Academic literature on the topic 'Fingerprint Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fingerprint Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Fingerprint Security"

1

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Full text
Abstract:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
APA, Harvard, Vancouver, ISO, and other styles
2

Syukron, Nur Hidayat. "Sistem Controling Engine Menggunakan Fingerprint Berbasis Arduino." Jurnal Ilmiah Informatika 4, no. 1 (June 30, 2019): 36–40. http://dx.doi.org/10.35316/jimi.v4i1.485.

Full text
Abstract:
The growth of motorcycles at this time is very fast. The case of motorcycle theft is still often the case, this happens because there is still a lack of security systems that exist in motor vehicles that only use the ignition key. In addition, the lack of human control systems are still often missed. Motorcycles are the main transportation at this time, so it needs to be made bicycle security system. Security is done in the form of a system with fingerprints in anticipation of the frequent mode of motorcycle theft, which can access by using fingerprints are certain people whose fingerprint data has been programmed into the system, so that the motorcycle can not live without the match between the fingerprint which is detected by the sensor by fingerprint.
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Himanshu, and Kapil Chauhan. "Role of Biometric security for The Enhancement of Data Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 10 (July 27, 2015): 6184–89. http://dx.doi.org/10.24297/ijct.v14i10.1832.

Full text
Abstract:
In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of making biometric security systems, the important area of concern is that how do one can implement the biometric security for increasing of data security. First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use fingerprint recognition for authentication process it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast. In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.
APA, Harvard, Vancouver, ISO, and other styles
4

Nusantar, Alrizal Akbar Nusantar Akbar, Ilham Ari Elbaith Zaeni, and Dyah Lestari. "Home Energy Security Prototype using Microcontroller Based on Fingerprint Sensor." Frontier Energy System and Power Engineering 1, no. 2 (July 26, 2019): 19. http://dx.doi.org/10.17977/um049v1i2p19-29.

Full text
Abstract:
The globalization era brings rapid development in technology.The human need for speed and easiness pushed them toinnovate, such as in the security field. Initially, the securitysystem was conducted manually and impractical compared tonowadays system. A security technology that is developed wasbiometric application, particularly fingerprint. Fingerprintbasedsecurity became a reliable enough system because of itsaccuracy level, safe, secure, and comfortable to be used ashousing security system identification. This research aimed todevelop a security system based on fingerprint biometric takenfrom previous researches by optimizing and upgrading theprevious weaknesses. This security system could be a solutionto a robbery that used Arduino UNO Atmega328P CH340 R3Board Micro USB port. The inputs were fingerprint sensor, 4x5keypad, and magnetic sensor, whereas the outputs were 12 Vsolenoid, 16x2 LCD, GSM SIM800L module, LED, andbuzzer. The advantage of this security system was its ability togive a danger sign in the form of noise when the systemdetected the wrong fingerprint or when it detects a forcedopening. The system would call the homeowner then. Otherthan that, this system notified the homeowner of all of theactivities through SMS so that it can be used as a long-distanceobservation. This system was completed with a push button toopen the door from the inside. The maximum fingerprints thatcould be stored were four users and one admin. The admin’sjob was to add/delete fingerprints, replace the home owner’sphone number, and change the system’s PIN. The resultsshowed that the fingerprint sensor read the prints in a relativelyfast time of 1.136 seconds. The average duration that wasneeded to send an SMS was 69 seconds while through call was3.2 seconds.
APA, Harvard, Vancouver, ISO, and other styles
5

Dake, Mr Ashish Prabhakar. "Fingerprint Based Security System." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (November 30, 2019): 585–89. http://dx.doi.org/10.22214/ijraset.2019.11094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szweda, Roy. "Holographic fingerprint security device." Network Security 1997, no. 7 (July 1997): 7. http://dx.doi.org/10.1016/s1353-4858(97)89874-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Yujia, and Xin Liu. "Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid." Journal of Electrical and Computer Engineering 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/1539298.

