Dissertations / Theses on the topic 'Fingerprint Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 27 dissertations / theses for your research on the topic 'Fingerprint Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.
Full textJudd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.
Full textSundblad, Anton, and Gustaf Brunberg. "Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139227.
Full textBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Full textVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textBorn, Kenton P. "Combating client fingerprinting through the real-time detection and analysis of tailored web content." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/13277.
Full textDepartment of Computing Science
David Gustafson
The web is no longer composed of static resources. Technology and demand have driven the web towards a complex, dynamic model that tailors content toward specific client fingerprints. Servers now commonly modify responses based on the browser, operating system, or location of the connecting client. While this information may be used for legitimate purposes, malicious adversaries can also use this information to deliver misinformation or tailored exploits. Currently, there are no tools that allow a user to detect when a response contains tailored content. Developing an easily configurable multiplexing system solved the problem of detecting tailored web content. In this solution, a custom proxy receives the initial request from a client, duplicating and modifying it in many ways to change the browser, operating system, and location-based client fingerprint. All of the requests with various client fingerprints are simultaneously sent to the server. As the responses are received back at the proxy, they are aggregated and analyzed against the original response. The results of the analysis are then sent to the user along with the original response. This process allowed the proxy to detect tailored content that was previously undetectable through casual browsing. Theoretical and empirical analysis was performed to ensure the multiplexing proxy detected tailored content at an acceptable false alarm rate. Additionally, the tool was analyzed for its ability to provide utility to open source analysts, cyber analysts, and reverse engineers. The results showed that the proxy is an essential, scalable tool that provides capabilities that were not previously available.
Breedt, Morne. "Integrating biometric authentication into multiple applications." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/27605.
Full textDissertation (MSc (Computer Engineering))--University of Pretoria, 2007.
Electrical, Electronic and Computer Engineering
MSc
unrestricted
Hanner, Martin, and Tobias Björk. "Biometri vid fysisk access : En jämförande studie mellan ansiktsigenkänning och fingeravtrycksavläsning." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-910.
Full textIn today’s society, people often find themselves in situations where they need to be identified;for example when we buy alcohol, need to use an ATM or log on to our e-mail account. The most common methods today that are used for these kinds of matters are antiquated, and in
the meantime, criminals all over the world get more sophisticated. Companies invest billions every day in order to protect their interests. Maybe it’s time that we finally give biometrics the
attention that it deserves.
This essay aims to describe the biometric methods that are available today, find some of the most effective when it comes to physical access and make a comparison. Face recognition and fingerprint scanning will be described more thoroughly. Pros and cons will be analyzed and the theory will be linked to interviews with three Swedish organisations.
I dagens samhälle hamnar vi människor regelbundet i situationer där vi blir tvungna att identifiera oss. Det kan till exempelvis vara när vi köper alkohol, tar ut pengar eller loggar in på vårt e-mailkonto. De vanligaste metoderna, som idag används för dessa identifieringar, har funnits länge och är föråldrade och i takt med detta blir brottslingar världen allt mer sofistikerade. Dagligen investerar företag världen över miljarder för att skydda exempelvis
data med hjälp av koder och andra mjukvaruinstallationer. Kanske är det istället dags för att vi ger biometrin en ordentlig chans.
Den här uppsatsen syftar till att redogöra för de biometriska säkerhetsmetoder som finns tillgängliga, identifiera några av de effektivaste när det gäller fysisk access och jämföra dessa med varandra. Det är framförallt ansiktsigenkänning och fingeravtrycksavläsning som kommer att ges mycket plats i studien. För- och nackdelar kommer att tas upp och teorin kommer att kopplas till intervjuer gjorda med tre svenska företag.
Chitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.
Full textGajland, Phillip. "On Statistical Properties of Arbiter Physical Unclonable Functions." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672.
Full textAl-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Full textAl-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Full textZebbiche, K. "Data Hiding for Securing Fingerprint Data Access." Thesis, Queen's University Belfast, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.517622.
Full textNorris-Jones, Lynne. "Demonstrate and document : the development of a best practice model for biometric access control management." Thesis, Cardiff Metropolitan University, 2011. http://hdl.handle.net/10369/6411.
Full textLindblom, Martin. "Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178397.
Full textRahbari, Hanif. "Obfuscation of Transmission Fingerprints for Secure Wireless Communications." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612371.
Full textPolehňa, Dominik. "Útok hrubou silou na přístupový systém s pomocí syntetických otisků prstů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417209.
Full textLodrová, Dana. "Bezpečnost biometrických systémů." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-261226.
Full textNavrátil, Petr. "Podpora výuky biometrických přístupových systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217304.
Full textLamare, François. "OCT en phase pour la reconnaissance biométrique par empreintes digitales et sa sécurisation." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0003/document.
