Academic literature on the topic 'Fingerprint Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fingerprint Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Fingerprint Security"
Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.
Full textSyukron, Nur Hidayat. "Sistem Controling Engine Menggunakan Fingerprint Berbasis Arduino." Jurnal Ilmiah Informatika 4, no. 1 (June 30, 2019): 36–40. http://dx.doi.org/10.35316/jimi.v4i1.485.
Full textGupta, Himanshu, and Kapil Chauhan. "Role of Biometric security for The Enhancement of Data Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 10 (July 27, 2015): 6184–89. http://dx.doi.org/10.24297/ijct.v14i10.1832.
Full textNusantar, Alrizal Akbar Nusantar Akbar, Ilham Ari Elbaith Zaeni, and Dyah Lestari. "Home Energy Security Prototype using Microcontroller Based on Fingerprint Sensor." Frontier Energy System and Power Engineering 1, no. 2 (July 26, 2019): 19. http://dx.doi.org/10.17977/um049v1i2p19-29.
Full textDake, Mr Ashish Prabhakar. "Fingerprint Based Security System." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (November 30, 2019): 585–89. http://dx.doi.org/10.22214/ijraset.2019.11094.
Full textSzweda, Roy. "Holographic fingerprint security device." Network Security 1997, no. 7 (July 1997): 7. http://dx.doi.org/10.1016/s1353-4858(97)89874-1.
Full textJiang, Yujia, and Xin Liu. "Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid." Journal of Electrical and Computer Engineering 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/1539298.
Full textWang, Chunwei, Lina Yu, Huixian Chang, Sheng Shen, Fang Hou, and Yingwei Li. "Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System." Wireless Communications and Mobile Computing 2020 (November 30, 2020): 1–14. http://dx.doi.org/10.1155/2020/8841417.
Full textArai, Fumihito, and Toshio Fukuda. "Fingerprint Image Sensing Using Micromechanical Key and Extraction Algorithm for Sensed Fingerprint Image." Journal of Robotics and Mechatronics 13, no. 5 (October 20, 2001): 458–63. http://dx.doi.org/10.20965/jrm.2001.p0458.
Full textNwankwo, C., G. Oletu, and O. B. Longe. "Security Enhancement of an Automated Teller Machine Using Fingerprint and Password." advances in multidisciplinary & scientific research journal publication 26, no. 1 (December 11, 2020): 45–50. http://dx.doi.org/10.22624/isteams/v26p5-ieee-ng-ts.
Full textDissertations / Theses on the topic "Fingerprint Security"
Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.
Full textJudd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.
Full textSundblad, Anton, and Gustaf Brunberg. "Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139227.
Full textBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Full textVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textBorn, Kenton P. "Combating client fingerprinting through the real-time detection and analysis of tailored web content." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/13277.
Full textDepartment of Computing Science
David Gustafson
The web is no longer composed of static resources. Technology and demand have driven the web towards a complex, dynamic model that tailors content toward specific client fingerprints. Servers now commonly modify responses based on the browser, operating system, or location of the connecting client. While this information may be used for legitimate purposes, malicious adversaries can also use this information to deliver misinformation or tailored exploits. Currently, there are no tools that allow a user to detect when a response contains tailored content. Developing an easily configurable multiplexing system solved the problem of detecting tailored web content. In this solution, a custom proxy receives the initial request from a client, duplicating and modifying it in many ways to change the browser, operating system, and location-based client fingerprint. All of the requests with various client fingerprints are simultaneously sent to the server. As the responses are received back at the proxy, they are aggregated and analyzed against the original response. The results of the analysis are then sent to the user along with the original response. This process allowed the proxy to detect tailored content that was previously undetectable through casual browsing. Theoretical and empirical analysis was performed to ensure the multiplexing proxy detected tailored content at an acceptable false alarm rate. Additionally, the tool was analyzed for its ability to provide utility to open source analysts, cyber analysts, and reverse engineers. The results showed that the proxy is an essential, scalable tool that provides capabilities that were not previously available.
Breedt, Morne. "Integrating biometric authentication into multiple applications." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/27605.
Full textDissertation (MSc (Computer Engineering))--University of Pretoria, 2007.
Electrical, Electronic and Computer Engineering
MSc
unrestricted
Hanner, Martin, and Tobias Björk. "Biometri vid fysisk access : En jämförande studie mellan ansiktsigenkänning och fingeravtrycksavläsning." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-910.
Full textIn today’s society, people often find themselves in situations where they need to be identified;for example when we buy alcohol, need to use an ATM or log on to our e-mail account. The most common methods today that are used for these kinds of matters are antiquated, and in
the meantime, criminals all over the world get more sophisticated. Companies invest billions every day in order to protect their interests. Maybe it’s time that we finally give biometrics the
attention that it deserves.
This essay aims to describe the biometric methods that are available today, find some of the most effective when it comes to physical access and make a comparison. Face recognition and fingerprint scanning will be described more thoroughly. Pros and cons will be analyzed and the theory will be linked to interviews with three Swedish organisations.
I dagens samhälle hamnar vi människor regelbundet i situationer där vi blir tvungna att identifiera oss. Det kan till exempelvis vara när vi köper alkohol, tar ut pengar eller loggar in på vårt e-mailkonto. De vanligaste metoderna, som idag används för dessa identifieringar, har funnits länge och är föråldrade och i takt med detta blir brottslingar världen allt mer sofistikerade. Dagligen investerar företag världen över miljarder för att skydda exempelvis
data med hjälp av koder och andra mjukvaruinstallationer. Kanske är det istället dags för att vi ger biometrin en ordentlig chans.
Den här uppsatsen syftar till att redogöra för de biometriska säkerhetsmetoder som finns tillgängliga, identifiera några av de effektivaste när det gäller fysisk access och jämföra dessa med varandra. Det är framförallt ansiktsigenkänning och fingeravtrycksavläsning som kommer att ges mycket plats i studien. För- och nackdelar kommer att tas upp och teorin kommer att kopplas till intervjuer gjorda med tre svenska företag.
Chitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.
Full textGajland, Phillip. "On Statistical Properties of Arbiter Physical Unclonable Functions." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672.
Full textBooks on the topic "Fingerprint Security"
Bhanu, Bir. Computational algorithms for fingerprint recognition. Boston, MA: Kluwer Academic Publishers, 2003.
Find full textXuejun, Tan, ed. Computational algorithms for fingerprint recognition. Boston: Kluwer Academic Publishers, 2004.
Find full textUnited States. Congress. Senate. A bill to amend title IV of the Social Security Act to require States to establish a 2-digit fingerprint matching identification system in order to prevent multiple enrollments by an individual for benefits under such Act, and for other purposes. [Washington, D.C.?]: [United States Government Printing Office], 1994.
Find full textBhanu, Bir. Computational Algorithms for Fingerprint Recognition. Springer, 2012.
Find full textTan, Xuejun, and Bir Bhanu. Computational Algorithms for Fingerprint Recognition (International Series on Biometrics). Springer, 2003.
Find full textFairhurst, Michael. Biometrics: A Very Short Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/actrade/9780198809104.001.0001.
Full textBook chapters on the topic "Fingerprint Security"
Donida Labati, Ruggero, and Fabio Scotti. "Fingerprint." In Encyclopedia of Cryptography and Security, 460–65. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_740.
Full textDonida Labati, Ruggero, and Fabio Scotti. "Fingerprint." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_740-2.
Full textSmith, Marcus, Monique Mann, and Gregor Urbas. "Fingerprint biometrics." In Biometrics, Crime and Security, 22–36. New York : Routledge, 2018. | Series: Law, science and society: Routledge, 2018. http://dx.doi.org/10.4324/9781315182056-2.
Full textZhu, Yanming, Wei Zhou, Xuefei Yin, and Jiankun Hu. "3D Fingerprint." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1.
Full textShahandashti, Siamak F., Reihaneh Safavi-Naini, and Philip Ogunbona. "Private Fingerprint Matching." In Information Security and Privacy, 426–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_32.
Full textChung, Yongwha, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, and Dosung Ahn. "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault." In Information Security and Cryptology, 358–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599548_31.
Full textKohlhepp, Brian. "Investigations (DNA – Fingerprint)." In Encyclopedia of Security and Emergency Management, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_25-1.
Full textMalhotra, Aakarsh, Mayank Vatsa, and Richa Singh. "Unconstrained Fingerprint Biometrics." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1511-1.
Full textAng, Russell, Rei Safavi-Naini, and Luke McAven. "Cancelable Key-Based Fingerprint Templates." In Information Security and Privacy, 242–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_21.
Full textSarier, Neyire Deniz. "Private Minutia-Based Fingerprint Matching." In Information Security Theory and Practice, 52–67. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24018-3_4.
Full textConference papers on the topic "Fingerprint Security"
Wenzl, Matthias, and Daniel Kluka. "Adding Channel Security to a Fingerprint Verification Chain." In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67356.
Full textYeung, Hoi Wo, Yiu Sang Moon, and Ka Cheong Chan. "Fingerprint registration for small fingerprint sensors." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.542919.
Full textMil'shtein, S., A. Pillai, A. Shendye, C. Liessner, and M. Baier. "Fingerprint Recognition Algorithms for Partial and Full Fingerprints." In 2008 IEEE Conference on Technologies for Homeland Security. IEEE, 2008. http://dx.doi.org/10.1109/ths.2008.4534494.
Full textOthman, Asem, and Arun Ross. "Fingerprint + Iris = IrisPrint." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181075.
Full textBaradarani, A., J. R. B. Taylor, F. Severin, and R. Gr Maev. "Advanced fingerprint verification software." In SPIE Defense + Security, edited by Edward M. Carapezza. SPIE, 2016. http://dx.doi.org/10.1117/12.2224244.
Full textYoon, Soweon, Jianjiang Feng, and Anil K. Jain. "On latent fingerprint enhancement." In SPIE Defense, Security, and Sensing, edited by B. V. K. Vijaya Kumar, Salil Prabhakar, and Arun A. Ross. SPIE, 2010. http://dx.doi.org/10.1117/12.851411.
Full textHwang, Kyungtae. "Statistical quality assessment of a fingerprint." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.541013.
Full textHuang, Ke, and Selin Aviyente. "Fingerprint verification based on wavelet subbands." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.541912.
Full textAlzahrani, Hamdan, and Terrance E. Boult. "Remote authentication using vaulted fingerprint verification." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Walter J. Scheirer, and Christoph Busch. SPIE, 2014. http://dx.doi.org/10.1117/12.2053126.
Full textRowe, Robert K., and Kristin A. Nixon. "Fingerprint enhancement using a multispectral sensor." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.606628.
Full textReports on the topic "Fingerprint Security"
Schlyter, J., and W. Griffin. Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4255.
Full text