Full text
Abstract:
Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. Therefore, designing a fingerprint liveness detection module in fingerprint recognition systems is necessary. To solve the above problem and discriminate true fingerprint from fake ones, a novel software-based liveness detection approach using uniform local binary pattern (ULBP) in spatial pyramid is applied to recognize fingerprint liveness in this paper. Firstly, preprocessing operation for each fingerprint is necessary. Then, to solve image rotation and scale invariance, three-layer spatial pyramids of fingerprints are introduced in this paper. Next, texture information for three layers spatial pyramids is described by using uniform local binary pattern to extract features of given fingerprints. The accuracy of our proposed method has been compared with several state-of-the-art methods in fingerprint liveness detection. Experiments based on standard databases, taken from Liveness Detection Competition 2013 composed of four different fingerprint sensors, have been carried out. Finally, classifier model based on extracted features is trained using SVM classifier. Experimental results present that our proposed method can achieve high recognition accuracy compared with other methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Chunwei, Lina Yu, Huixian Chang, Sheng Shen, Fang Hou, and Yingwei Li. "Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System." Wireless Communications and Mobile Computing 2020 (November 30, 2020): 1–14. http://dx.doi.org/10.1155/2020/8841417.

Full text
Abstract:
A DLP (data loss prevention) system usually arranges network monitors at the network boundary to perform network traffic capture, file parsing, and strategy matching procedures. Strategy matching is a key process to prevent corporate secret-related documents from leaking. This paper adopts the document fingerprint similarity detection method based on the SimHash principle and customizes the KbS (Keyword-based SimHash) fingerprint, PbS (Paragraph-based SimHash) fingerprint, and SoP (SimHash of Paragraph) fingerprint, three different feature extraction SimHash algorithms for strategy matching to detect. The parsed unstructured data is stored as a file type in.txt format, and then a file fingerprint is generated. Matching the established sensitive document library to calculate the Hamming distance between the fingerprints, the Hamming distance values under different modification degrees are summarized. The experimental results reveal that the hybrid algorithmic strategy matching rules with different levels and accuracy are established. This paper has a reference role for the leakage prevention research of enterprise sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
9

Arai, Fumihito, and Toshio Fukuda. "Fingerprint Image Sensing Using Micromechanical Key and Extraction Algorithm for Sensed Fingerprint Image." Journal of Robotics and Mechatronics 13, no. 5 (October 20, 2001): 458–63. http://dx.doi.org/10.20965/jrm.2001.p0458.

Full text
Abstract:
A novel fingerprint image sensing device, which combines the ID bar code with fingerprints, has been proposed and developed. Due to the use of ID bar codes, higher security and less recognition time can be ensured. The device has been fabricated using new micromachining. The sensed image with this sensing device consists of both fingerprint patterns and ID bar lines. The corresponding extraction algorithm for the sensed fingerprint image has also been researched and developed. The algorithm extracts an ID bar image and a pure fingerprint image without ID bar lines from the single sensed image. The ID code can be extracted from the ID bar image, and the fingerprint image is processed to realize fingerprint identification.
APA, Harvard, Vancouver, ISO, and other styles
10

Nwankwo, C., G. Oletu, and O. B. Longe. "Security Enhancement of an Automated Teller Machine Using Fingerprint and Password." advances in multidisciplinary & scientific research journal publication 26, no. 1 (December 11, 2020): 45–50. http://dx.doi.org/10.22624/isteams/v26p5-ieee-ng-ts.

Full text
Abstract:
This paper focuses on how to enhanced security of Transactions in Automatic Teller Machine system using a multi-factor authentication system (Password and Fingerprint). In order to achieve security and to overcome illegal activities, shortcoming of piracy in money transactions, we propose the idea of using fingerprints of customers and password instead of traditional use of PIN number. After authorized verification, the customer will be able to proceed for transaction else after four successive wrong attempts, the ATM card will be ejected automatically and a message will be sent to the registered mobile number. The proposed system is developed to provide better security to the ATMs. Keywords— ATM, Fingerprint, PIN, Biometric.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Fingerprint Security"

1

Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.