Full textIn an increasingly open world, the flows of people are brought to explode in the coming years. Facilitating, streamlining, and managing these flows, by maintaining strict security constraints, therefore represent a key element for the global socio-economic dynamism. This flows management is mainly based on knowledge and verification of person identity. For its practicality and a priori secured, biometrics, in particular fingerprints biometrics, has become an effective and unavoidable solution.Nevertheless, it still suffers from two severe limitations. The first one concerns the poor performances obtained with damaged fingers. This damage can be involuntary (e.g. manual workers) or volunteers, for purposes of anonymity. The second limitation consists in the vulnerability of the commonly used sensors. In particular, they are vulnerable to copies of stolen fingerprints, made by malicious persons for identity theft purpose. We believe that these limitations are due to the small amount of information brought by the usual biometric sensors. It often consists in a single print of the finger surface. However, the biological complexity of human tissue provides rich information, unique to each person, and very difficult to reproduce. We therefore proposed an imaging approach based on Optical Coherence Tomography (OCT), a 3D contactless optical sensor, to finely measure this information. The main idea of the thesis is therefore to explore novel ways to exploit this information in order to make biometrics more robust and truly secured. In particular, we have proposed and evaluated different fingerprint imaging methods, based on the phase of the OCT signal
Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Full textWu, Yan-Dian, and 吳彥典. "Combine watermark with fingerprint to promotethe electronics patient record security." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/61415210676521821125.
Full text國立高雄應用科技大學
電子工程系
97
Due to the rapid development of information technology, and continuing innovation and evolution with the constant upgrading of computer performance, the price kept on falling, the computer has been in the hospital medical care, teaching, scientific and technological research ... etc. more and more widely. Computerized hospital information system has become a modern hospital operating process, the essential infrastructure and technical support for the environment, the development of hospital information systems have become an increasing emphasis on health care industry. Medical-related industries also have the use of digital technology products to help build and structure as a hospital information system, such as: electronic patient record system, the fingerprint recognition system, tele-monitoring system, newsletter system, radio frequency identification systems, etc., and continuously applied to a wide range of process on medical services. Electronic patient record system information has always been one of the important topics of systematic, patients included a wide range of electronic medical records and patient health-related information from the medical records of the patients, out-patient records of diagnosis and treatment of patients with the emergency room for consultation with the medical records of the contents of medical imaging, record the information with patients is closely related to improper preservation of medical institutions is not only a breach of the provisions of medical law, and information so that these patients without their consent to be an open, leakage, this patients have been violations of data security and privacy. However, further sophisticated hospital information system, without doing any proper and effective security, as easy as the invasion was easily stolen electronic medical records, hospital information system in order to improve the safety and protection of patient privacy, hospital information system to strengthen information security become very important projects and subject. In this study, combined with popular watermark technology and fingerprint recognition technology for electronic medical records system. Ready to use their own unique fingerprint, to log in as an electronic fingerprint database of the confidential medical records of keys for identification. And fingerprint images in the log in the process of embedding watermark images, to avoid misappropriation of man-made, to ensure that patient privacy and medical records of user security, maintain the normal operation of electronic medical records, of great effectiveness.
Liu, Hai-Chen, and 劉海真. "Combine fingerprint with RFID to promote the computer information security." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/18668638910598308947.
Full text國立高雄應用科技大學
電子工程系
97
Computer and Internet applications, has become indispensable to daily life and work are closely related to one, so there are many things must be done through the computer. Although the computer has a lot of convenience, but in the information security, there are still many doubts, because the network can be determined hacker or theft of computer hardware in order to obtain inside information on the computer, and then a lot of personal data leaks social cases. Therefore in order to improve computer security, this study was the use of technical maturity and popularity of the RFID system to identify the identity of knowledge as a database log on to the computer can improve the current account password to log in only the shortcomings of the system, only RFID system as a boarding into the computer database, and can not really distinguish the identity of the cardholder, it has a unique combination of fingerprint recognition technology, used in computer and information security systems, can effectively enhance the security of information stored in computer security. The purpose of this system is to enhance security of computer database, using RFID technology that is the most popular and easy to carry be a first login system, and has a unique combination of fingerprint recognition technology as a second checkpoint. Use this double-crossing as the identity of the user, and so will be more to protect computer database security, great results. Keywords: theft-proof, fingerprint distinguished, RFID.
MOU, HSI-WEI, and 牟錫偉. "A Security and Energy Saving System Design Based on Fingerprint Recognition." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/aq2amm.
