At the time that person s details are fully stored in that database. Cars will be having the reader capable of reading the particular license. The similar vehicle should have the capacity of fingerprint reader component. A man, who is going to drive the vehicle, should keep the thumb on the scanner in the vehicle and then swipe his/her card. If the fingerprint stored in the module and fingerprint stored in a card swiped in the device matches, he/she can drive the vehicle, or else ignition will not work. So that system increase the safekeeping of vehicles. The grand challenge in the system is biometrics recognition,which is based on distinctive personal traits but has a potential to become an irreplaceable part of the system. Keywords License Authentication, Biometric, Fingerprint Recognition, Driver Support System INTRODUCTION The advancement in the field of transportation leads to the increase in number of road users. Yet, the threat of road accidents is fast increasing in parallel to the count of vehicles on road [5]. One of the causes for road accidents is the unlicensed drivers on road.the rate of accidents caused by unlicensed drivers on road is found to be increasing as days go by. The another scaring issue is that drivers who are not eligible to hold a license drive the vehicle.6 out of 10 This may include suspended or revoked licenses else expired or cancelled or denied licenses. The verification of drivers on road individually is not an effortless process, rather on scanning the globalization process; it is quite a hard-hitting process. Considering the above mentioned scenarios it can be realized that there is an urge in need of a system which prohibits, a. Unlicensed drivers using vehicles on the road b. Driving a vehicle when the safety precautions viz, helmet and seat belt are not worn. The Table 1 shows the Historical evolution of vehicle ownership.[3] Table 1: Statistics of cars per 1000 people 398 Divya Gangamwar, Akash Bande, Pallavi Gaykar, Dr. Nilesh J Uke
2 BACKGROUND WORK Recently, different rule based methods are introduced by many researchers to authenticate the driver using biometrics. Driving license system is a very difficult task for the government to monitor. In this project, all the citizens images will scan and recorded. Whenever a citizen crosses the traffic rules, the police can scan his image and can collect fine from the defaulter. Using this method, the police can track the history of the driver. we can prevent the non-licensed person from driving. It consists of a smart card capable of storing the finger print of a particular person. While issuing the license, the specific person s finger print is to be stored in the card. At the time that person s details are fully stored in that database. So that anywhere the person should place on his finger on the finger print reader. That person s entire information will be displaying. The another system uses Iris Scanning technology of biometrics which is evident to be a more reliable one. Using a helmet (for two wheelers) and a glass (for four wheelers), the iris pattern of the driver is continuously scanned and processed by a specially designed system. A smart driving license which is embedded with the iris pattern of the driver is already inserted in the provided system. 1. In paper [1], they have used the Finger print authentication scheme which is a non-imitable biometric authentication scheme. By using this biometric authentication, it is possible to prevent the non-licensed person from driving. The proposed system consists of a smart card of EMV type capable of storing the finger print of a particular person. While issuing the license, the specific person s finger print is to be stored in the card. At the time that person s details are fully stored in that database. 2. In paper[4],they have used FIM 3030N high voltage module as a scanner. This module has in-built ROM, DSP and RAM.This module can operate in 2 modes they are Master mode and User mode. They have used Master mode to register the fingerprints. And in user mode they are verifying the scanned images with the stored images. 3. In paper[2], a novel approach which overcomes the drawbacks of existing verification methodologies is proposed. The method uses Iris Scanning technology of biometrics which is evident to be a more reliable one. Using a helmet (for two wheelers) and a glass (for four wheelers), the iris pattern of the driver is continuously scanned and processed by a specially designed system. A smart driving license which is embedded with the iris pattern of the driver is already inserted in the provided system. The novelty of the proposed design is that the engine of the vehicle opens only when the iris pattern of the driver matches with the pattern in the license. When a mismatch occurs the engine shuts down itself. As the pattern is continuously scanned, a license cannot be used by another personality. Many researchers are working on providing efficient driver support systems that help drivers react to changing road conditions can potentially improve safety, which is the key goal in intelligent vehicle development [6]. Many applications which helps commercial drivers are in place to ease out their driving skills like Road Sign Detection [7,11], measuring real time traffic [8,12], drowsiness detection [6], Real time lane detection [9,10] etc. PROPOSED SYSTEM Our system architecture consists of many different modules.mainly,there are two phases in the system. In each of the phases the users comes across different processes. Various Phases of our proposed architecture are given in Figure No User enrollment In user enrollment,the user is supposed to register the data while going through the license authentication process. This enrolled data is then stored in the RTO database which will used for further authentication of driver. The user Enrollment phase includes the following modules 1.1 User s personal data with biometric details In this module user has to provide his general details which already exists in the license process and add-on to it the user has to provide his biometric details(let us consider fingerprint sample of the user).the fingerprint is taken while issuing the license. 399 Divya Gangamwar, Akash Bande, Pallavi Gaykar, Dr. Nilesh J Uke
3 Fig 1: System Architecture Input device To collect the biometric information many input devices are needed through which we are going to take inputs of the user. There can be different input devices. In our proposed architecture we will be needing Fingerprint scanner and computer GUI. 1.3 Database This is very important module as it will be containing the information about biometric information of the licensee. Each and every details are stored here, and when needed the data will be retrieved from the database. 2. User Authentication This phase is for verification or authentication of the user. It contains different modules. The modules in this phase are 2.1 Input device While authentication of user again the different input devices are required. In user authentication phase according to our requirements we need fingerprint scanner and license card reader. 2.2 Extracting features This module involves extracting the biometric information that is features which are required for authentication. The features includes the details of license and the fingerprint sample. So it extracts the features from the database. 2.3 Check license authentication After extracting features of the user from the database it checks for the enrolled data and authenticated data. The response is given by the database. And Even the input is taken after random time and verifies it continuously. There can be 2 cases Successful authentication : If the authentication becomes successful then it permits the drive to ignite the car. Unsuccessful Authentication :If the authentication is unsuccessful then the system restricts the driver to ignite the car. Swim lane diagram of license authentication using biometrics The swim lane diagram of license authentication illustrated in figure 2 is described as follows: 400 Divya Gangamwar, Akash Bande, Pallavi Gaykar, Dr. Nilesh J Uke
4 Figure 2: Swim Lane Diagram There are mainly three actors in the swim lane diagram. That are 1. Driver : Lane 1 Step 1 : Driver enters in the car. Step 2 : Keep your finger on fingerprint scanner. 2. Car : Lane 2 Step 1 : Driver inserts the smart card in card reader. Step 2 : The car scanner takes input from the database. Step 3 : It sends license details and biometric data to RTO Server. 3. RTO server : Lane 3 Step 1 : The RTO server verifies license. Step 2 : If verification is successful then permission is given to driver to start ignition. Step 3 : If verification fails then takes precautionary actions against driver. CHALLENGES IN AUTHENTICATION USING BIOMETRIC (1) Biometric Sample Recovery : In this case, the goal of the adversary is to determine a fresh biometric template which is accepted by the authentication server. The consequences of a successful attack are similar to the reference recovery attack, apart from the fact that the produced matching template may differ from the user s real one, and so the adversary can recover less information regarding the user s private information (e.g., physical characteristics and DNA). (2) Biometric Reference Recovery : A non authorized party (usually called the adversary) succeeds in recovering the (plaintext) reference biometric template. This is the most harmful threat since by recovering the reference template the adversary may gain unauthorized access to any system that uses as a reference template and also collect sensitive information about the user s physical characteristics and health. (3) User s Traceability: An unauthorized party (e.g., the adversary) is able to trace a user s authentication attempts over different applications. Consequences of a successful traceability attack are cross-matching, profiling, and tracking of individuals. 401 Divya Gangamwar, Akash Bande, Pallavi Gaykar, Dr. Nilesh J Uke
5 (4) User s Distinguishability : The adversary recovers the link between a biometric template, or, and a user identity. Compromising this relation may lead to the disclosure of more sensitive information and often breaks the anonymity of the system. CONCLUSION This project is undertaken to design and develop a system which is able to authenticate the driver using license before ignition of a car, such that on using the proposed system the rate of accidents can be considerably reduced and non licensees on the road can also be eradicated. REFERENCES [1] Priyadarshinee Patnaik D. Archana Thilagavathy, Prasanna R. and Rama P. Finger print based license authentication scheme for indian scenario: A review. Archives of Applied Science Research, 7(5):49 53, [2] L. L. Laudis, A. K. Sinha, P. D. Saravanan, and S. Anand. Fpga implementaion: Smart card based license management using iris scanning approach. In 2014 International Conference on Science Engineering and Management Research (ICSEMR), pages 1 5, Nov [3] NDTV. [4] J. A. Rubella, M. Suganya, K. Senathipathi, B. S. Kumar, K. R. Gowdham, and M. Ranjithkumar. Fingerprint based license checking for auto-mobiles. [5] Wikipedia1. [6] Nilesh J. Uke, Dr. RC Thool, Drowsiness Detection A Visual System for Driver Support, International Journal of Electronics Communication and Computer Engineering (IJECCE), Impact Factor 1, Volume 3, Issue 2, pp , March [7] Nilesh J. Uke, Ravindra C Thool, A Vision Based Driver Support System for Road Sign Detection, Int. J. on Recent Trends in Engineering and Technology, Vol. 10, No. 1, Jan 2014, pp [8] Nilesh J. Uke, Dr. RC Thool, Moving Vehicle Detection for Measuring Traffic Count Using OpenCV, Journal of Automation and Control Engineering (JOACE), ISSN: , Volume 1, No. 4, 2013, pp [9] A. A. Assidiq, O. O. Khalifa, M. R. Islam and S. Khan, "Real time lane detection for autonomous vehicles," 2008 International Conference on Computer and Communication Engineering, Kuala Lumpur, 2008, pp [10] H. Wu, Y. Liu and J. Rong, "A Lane Detection Approach for Driver Assistance," 2009 International Conference on Information Engineering and Computer Science, Wuhan, 2009, pp [11] G. A. Tagunde and N. J. Uke, Detection, classification and recognition of road traffic signs using color and shape features, International Journal of Advanced Technology & Engineering Research, vol. 2, no. 4, pp , [12] Nilesh J. Uke, Dr. RC Thool, Moving Vehicle Detection for Measuring Traffic Count Using OpenCV, Journal of Automation and Control Engineering (JOACE), ISSN: , Volume 1, No. 4, 2013, pp Divya Gangamwar, Akash Bande, Pallavi Gaykar, Dr. Nilesh J Uke
Biometric Based E-License Sysytem
Biometric Based E-License Sysytem Snehal Khade, Mayur Mali 1,2 Dept. of Electronics and Telecommunication Engineering, DhananjayMahadikGroup of Institutions, Vikaswadi Shivaji University, Kolhapur (India)
More informationInternational Journal of Informative & Futuristic Research ISSN:
Reviewed Paper Volume 3 Issue 12 August 2016 International Journal of Informative & Futuristic Research Fingerprint Based Vehicle Security Paper ID IJIFR/V3/ E12/ 007 Page No. 4486-4494 Research Area Embedded
More informationBIOMETRIC PRINTER SECURITY SYSTEM
BIOMETRIC PRINTER SECURITY SYSTEM A.S.Karthiga 1, k.saravanakumar 2, R.Aravind 3, M.Karthi 4, S.P.Dwarakesh M.E., 5, 1,2,3,4 UG Scholar, Dept. of EEE, 5 Assistant professor of EEE, Erode Sengunthar Engineering
More informationImplementation of Aadhaar Based EVM
Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationSECURE DRIVING SYSTEM BASED ON FINGERPRINT DETECTION
SECURE DRIVING SYSTEM BASED ON FINGERPRINT DETECTION G Santhosha 1, B Santosh Kumar 2 1 Pursuing M.Tech, ES, Visvesvaraya College of Engineering and Technology (VCET), M.P.Patelguda, Ibrahimpatnam, RangaReddy,
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationSecurity Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues
Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationCost Minimization by QR Code Compression
Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)
More informationSECURITY ENHANCEMENT OF E-VOTING SYSTEM
SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses
More informationIGNITION BASED ON FINGERPRINT RECOGNITION
IGNITION BASED ON FINGERPRINT RECOGNITION 1 Amit Saxena, 2 Sarthak Sharma, 2 Shivam Gaur, 2 Shubham Chauhan, 2 Shantanu Varshney 1 Assistant Professor, Dept. of E&C Engg., MIT Moradabad Ram Ganga Vihar,
More informationThumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password
Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,
More informationThe Design of Fingerprint Biometric Authentication on Smart Card for
The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia
More informationFingerprint Based Driving License System
Fingerprint Based Driving License System Sarika Fulpagare 1, Monali Kulkarni 1, Dipak Deokar 1, Rahul Deshmukh 1, D.A.Phalke 2 Student of Dept. of Computer Engineering, D. Y. Patil College of Engineering,
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationInternational Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking
International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris
More informationCharter Pacific Biometrics Acquisition
Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent
More informationInternational Journal of Advance Engineering and Research Development. Traffic Police Management :Vehicle Document Verification System Using QR Code
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 Traffic
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationAutomated Biometric Attendance Management System
Automated Biometric Attendance Management System Sushama Shetty 1, Shubham Raut 2, Kirti Patil 3, Vaibhavi Save 4 1,2,3,4 Electronics and telecommunication, St. John College of Engineering and Management,
More informationDESIGNING A BIOMETRIC STRATEGY (FINGERPRINT) MEASURE FOR ENHANCING ATM SECURITY IN INDIAN E-BANKING SYSTEM
DESIGNING A BIOMETRIC STRATEGY (FINGERPRINT) MEASURE FOR ENHANCING ATM SECURITY IN INDIAN E-BANKING SYSTEM PROJECT REFERENCE NO. : 37S0270 COLLEGE : MANGALORE INSTITUTE OF TECHNOLOGY & ENGINEERING MANGALORE
More informationSystems Analysis and Design in a Changing World, Fourth Edition
Systems Analysis and Design in a Changing World, Fourth Edition Learning Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements
More informationBiometrics problem or solution?
Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these
More informationSECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY
SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationSMART AND SAFETY HELMET FOR A RIDER
SMART AND SAFETY HELMET FOR A RIDER Mansi Jane 1, Lochana Yelekar 2, Akash Pandey 3, Abhishek Markande 4, Kalyani Shingne 5, Prof.Shelke 6 12345 Student, Department of Electronics and telecommunication
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationBiometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS
www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,
More informationBiometric Palm vein Recognition using Local Tetra Pattern
Biometric Palm vein Recognition using Local Tetra Pattern [1] Miss. Prajakta Patil [1] PG Student Department of Electronics Engineering, P.V.P.I.T Budhgaon, Sangli, India [2] Prof. R. D. Patil [2] Associate
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti Ganesh* 1
e-issn 2277-2685, p-issn 2320-976 IJESR/June 2014/ Vol-4/Issue-6/480-484 Gunaganti Ganesh/ International Journal of Engineering & Science Research ANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti
More informationFingerprint Authentication for SIS-based Healthcare Systems
Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it
More informationThree Level Authentication for Student Attendance Management System
Volume 119 No. 15 2018, 1997-2012 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Three Level Authentication for Student Attendance Management System 1 G.Ravi
More informationINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM
More informationComputer Department, Dr. D.Y Patil School of Engineering
Traffic Violation Management Web Application with Online Tracking and Fine Payment Priyanka Maity 1, Aamir Shaikh 2, Saishree Dandela 3, Samata Choudhary 4 1,2,3,4 Computer Department, Dr. D.Y Patil School
More informationCIS 6930/4930 Computer and Network Security. Topic 6. Authentication
CIS 6930/4930 Computer and Network Security Topic 6. Authentication 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to
More informationSmart Door Lock Opening In Cars Using Face Recognition
Smart Door Lock Opening In Cars Using Face Recognition 1 Vinil Kumar.V, 1 Divya.N, 2 Mr. K.S.Vairavel 1 PG Scholar, M.E (Embedded System), Bannari Amman Institute of Technology, Sathyamangalam, India 1
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationThinkVantage Fingerprint Software
ThinkVantage Fingerprint Software 12 2 1First Edition (November 2005) Copyright Lenovo 2005. Portions Copyright International Business Machines Corporation 2005. All rights reserved. U.S. GOVERNMENT
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationThinkVantage Fingerprint Software
ThinkVantage Fingerprint Software 12 2 1First Edition (February 2006) Copyright Lenovo 2006. Portions Copyright International Business Machines Corporation 2006. All rights reserved. U.S. GOVERNMENT
More informationUser Authentication and Human Factors
CSE 484 / CSE M 584 (Autumn 2011) User Authentication and Human Factors Daniel Halperin Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju
More informationCommand Center Access Control Software
Command Center Access Control Software NextgenID BioAxs System Family: Member Enrollment Primer Mailing Address: NextgenID, Ltd. 10226 San Pedro Suite 100 San Antonio, TX 78216 USA Contacts: Phone: (210)
More informationBio-FactsFigures.docx Page 1
Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationSecure Smart Card Based Remote User Authentication Scheme for Multi-server Environment
Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationInternational Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Biometric Based Attendance Management System Using Wi-Fi
More informationINTELLIGENT HIGHWAY TRAFFIC TOLL TAX SYSTEM AND SURVEILLANCE USING BLUETOOTH ANDOPTICAL CHARACTER RECOGNITION
INTELLIGENT HIGHWAY TRAFFIC TOLL TAX SYSTEM AND SURVEILLANCE USING BLUETOOTH ANDOPTICAL CHARACTER RECOGNITION 1 ANUP PATIL, 2 NIKHIL FATING, 3 ANIKET PATIL, 4 ROHAN GHAYRE 1,2,3,4 STUDENTS, ELECTRICAL
More informationBIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES
BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant
More informationDesign and Implementation of an Automated Library System using Biometric Technology
Design and Implementation of an Automated Library System using Biometric Technology Uchechukwu E. Nwokolo 1,a, Michael S. Okundamiya 2,b 1 Department of Electrical/Electronic Engineering, Federal Polytechnic
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More information1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 12 Dec. 2016, Page No. 19489-19493 Data Security System in Cloud by Using Fog Computing and Data Mining
More informationAutomation the process of unifying the change in the firewall performance
Automation the process of unifying the change in the firewall performance 1 Kirandeep kaur, 1 Student - Department of Computer science and Engineering, Lovely professional university, Phagwara Abstract
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationVoice & Speech Based Security System Using MATLAB
Silvy Achankunju, Chiranjeevi Mondikathi 1 Voice & Speech Based Security System Using MATLAB 1. Silvy Achankunju 2. Chiranjeevi Mondikathi M Tech II year Assistant Professor-EC Dept. silvy.jan28@gmail.com
More informationSecure ATM System with Biometric Fingerprints Technology
e-issn 2455 1392 Volume 2 Issue 6, June 2016 pp. 489 494 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Secure ATM System with Biometric Fingerprints Technology Miss Jyotsna T. Desai 1,
More informationACCEPTANCE OF ELECTRONIC MAINTENANCE RECORDS
BAC-AW-04 Issue: 1 Effective: 9-Jan-17 ACCEPTANCE OF ELECTRONIC MAINTENANCE RECORDS GENERAL Bermuda Advisory Circulars are issued to provide advice, guidance and information on standards, practices and
More informationDefenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationDoor Automation Security System Using OTP
Door Automation Security System Using OTP Snehalata Raut 1, Dimple chapke 2, Akash Sontakke 3, Nayan Pounikar 4, Prof. Neha Israni 5 1234 Final Year Students, 5 Assistant professor of Department of Information
More informationADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION
ADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION Prof. Saurabh Thakur 1, Shekhar Dure 2, Ajinkya Khutwad 3 1,2,3 Dept. of E&TC, Sinhgad Academy Of Engineering, Savitribai Phule Pune University,
More informationCongratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.
INSTALLATION Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption. From this point on, you may install any additional
More informationEdelweiss Applied Science and Technology
Volume 2 Issue 1 PDF 120 Pages 5 Edelweiss Applied Science and Technology Research Article ISSN: 2576-8484 Automated Student Attendance System using Fingerprint Recognition Sifatnur Rahman, Mahabur Rahman,
More informationHighly Secure Authentication Scheme: A Review
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationM07/3/ITGSX/SP2/ENG/TZ0/XX. Information technology in a global society Standard level. Thursday 17 May 2007 (morning) 2 hours
IB DIPLOMA PROGRAMME PROGRAMME DU DIPLÔME DU BI PROGRAMA DEL DIPLOMA DEL BI Information technology in a global society Standard level PAPER 2 Thursday 17 May 2007 (morning) 2 hours 22075515 INSTRUCTIONS
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor(SJIF): 3.134 e-issn(o): 2348-4470 p-issn(p): 2348-6406 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 Estimation
More informationThe Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication
More informationAuthentication. Identification. AIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationIn this unit we are continuing our discussion of IT security measures.
1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationA Review of Emerging Biometric Authentication Technologies
International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 7 Issue 2 Ver. IV February 2018 PP. 16-21 A Review of Emerging Biometric Authentication
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationEMBEDDED MAJOR PROJECTS LIST
CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationINSE Lucky 13 attack - continued from previous lecture. Scribe Notes for Lecture 3 by Prof. Jeremy Clark (January 20th, 2014)
INSE 6150 Scribe Notes for Lecture 3 by Prof. Jeremy Clark (January 20th, 2014) Lucky 13 attack - continued from previous lecture The lucky 13 attack on SSL/TLS involves an active attacker who intercepts
More informationSmart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme
Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due
More informationKeywords security model, online banking, authentication, biometric, variable tokens
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication
More informationD. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai,
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Two Step Verification
More informationLANE DEPARTURE WARNING SYSTEM FOR VEHICLE SAFETY
LANE DEPARTURE WARNING SYSTEM FOR VEHICLE SAFETY 1 K. Sravanthi, 2 Mrs. Ch. Padmashree 1 P.G. Scholar, 2 Assistant Professor AL Ameer College of Engineering ABSTRACT In Malaysia, the rate of fatality due
More informationComputer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationComputer Security 4/15/18
Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)
More information