Full text
Abstract:
This thesis studies the requirements and processes involved in building an authentication system using the fingerprint biometric, where the fingerprint template is protected during storage and during comparison. The principles developed in this thesis can be easily extended to authentication systems using other biometric modalities. Most existing biometric authentication systems store their template securely using an encryption function. However, in order to perform matching, the enrolled template must be decrypted. It is at this point that the authentication system is most vulnerable as the entire enrolled template is exposed. A biometric is irreplaceable if compromised and can also reveal sensitive information about an individual. If biometric systems are taken up widely, the template could also be used as an individual's digital identifier. Compromise in that case, violates an individual's right to privacy as their transactions in all systems where they used that compromised biometric can be tracked. Therefore securing a biometric template during comparison as well as storage in an authentication system is imperative. Eight different fingerprint template representation techniques, where templates were treated as a set of elements derived from the locations and orientations of fingerprint minutiae, were studied. Four main steps to build any biometric based authentication system were identified and each of the eight fingerprint template representations was inducted through the four steps. Two distinct Error Tolerant Cryptographic Constructs based on the set difference metric, were studied for their ability to securely store and compare each of the template types in an authentication system. The first construct was found to be unsuitable for a fundamental reason that would apply to all the template types considered in the research. The second construct did not have the limitation of the first and three algorithms to build authentication systems using the second construct were proposed. It was determined that minutiae-based templates had significant intra sample variation as a result of which a very relaxed matching threshold had to be set in the authentication system. The relaxed threshold caused the authentication systems built using the first two algorithms to reveal enough information about the stored templates to render them insecure. It was found that in cases of such large intra-sample variation, a commonality based match decision was more appropriate. One solution to building a secure authentication system using minutiae-based templates was demonstrated by the third algorithm which used a two stage matching process involving the second cryptographic construct and a commonality based similarity measure in the two stages respectively. This implementation was successful in securing the fingerprint template during comparison as well as storage, with minimal reduction in accuracy when compared to the matching performance without the cryptographic construct. Another solution is to use an efficient commonality based error tolerant cryptographic construct. This thesis lists the desirable characteristics of such a construct as existence of any is unknown to date. This thesis concludes by presenting good guidelines to evaluate the suitability of different cryptographic constructs to protect biometric templates of other modalities in an authentication system.
APA, Harvard, Vancouver, ISO, and other styles
2

Judd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sundblad, Anton, and Gustaf Brunberg. "Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139227.

Full text
Abstract:
Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. This thesis examines the possibility of replacing a TEE with a hypervisor-based solution instead, with the intention of keeping the same security features that a TEE can offer. To carry out the evaluation a suitable method is constructed. This method makes use of fault trees to be able to find possible vulnerabilities in both systems, and these vulnerabilities are then documented. The vulnerabilities of both systems are also compared to each other to identify differences in how they are handled. It is concluded that if the target platform has the ability to implement a TEE solution, it can also implement the same solution using a hypervisor. However, the authors recommend against porting a working TEE solution, as TEEs often offer finished APIs for common operations that would require re-implementation in the examined hypervisor.
APA, Harvard, Vancouver, ISO, and other styles
4

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Full text
Abstract:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

APA, Harvard, Vancouver, ISO, and other styles
5

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with a high level of security.
APA, Harvard, Vancouver, ISO, and other styles
6

Born, Kenton P. "Combating client fingerprinting through the real-time detection and analysis of tailored web content." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/13277.

Full text
Abstract:
Doctor of Philosophy
Department of Computing Science
David Gustafson
The web is no longer composed of static resources. Technology and demand have driven the web towards a complex, dynamic model that tailors content toward specific client fingerprints. Servers now commonly modify responses based on the browser, operating system, or location of the connecting client. While this information may be used for legitimate purposes, malicious adversaries can also use this information to deliver misinformation or tailored exploits. Currently, there are no tools that allow a user to detect when a response contains tailored content. Developing an easily configurable multiplexing system solved the problem of detecting tailored web content. In this solution, a custom proxy receives the initial request from a client, duplicating and modifying it in many ways to change the browser, operating system, and location-based client fingerprint. All of the requests with various client fingerprints are simultaneously sent to the server. As the responses are received back at the proxy, they are aggregated and analyzed against the original response. The results of the analysis are then sent to the user along with the original response. This process allowed the proxy to detect tailored content that was previously undetectable through casual browsing. Theoretical and empirical analysis was performed to ensure the multiplexing proxy detected tailored content at an acceptable false alarm rate. Additionally, the tool was analyzed for its ability to provide utility to open source analysts, cyber analysts, and reverse engineers. The results showed that the proxy is an essential, scalable tool that provides capabilities that were not previously available.
APA, Harvard, Vancouver, ISO, and other styles
7

Breedt, Morne. "Integrating biometric authentication into multiple applications." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/27605.