Full text聖約翰科技大學
電機工程系碩士班
107
Fingerprint identification is one of the biometric technologies, and it has good suitability for safety and convenience. This paper is based on fingerprint identification, combined with the concept of IoT, using Bluetooth and 4G LTE technology for wireless communication to develop a security and energy saving system for home or office. In this paper, the fingerprint identification module is used as the basis for sign in or sign out, and it is also used in the application of security drawers. The Arduino Uno board is used as the embedded processor and the Raspberry Pi is used as a heterogeneous core to construct this system. And used RELAY to control the power switch to realize the energy-saving. Finally, it used 4G LTE technology and a Raspberry Pi camera to construct a system with security.
chen, pu-wei, and 陳步偉. "Implementation of a fingerprint identification security system with an embedded ARM-based platform." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/87019964306636305629.
Full text長庚大學
電子工程研究所
94
In this research, a multi-function fingerprint security system is developed. Such an application was successfully realized via a commercial development board, so-called the “Creator”, with an embedded ARM CPU. The overall structure of the proposed security system mainly consists of three parts: a Creator as the client, a PC-based server, and the network programming based communications part. After establishing the embedded software development environment, and porting the functions on the Creator board, the on-board ARM CPU executes all required calculations for fingerprint feature extraction in a real-time fashion, and plays the central role of the system. The PC-based server then receives feature vectors from the Creator to perform the task of fingerprint matching further. According to the results of matching, the server controls the entrance of the restricted area (for example, a Lab). In the meantime, the server also controls the access to the equipment or machines, such as PC’s, in the area. Such a security system actually takes the advantage of internet communications technology for information transmission from a remote measurement site (client) to the monitoring and controlling center (server). In addition, a modified image binarization algorithm is also proposed in this study. It has the merits of lower time and memory complexity, and thus is very suitable for the applications into the embedded systems.
Lin, Wen Ren, and 林文仁. "The Relationship Between Fingerprint Database And The Effectiveness Of Public Security -Taking FengShan Police Station of Kaohsiung City As An Example." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/78081408104438115480.
Full text東海大學
公共事務碩士在職專班
100
In this study, qualitative research methods are adopted, and with the ways of purposive sampling and snowball method, to proceed In-depth interviews, based on the interviewees’ jobs owning understanding and Practical experience to forensic science, crime investigation and the job of maintaining public security. To discuss and talk over the relationship between fingerprint database and the public security, the general public are also interviewed (including neighborhood representatives), and I attempted to understand the area residents’ ideas, thoughts and suggestions to this study issue. Next, refer to the relative statistics as national criminal cases fingerprint forensics tables from National Police Administration's Criminal Investigation Bureau (2008~2011) and vidence Collecting results tables from Kaohsiung Government Police City Department Fengshan Branch (2006~2011) Fingerprint can be used in the way of crime investigation; it also has many functions such as identity recognition and confirmation to demented old people, patients fall by roadsides, homeless people, nameless dead and victims of accidents or disasters, and it can help to avoid mentally or physically disabled children be missing. Replace the seal with fingerprints has the functions like avoiding imposture and so on. Therefore, fingerprint database do has positive benefit to the society security. Although, fingerprint data does help to crime investigation and identity recognition, the establishment involves with invasion of personal privacy. Like a double-edged sword, it can do a great help for the public society, but it can sometimes be harmful when being used with bad intentions. However, what the public concern most is the problem that fingerprint data may be disclosed or pirated and stolen . People have many concerns and don’t understand to the confidentiality protection of fingerprint data.Consequently, it is necessary to set up special laws and regulations for the use of fingerprint, also to establish comprehensive security systems, to ensure the security of fingerprint database in applications and management, so that government can be trusted by the public. In addition, crime investigations and identity recognitions both rely on forensic science. Thus, the establishments of fingerprint database and DNA database have more importance. In the aspect of official authorities which maintain the public security, always for establishing a complete fingerprint database, yet the human rights groups are against to it. Social society should always find a way to balance them both. On account of this, to maintain public security and also protect human rights efficiently and to create a win-win situation, and then to build up a safe and better living environment for people are the most important and best thing for the society and country. Keywords: fingerprint, fingerprint database, effects of public security, privacy
Lin, Tri-Show, and 林姿秀. "On the Security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/08815099713877871201.
Full text東海大學
資訊工程與科學系碩士在職專班
93
In 2003 ( ACM Operating Systems Review, Vol.37), Kim, Lee and Yoo [1] proposed an ID-based password authentication scheme for log-on to a remote server using smart card, password and fingerprint. In this paper, we show that the KLY protocol is vulnerable to an active adversary who can extract some information embedded in the smart card by using existing smart cards attack methods. By getting the information and eavesdropping the previous login messages of a legal user, an attacker without any password or fingerprint can successfully forge the legal user to obtain services from the system. In this case, the protocol is not sufficient for systems with high level security requirements. We point out a cryptanalysis of KLY scheme and propose a data compromise attack algorithm and replay attack algorithm. We also hope that the benefit of the science and technique can improve the security of the remote user authentication.