Full text
Abstract:
The Internet has grown from its modest academic beginnings into an important, global communication medium. It has become a significant, intrinsic part of our lives, how we distribute information and how we transact. It is used for a variety of purposes, including: banking; home shopping; commercial trade - using EDI (Electronic Data Interchange); and to gather information for market research and other activities. Owing to its academic origins, the early developers of the Internet did not focus on security. However, now that it has rapidly evolved into an extensively used, global commercial transaction and distribution channel, security has become a big concern. Fortunately, the field of information security has started to evolve in response and is fast becoming an important discipline with a sound theoretical basis. The discipline views the twin processes of identification and authentication as crucial aspects of information security. An individual access attempt must be identifiable prior to access being authorised otherwise system confidentiality cannot be enforced nor integrity safeguarded. Similarly, non-denial becomes impossible to instigate since the system is unable to log an identity against specific transactions. Consequently, identification and authentication should always be viewed as the first step to successfully enforcing information security. The process of identification and authorisation is, in essence, the ability to prove or verify an identity. This is usually accomplished using either one or a combination of the following three traditional identification techniques: something you possess; something you know; or something you are. A critical consideration when designing an application is which identification method, or combination of methods, from the three described above to use. Each method offers its own pros and cons and there are many ways to compare and contrast them. The comparison made in this study identifies biometrics as the best solution in a distributed application environment. There are, however, two over-arching hindrances to its widespread adoption. The first is the environment’s complexity - with multiple applications being accessed by both the public and the private sectors - and the second is that not all biometrics are popular and no single method has universe appeal. The more significant hindrance of the two is the latter, that of acceptance and trust, because it matters little how good or efficient a system is if nobody is willing to use it. This observation suggests that the identification system needs to be made as flexible as possible. In a democratic society, it could be argued that the best way of ensuring the successful adoption of a biometric system would be to allow maximum freedom of choice and let users decide which biometric method they would like to use. Although this approach is likely to go a long way towards solving the acceptance issue, it increases the complexity of the environment significantly. This study attempts to solve this problem by reducing the environment’s complexity while simultaneously ensuring the user retains maximum biometric freedom of choice. This can be achieved by creating a number of central biometric repositories. Each repository would be responsible for maintaining a biometric template data store for a type of biometric. These repositories or “Biometric Authorities” would act as authentication facilitators for a wide variety of applications and free them from that responsibility.
Dissertation (MSc (Computer Engineering))--University of Pretoria, 2007.
Electrical, Electronic and Computer Engineering
MSc
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
8

Hanner, Martin, and Tobias Björk. "Biometri vid fysisk access : En jämförande studie mellan ansiktsigenkänning och fingeravtrycksavläsning." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-910.

Full text
Abstract:

In today’s society, people often find themselves in situations where they need to be identified;for example when we buy alcohol, need to use an ATM or log on to our e-mail account. The most common methods today that are used for these kinds of matters are antiquated, and in

the meantime, criminals all over the world get more sophisticated. Companies invest billions every day in order to protect their interests. Maybe it’s time that we finally give biometrics the

attention that it deserves.

This essay aims to describe the biometric methods that are available today, find some of the most effective when it comes to physical access and make a comparison. Face recognition and fingerprint scanning will be described more thoroughly. Pros and cons will be analyzed and the theory will be linked to interviews with three Swedish organisations.


I dagens samhälle hamnar vi människor regelbundet i situationer där vi blir tvungna att identifiera oss. Det kan till exempelvis vara när vi köper alkohol, tar ut pengar eller loggar in på vårt e-mailkonto. De vanligaste metoderna, som idag används för dessa identifieringar, har funnits länge och är föråldrade och i takt med detta blir brottslingar världen allt mer sofistikerade. Dagligen investerar företag världen över miljarder för att skydda exempelvis

data med hjälp av koder och andra mjukvaruinstallationer. Kanske är det istället dags för att vi ger biometrin en ordentlig chans.

Den här uppsatsen syftar till att redogöra för de biometriska säkerhetsmetoder som finns tillgängliga, identifiera några av de effektivaste när det gäller fysisk access och jämföra dessa med varandra. Det är framförallt ansiktsigenkänning och fingeravtrycksavläsning som kommer att ges mycket plats i studien. För- och nackdelar kommer att tas upp och teorin kommer att kopplas till intervjuer gjorda med tre svenska företag.

APA, Harvard, Vancouver, ISO, and other styles
9

Chitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.

Full text
Abstract:
Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure.
APA, Harvard, Vancouver, ISO, and other styles
10

Gajland, Phillip. "On Statistical Properties of Arbiter Physical Unclonable Functions." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672.

Full text
Abstract:
The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50 billion Internet connected devices. With more entry points to a network, adversaries can potentially use IoT devices as a stepping stone for attacking other devices connected to the network or the network itself. Information security relies on cryptographic primitives that, in turn, depend on secret keys. Furthermore, the issue of Intellectual property (IP) theft in the field of Integrated circuit (IC) design can be tackled with the help of unique device identifiers. Physical unclonable functions (PUFs) provide a tamper-resilient solution for secure key storage and fingerprinting hardware. PUFs use intrinsic manufacturing differences of ICs to assign unique identities to hardware. Arbiter PUFs utilise the differences in delays of identically designed paths, giving rise to an unpredictable response unique to a given IC. This thesis explores the statistical properties of Boolean functions induced by arbiter PUFs. In particular, this empirical study looks into the distribution of induced functions. The data gathered shows that only 3% of all possible 4-variable functions can be induced by a single 4 stage arbiter PUF. Furthermore, some individual functions are more than 5 times more likely than others. Hence, the distribution is non-uniform. We also evaluate alternate PUF designs, improving the coverage vastly, resulting in one particular implementation inducing all 65,536 4-variable functions. We hypothesise the need for n XORed PUFs to induce all 22n possible n-variable Boolean functions.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Fingerprint Security"

1

Bhanu, Bir. Computational algorithms for fingerprint recognition. Boston, MA: Kluwer Academic Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xuejun, Tan, ed. Computational algorithms for fingerprint recognition. Boston: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Senate. A bill to amend title IV of the Social Security Act to require States to establish a 2-digit fingerprint matching identification system in order to prevent multiple enrollments by an individual for benefits under such Act, and for other purposes. [Washington, D.C.?]: [United States Government Printing Office], 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhanu, Bir. Computational Algorithms for Fingerprint Recognition. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tan, Xuejun, and Bir Bhanu. Computational Algorithms for Fingerprint Recognition (International Series on Biometrics). Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fairhurst, Michael. Biometrics: A Very Short Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/actrade/9780198809104.001.0001.

Full text
Abstract:
Biometrics is the scientific discipline of identifying individuals by means of the measurement of unique personal attributes, such as facial appearance, fingerprints, iris patterning, the voice, the way we write, and the way we walk. The new technologies of biometrics have a wide range of practical applications, from securing mobile phones and laptops to establishing identity in bank transactions, travel documents, and national identity cards. Biometrics: A Very Short Introduction considers the capabilities of biometrics-based identity checking and looks at the basic techniques in use today, developments in system design, and emerging technologies. It also explores the benefits and limitations of biometrics technologies, and how they can effectively support our increasingly interconnected society.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Fingerprint Security"

1

Donida Labati, Ruggero, and Fabio Scotti. "Fingerprint." In Encyclopedia of Cryptography and Security, 460–65. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Donida Labati, Ruggero, and Fabio Scotti. "Fingerprint." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_740-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Marcus, Monique Mann, and Gregor Urbas. "Fingerprint biometrics." In Biometrics, Crime and Security, 22–36. New York : Routledge, 2018. | Series: Law, science and society: Routledge, 2018. http://dx.doi.org/10.4324/9781315182056-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Yanming, Wei Zhou, Xuefei Yin, and Jiankun Hu. "3D Fingerprint." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shahandashti, Siamak F., Reihaneh Safavi-Naini, and Philip Ogunbona. "Private Fingerprint Matching." In Information Security and Privacy, 426–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chung, Yongwha, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, and Dosung Ahn. "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault." In Information Security and Cryptology, 358–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599548_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kohlhepp, Brian. "Investigations (DNA – Fingerprint)." In Encyclopedia of Security and Emergency Management, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_25-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malhotra, Aakarsh, Mayank Vatsa, and Richa Singh. "Unconstrained Fingerprint Biometrics." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1511-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ang, Russell, Rei Safavi-Naini, and Luke McAven. "Cancelable Key-Based Fingerprint Templates." In Information Security and Privacy, 242–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarier, Neyire Deniz. "Private Minutia-Based Fingerprint Matching." In Information Security Theory and Practice, 52–67. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24018-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Fingerprint Security"

1

Wenzl, Matthias, and Daniel Kluka. "Adding Channel Security to a Fingerprint Verification Chain." In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67356.

Full text
Abstract:
Authenticating persons using fingerprints is a widely accepted method in the field of access control, border control, prosecution and many others. Today, fingerprint modules with customizable firmware can be bought commercially off the shelf by hobbyists and small companies to be used in their applications and are usually locally separated from a controller implementing the feature extraction and comparison algorithms. As a matter of fact, the communication channel between the sensor and the controller module is susceptible to eavesdropping and man in the middle attacks. Nevertheless, adding communication channel security to such a system has a direct negative impact on the system’s response time, thus directly affecting user acceptance. The aim of this paper is to provide a comprehensive investigation on measures to counter run-time degredation when adding communication channel security on behalf of an existing fingerprint verification chain. We show that a combination of the elliptic curve Diffie-Hellman key exchange together with AES-256 and the use of parallelization using OpenMP on a controller node leads to an acceptable run time making key creation and exchange upon every fingerprint read request a suitable undertaking.
APA, Harvard, Vancouver, ISO, and other styles
2

Yeung, Hoi Wo, Yiu Sang Moon, and Ka Cheong Chan. "Fingerprint registration for small fingerprint sensors." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.542919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mil'shtein, S., A. Pillai, A. Shendye, C. Liessner, and M. Baier. "Fingerprint Recognition Algorithms for Partial and Full Fingerprints." In 2008 IEEE Conference on Technologies for Homeland Security. IEEE, 2008. http://dx.doi.org/10.1109/ths.2008.4534494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Othman, Asem, and Arun Ross. "Fingerprint + Iris = IrisPrint." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baradarani, A., J. R. B. Taylor, F. Severin, and R. Gr Maev. "Advanced fingerprint verification software." In SPIE Defense + Security, edited by Edward M. Carapezza. SPIE, 2016. http://dx.doi.org/10.1117/12.2224244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yoon, Soweon, Jianjiang Feng, and Anil K. Jain. "On latent fingerprint enhancement." In SPIE Defense, Security, and Sensing, edited by B. V. K. Vijaya Kumar, Salil Prabhakar, and Arun A. Ross. SPIE, 2010. http://dx.doi.org/10.1117/12.851411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hwang, Kyungtae. "Statistical quality assessment of a fingerprint." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.541013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Ke, and Selin Aviyente. "Fingerprint verification based on wavelet subbands." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.541912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alzahrani, Hamdan, and Terrance E. Boult. "Remote authentication using vaulted fingerprint verification." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Walter J. Scheirer, and Christoph Busch. SPIE, 2014. http://dx.doi.org/10.1117/12.2053126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rowe, Robert K., and Kristin A. Nixon. "Fingerprint enhancement using a multispectral sensor." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.606628.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Fingerprint Security"

1

Schlyter, J., and W. Griffin. Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography