Journal articles on the topic 'Fingerprint Security'

To see the other types of publications on this topic, follow the link: Fingerprint Security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Fingerprint Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Full text
Abstract:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
APA, Harvard, Vancouver, ISO, and other styles
2

Syukron, Nur Hidayat. "Sistem Controling Engine Menggunakan Fingerprint Berbasis Arduino." Jurnal Ilmiah Informatika 4, no. 1 (June 30, 2019): 36–40. http://dx.doi.org/10.35316/jimi.v4i1.485.

Full text
Abstract:
The growth of motorcycles at this time is very fast. The case of motorcycle theft is still often the case, this happens because there is still a lack of security systems that exist in motor vehicles that only use the ignition key. In addition, the lack of human control systems are still often missed. Motorcycles are the main transportation at this time, so it needs to be made bicycle security system. Security is done in the form of a system with fingerprints in anticipation of the frequent mode of motorcycle theft, which can access by using fingerprints are certain people whose fingerprint data has been programmed into the system, so that the motorcycle can not live without the match between the fingerprint which is detected by the sensor by fingerprint.
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Himanshu, and Kapil Chauhan. "Role of Biometric security for The Enhancement of Data Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 10 (July 27, 2015): 6184–89. http://dx.doi.org/10.24297/ijct.v14i10.1832.

Full text
Abstract:
In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of making biometric security systems, the important area of concern is that how do one can implement the biometric security for increasing of data security. First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use fingerprint recognition for authentication process it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast. In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.
APA, Harvard, Vancouver, ISO, and other styles
4

Nusantar, Alrizal Akbar Nusantar Akbar, Ilham Ari Elbaith Zaeni, and Dyah Lestari. "Home Energy Security Prototype using Microcontroller Based on Fingerprint Sensor." Frontier Energy System and Power Engineering 1, no. 2 (July 26, 2019): 19. http://dx.doi.org/10.17977/um049v1i2p19-29.

Full text
Abstract:
The globalization era brings rapid development in technology.The human need for speed and easiness pushed them toinnovate, such as in the security field. Initially, the securitysystem was conducted manually and impractical compared tonowadays system. A security technology that is developed wasbiometric application, particularly fingerprint. Fingerprintbasedsecurity became a reliable enough system because of itsaccuracy level, safe, secure, and comfortable to be used ashousing security system identification. This research aimed todevelop a security system based on fingerprint biometric takenfrom previous researches by optimizing and upgrading theprevious weaknesses. This security system could be a solutionto a robbery that used Arduino UNO Atmega328P CH340 R3Board Micro USB port. The inputs were fingerprint sensor, 4x5keypad, and magnetic sensor, whereas the outputs were 12 Vsolenoid, 16x2 LCD, GSM SIM800L module, LED, andbuzzer. The advantage of this security system was its ability togive a danger sign in the form of noise when the systemdetected the wrong fingerprint or when it detects a forcedopening. The system would call the homeowner then. Otherthan that, this system notified the homeowner of all of theactivities through SMS so that it can be used as a long-distanceobservation. This system was completed with a push button toopen the door from the inside. The maximum fingerprints thatcould be stored were four users and one admin. The admin’sjob was to add/delete fingerprints, replace the home owner’sphone number, and change the system’s PIN. The resultsshowed that the fingerprint sensor read the prints in a relativelyfast time of 1.136 seconds. The average duration that wasneeded to send an SMS was 69 seconds while through call was3.2 seconds.
APA, Harvard, Vancouver, ISO, and other styles
5

Dake, Mr Ashish Prabhakar. "Fingerprint Based Security System." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (November 30, 2019): 585–89. http://dx.doi.org/10.22214/ijraset.2019.11094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szweda, Roy. "Holographic fingerprint security device." Network Security 1997, no. 7 (July 1997): 7. http://dx.doi.org/10.1016/s1353-4858(97)89874-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Yujia, and Xin Liu. "Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid." Journal of Electrical and Computer Engineering 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/1539298.

Full text
Abstract:
Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. Therefore, designing a fingerprint liveness detection module in fingerprint recognition systems is necessary. To solve the above problem and discriminate true fingerprint from fake ones, a novel software-based liveness detection approach using uniform local binary pattern (ULBP) in spatial pyramid is applied to recognize fingerprint liveness in this paper. Firstly, preprocessing operation for each fingerprint is necessary. Then, to solve image rotation and scale invariance, three-layer spatial pyramids of fingerprints are introduced in this paper. Next, texture information for three layers spatial pyramids is described by using uniform local binary pattern to extract features of given fingerprints. The accuracy of our proposed method has been compared with several state-of-the-art methods in fingerprint liveness detection. Experiments based on standard databases, taken from Liveness Detection Competition 2013 composed of four different fingerprint sensors, have been carried out. Finally, classifier model based on extracted features is trained using SVM classifier. Experimental results present that our proposed method can achieve high recognition accuracy compared with other methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Chunwei, Lina Yu, Huixian Chang, Sheng Shen, Fang Hou, and Yingwei Li. "Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System." Wireless Communications and Mobile Computing 2020 (November 30, 2020): 1–14. http://dx.doi.org/10.1155/2020/8841417.

Full text
Abstract:
A DLP (data loss prevention) system usually arranges network monitors at the network boundary to perform network traffic capture, file parsing, and strategy matching procedures. Strategy matching is a key process to prevent corporate secret-related documents from leaking. This paper adopts the document fingerprint similarity detection method based on the SimHash principle and customizes the KbS (Keyword-based SimHash) fingerprint, PbS (Paragraph-based SimHash) fingerprint, and SoP (SimHash of Paragraph) fingerprint, three different feature extraction SimHash algorithms for strategy matching to detect. The parsed unstructured data is stored as a file type in.txt format, and then a file fingerprint is generated. Matching the established sensitive document library to calculate the Hamming distance between the fingerprints, the Hamming distance values under different modification degrees are summarized. The experimental results reveal that the hybrid algorithmic strategy matching rules with different levels and accuracy are established. This paper has a reference role for the leakage prevention research of enterprise sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
9

Arai, Fumihito, and Toshio Fukuda. "Fingerprint Image Sensing Using Micromechanical Key and Extraction Algorithm for Sensed Fingerprint Image." Journal of Robotics and Mechatronics 13, no. 5 (October 20, 2001): 458–63. http://dx.doi.org/10.20965/jrm.2001.p0458.

Full text
Abstract:
A novel fingerprint image sensing device, which combines the ID bar code with fingerprints, has been proposed and developed. Due to the use of ID bar codes, higher security and less recognition time can be ensured. The device has been fabricated using new micromachining. The sensed image with this sensing device consists of both fingerprint patterns and ID bar lines. The corresponding extraction algorithm for the sensed fingerprint image has also been researched and developed. The algorithm extracts an ID bar image and a pure fingerprint image without ID bar lines from the single sensed image. The ID code can be extracted from the ID bar image, and the fingerprint image is processed to realize fingerprint identification.
APA, Harvard, Vancouver, ISO, and other styles
10

Nwankwo, C., G. Oletu, and O. B. Longe. "Security Enhancement of an Automated Teller Machine Using Fingerprint and Password." advances in multidisciplinary & scientific research journal publication 26, no. 1 (December 11, 2020): 45–50. http://dx.doi.org/10.22624/isteams/v26p5-ieee-ng-ts.

Full text
Abstract:
This paper focuses on how to enhanced security of Transactions in Automatic Teller Machine system using a multi-factor authentication system (Password and Fingerprint). In order to achieve security and to overcome illegal activities, shortcoming of piracy in money transactions, we propose the idea of using fingerprints of customers and password instead of traditional use of PIN number. After authorized verification, the customer will be able to proceed for transaction else after four successive wrong attempts, the ATM card will be ejected automatically and a message will be sent to the registered mobile number. The proposed system is developed to provide better security to the ATMs. Keywords— ATM, Fingerprint, PIN, Biometric.
APA, Harvard, Vancouver, ISO, and other styles
11

Bharani, P. J., B. Gopinath, and R. Goutham. "A Prototype of Fingerprint and ZigBee Based Train Ignition System." Advanced Engineering Forum 6-7 (September 2012): 1129–34. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1129.

Full text
Abstract:
At present, number of vehicles is successfully implementing fingerprint system for authentic ignition. By this system unauthorized accessing of the train or mishandlings can be avoided. The Fingerprint and ZigBee based Train Ignition system can serve as a robust security mechanism and can avoid trains being driven by unauthorized person at any circumstances. Fingerprints are the most widely used form of biometric identification overtime and the critical step in exploring its advantages is to adopt it for use as a form of security in already existing systems, such as trains.
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Yijun, Jianping Yu, Peng Zhang, and Shulan Wang. "A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication." Computational and Mathematical Methods in Medicine 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/673867.

Full text
Abstract:
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
APA, Harvard, Vancouver, ISO, and other styles
13

Meyer, Helen. "Fingerprint sensors solve security problems." Computers & Security 18, no. 2 (January 1999): 149. http://dx.doi.org/10.1016/s0167-4048(99)80030-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bae, Kyoung-Yul. "Smartphone Security Using Fingerprint Password." Journal of Intelligence and Information Systems 19, no. 3 (September 30, 2013): 45–55. http://dx.doi.org/10.13088/jiis.2013.19.3.045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sugiarto, Rio Rizky, and Muhammad Aria Rajasa. "Motorcycle Security use GPS and LCD Nextion based microcontrollers." Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan 6, no. 2 (October 25, 2018): 47–57. http://dx.doi.org/10.34010/telekontran.v6i2.3799.

Full text
Abstract:
Abstract - Motor vehicles at this time have been very much in our environment. Motorbike loss often occurs due to carelessness of the owner of the motor vehicle itself and the environment that is not safe. Some of the things that often happen when heating a motorcycle outside the house and left behind just light up. The security system on the motorbike is now good, however, there is still a lot of theft, therefore, a motorcycle security system is created. using pins and fingerprints, with hope, can minimize theft of motorcycle vehicles. The security system is made, there is also a Global Position System (GPS), so as to facilitate users to monitor motorcycle vehicles. With the results of the experiments carried out, using a pin and fingerprint security system that is based on a microcontroller or also commonly referred to as Arduino Mega, which acts as a security system on a motorcycle, can improve better safety on a deep-seated motorcycle the condition is being parked. The design of the security system implanted on this motorcycle is a form of application in the use of a microcontroller system that can respond to inputs and outputs including in Keypad, Liquit Crystal Display (LCD) and fingerprint. The results achieved are making a pin and fingerprint security system that is interconnected with Arduino Mega, with the help of GPS as tracking. With the creation of this security tool, it is expected to be able to minimize the crime of motorcycle thieves that always exist in the present, by making these tools will create a motorcycle security tool which is expected to minimize the theft of motorcycle vehicles and also minimize material losses to motorcycle owners. In addition to minimizing the level of theft of motorbike vehicles, it is expected to make people more calm.Keyword : The motor security system uses fingerprint sensor, GPS, LCD Nextion
APA, Harvard, Vancouver, ISO, and other styles
16

Sonar, Jayashree, and Mr S. O. Dahad. "A Review on Security of Fingerprint Template Using Fingerprint Mixing." International Journal of Engineering Trends and Technology 10, no. 8 (April 25, 2014): 402–7. http://dx.doi.org/10.14445/22315381/ijett-v10p276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vilardy O., Juan M., María S. Millán, and Elisabet Pérez-Cabré. "Image Encryption System Based on a Nonlinear Joint Transform Correlator for the Simultaneous Authentication of Two Users." Photonics 6, no. 4 (December 14, 2019): 128. http://dx.doi.org/10.3390/photonics6040128.

Full text
Abstract:
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system. In order to perform the decryption and authentication in a proper way, it is necessary to have the two digital fingerprints from the respective users whose simultaneous authentication is pursued. The proposed security system is developed in the Fourier domain. The nonlinearity of the JTC along with the five security keys given by the three random phase masks and the two digital fingerprints of the two users allow an increase of the system security against brute force and plaintext attacks. The feasibility and validity of this proposal is demonstrated using digital fingerprints as biometrics in numerical experiments.
APA, Harvard, Vancouver, ISO, and other styles
18

Praseetha, V. M., Saad Bayezeed, and S. Vadivel. "Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification." Journal of Intelligent Systems 29, no. 1 (April 10, 2019): 1379–87. http://dx.doi.org/10.1515/jisys-2018-0289.

Full text
Abstract:
Abstract Nowadays, there has been an increase in security concerns regarding fingerprint biometrics. This problem arises due to technological advancements in bypassing and hacking methodologies. This has sparked the need for a more secure platform for identification. In this paper, we have used a deep Convolutional Neural Network as a pre-verification filter to filter out bad or malicious fingerprints. As deep learning allows the system to be more accurate at detecting and reducing false identification by training itself again and again with test samples, the proposed method improves the security and accuracy by multiple folds. The implementation of a novel secure fingerprint verification platform that takes the optical image of a fingerprint as input is explained in this paper. The given input is pre-verified using Google’s pre-trained inception model for deep learning applications, and then passed through a minutia-based algorithm for user authentication. Then, the results are compared with existing models.
APA, Harvard, Vancouver, ISO, and other styles
19

Waili, Tuerxun, Amir NurIman Mohd Zaid, and Mohammed Hazim Alkawaz. "Advanced Voting System Using Fingerprint." International Journal on Perceptive and Cognitive Computing 6, no. 2 (December 14, 2020): 18–21. http://dx.doi.org/10.31436/ijpcc.v6i2.172.

Full text
Abstract:
A Fingerprint is an important identifier for the humans. This paper proposes finger print voting system with Arduino. The majority of the worldwide election were using a paper-based voting rather than using biometric system. The current voting process has safety problems such as authenticity of voters. In proposed system, a voter identity can be proved instantly. All voters’ information was stored securely to register in the system. The main objective is to enhance the security in order to prevent duplication and provide a system which reduce the burden for people on conducting a voting. Thus, by implementing this system, user can put their vote with fingerprint instead of paper without doubting about their security. Voting Using Fingerprint reduce the polling time, it provides easy and accurate counting without human labor.
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Xinting, Weijin Cheng, Chengsheng Yuan, Wei Gu, Baochen Yang, and Qi Cui. "Fingerprint Liveness Detection Based on Fine-Grained Feature Fusion for Intelligent Devices." Mathematics 8, no. 4 (April 3, 2020): 517. http://dx.doi.org/10.3390/math8040517.

Full text
Abstract:
Currently, intelligent devices with fingerprint identification are widely deployed in our daily life. However, they are vulnerable to attack by fake fingerprints made of special materials. To elevate the security of these intelligent devices, many fingerprint liveness detection (FLD) algorithms have been explored. In this paper, we propose a novel detection structure to discriminate genuine or fake fingerprints. First, to describe the subtle differences between them and take advantage of texture descriptors, three types of different fine-grained texture feature extraction algorithms are used. Next, we develop a feature fusion rule, including five operations, to better integrate the above features. Finally, those fused features are fed into a support vector machine (SVM) classifier for subsequent classification. Data analysis on three standard fingerprint datasets indicates that the performance of our method outperforms other FLD methods proposed in recent literature. Moreover, data analysis results of blind materials are also reported.
APA, Harvard, Vancouver, ISO, and other styles
21

Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.

Full text
Abstract:
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
APA, Harvard, Vancouver, ISO, and other styles
22

Bose, Palash Kumar, and Mohammad Jubaidul Kabir. "Fingerprint: A Unique and Reliable Method for Identification." Journal of Enam Medical College 7, no. 1 (January 30, 2017): 29–34. http://dx.doi.org/10.3329/jemc.v7i1.30748.

Full text
Abstract:
Fingerprints have been the gold standard for personal identification within the forensic community for more than one hundred years. It is still universal in spite of discovery of DNA fingerprint. The science of fingerprint identification has evolved over time from the early use of finger prints to mark business transactions in ancient Babylonia to their use today as core technology in biometric security devices and as scientific evidence in courts of law throughout the world. The science of fingerprints, dactylography or dermatoglyphics, had long been widely accepted, and well acclaimed and reputed as panacea for individualization, particularly in forensic investigations. Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual, making them suitable as lifelong markers of human identity. Fingerprints can be readily used by police or other authorities to identify individuals who wish to conceal their identity, or to identify people who are incapacitated or deceased, as in the aftermath of a natural disasterJ Enam Med Col 2017; 7(1): 29-34
APA, Harvard, Vancouver, ISO, and other styles
23

Jo, Young-Hoo, Seong-Yun Jeon, Jong-Hyuk Im, and Mun-Kyu Lee. "Security Analysis and Improvement of Fingerprint Authentication for Smartphones." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/8973828.

Full text
Abstract:
Currently, an increasing number of smartphones are adopting fingerprint verification as a method to authenticate their users. Fingerprint verification is not only used to unlock these smartphones, but also used in financial applications such as online payment. Therefore, it is very crucial to secure the fingerprint verification mechanism for reliable services. In this paper, however, we identify a few vulnerabilities in one of the currently deployed smartphones equipped with fingerprint verification service by analyzing the service application. We demonstrate actual attacks via two proof-of-concept codes that exploit these vulnerabilities. By the first attack, a malicious application can obtain the fingerprint image of the owner of the victimized smartphone through message-based interprocess communication with the service application. In the second attack, an attacker can extract fingerprint features by decoding a file containing them in encrypted form. We also suggest a few possible countermeasures to prevent these attacks.
APA, Harvard, Vancouver, ISO, and other styles
24

kumari, U. Bhavani. "Security Authentication based Fingerprint on ATM." International Journal for Research in Applied Science and Engineering Technology 6, no. 5 (May 31, 2018): 329–34. http://dx.doi.org/10.22214/ijraset.2018.5054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sojan, Shancymol, and R. K. Kulkarni. "Mixing Fingerprint Features for Template Security." International Journal of Engineering Trends and Technology 41, no. 7 (November 25, 2016): 355–59. http://dx.doi.org/10.14445/22315381/ijett-v41p265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

R, Kiruthika, and B. Rajesh Kumar. "Combination of Fingerprint for Security Protection." International Journal of Engineering Trends and Technology 9, no. 5 (March 25, 2014): 228–34. http://dx.doi.org/10.14445/22315381/ijett-v9p246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kadam, Pankaj Anil. "Enhanced ATM Security based on Machine Vision." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (August 15, 2021): 816–20. http://dx.doi.org/10.22214/ijraset.2021.37432.

Full text
Abstract:
Now a days almost all peoples are using ATM for banking transactions like cash withdrawal, check balance, transfer cash. In this research which is based on implementing Fingerprint mechanism in ATM system. We selected this area to provide more security to customers. There is no need to always carry the ATM with us and no fear to lose it. By providing Fingerprint authentication we were providing strong authentication. And now a day’s fingerprint authentication is most trusted and safe than other authentications.
APA, Harvard, Vancouver, ISO, and other styles
28

Schwarzl, Christian, and Edgar Weippl. "A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems." International Journal of Secure Software Engineering 2, no. 1 (January 2011): 40–83. http://dx.doi.org/10.4018/jsse.2011010103.

Full text
Abstract:
This paper serves to systematically describe the attempts made to forge fingerprints to fool biometric systems and to review all relevant publications on forging fingerprints to fool sensors. The research finds that many of the related works fail in this aspect and that past successes could not be repeated. First, the basics of biometrics are explained in order to define the meaning of the term security in this special context. Next, the state of the art of biometric systems is presented, followed by to the topic of security of fingerprint scanners. For this, a series of more than 30,000 experiments were conducted to fool scanners. The authors were able to reproduce and keep records of each single step in the test and to show which methods lead to the desired results. Most studies on this topic exclude a number of steps in producing a fake finger and fooling a fingerprint scanner are not explained, which means that some of the studies cannot be replicated. In addition, the authors’ own ideas and slight variations of existing experiment set-ups are presented.
APA, Harvard, Vancouver, ISO, and other styles
29

F.W. Onifade, Olufade, Paul Akinde, and Folasade Olubusola Isinkaye. "Circular Gabor wavelet algorithm for fingerprint liveness detection." Journal of Advanced Computer Science & Technology 9, no. 1 (January 11, 2020): 1. http://dx.doi.org/10.14419/jacst.v9i1.29908.

Full text
Abstract:
Biometrics usage is growing daily and fingerprint-based recognition system is among the most effective and popular methods of personality identification. The conventional fingerprint sensor functions on total internal reflectance (TIR), which is a method that captures the external features of the finger that is presented to it. Hence, this opens it up to spoof attacks. Liveness detection is an anti-spoofing approach that has the potentials to identify physiological features in fingerprints. It has been demonstrated that spoof fingerprint made of gelatin, gummy and play-doh can easily deceive sensor. Therefore, the security of such sensor is not guaranteed. Here, we established a secure and robust fake-spoof fingerprint identification algorithm using Circular Gabor Wavelet for texture segmentation of the captured images. The samples were exposed to feature extraction processing using circular Gabor wavelet algorithm developed for texture segmentations. The result was evaluated using FAR which measures if a user presented is accepted under a false claimed identity. The FAR result was 0.03125 with an accuracy of 99.968% which showed distinct difference between live and spoof fingerprint.
APA, Harvard, Vancouver, ISO, and other styles
30

Jeong, Jae-Won, In-Hoon Jang, and Kwee-Bo Sim. "Fingerprint Matching Algorithm Using String-Based MHC Detector Set." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 2 (March 20, 2005): 175–80. http://dx.doi.org/10.20965/jaciii.2005.p0175.

Full text
Abstract:
Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Lately, the speed of identification has become a very important aspect in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. A fast and reliable fingerprint matching algorithm based on the process of the "self-nonself" discrimination in the biological immune system was proposed. The proposed algorithm is organized by two-matching stages. The 1st matching stage utilized the self-space and MHC detector string set that are generated from the information of the minutiae and the values of the directional field. The 2nd matching stage was made based on the local-structure of the minutiae. The proposed matching algorithm reduces matching time while maintaining the reliability of the matching algorithm.
APA, Harvard, Vancouver, ISO, and other styles
31

Kour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.

Full text
Abstract:
Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM.
APA, Harvard, Vancouver, ISO, and other styles
32

Manurung, Mario Junianto, Poningsi Poningsi, Sundari Retno Andani, Muhammad Safii, and Irawan Irawan. "Door Security Design Using Fingerprint and Buzzer Alarm Based on Arduino." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (February 9, 2021): 42–51. http://dx.doi.org/10.47709/cnahpc.v3i1.929.

Full text
Abstract:
The level of crime of theft in people's homes from time to time is increasing and increasingly unsettling for many people and various groups, from leading sources claiming that there has been an increase in theft in people's homes from the previous year, by conducting research objects in the community by identifying existing problems. It can be concluded that this happens because the house door security system still uses conventional which is classified as unsafe or easily broken into, by carrying out research method steps in the form of analysis and data collection and in the form of designing tools by describing some of the main supporting tools that the problem can be minimized by using technology that is currently developing that is already well systemized, namely using a microcontroller or Arduino as the main control center, assisted by using a fingerprint sensor as a process for recording and identifying fingerprints and NodeMCU for to connect to a WiFI network where later on that the door can also be controlled using android via a wifi network as a remote control and an alarm buzzer which will function if when the fingerprint identification process fails, the alarm will sound as a warning sign, it will be concluded to design a door safety device using arduino based fingerprint and alarm buzzer for better system. Which only fingers that have been registered and registered android can open the door. This research is expected to be able to optimize door security in people's homes to avoid crimes such as thieves.
APA, Harvard, Vancouver, ISO, and other styles
33

Okandeji, A., M. B. Olajide, A. A. Okubanjo, and F. Onaifo. "Design and development of biometric voting system using fingerprint and facial recognition." Nigerian Journal of Technological Research 15, no. 3 (November 23, 2020): 34–43. http://dx.doi.org/10.4314/njtr.v15i3.5.

Full text
Abstract:
The election process adopted in Nigeria is mostly paper based or manual. This manually handled process can be time-consuming, and prone to security breaches and electoral fraud. Consequently, this work proposes a biometrically authenticated voting system to provide inexpensive solution to the electoral process in Nigeria. In particular, the biometric database is constructed by filling it with the audio fingerprints and the associated metadata of many audio clips, and then the fingerprint of an unknown clip (or the distorted version of the clip brought by compression or standard audio processing) is extracted and compared to that of the clip in the database. If the fingerprint of the unknown clip is in the database, it will be correctly identified by the matching procedures. The project is implemented with biometric system i.e. fingerprint scanning and facial recognition. Accordingly, this is used to ensure enhanced security, and to avoid fake, repeated voting. Results obtained showed that the proposed system is fast, accurate, reliable, and cost effective, thus a viable option to replace the manual voting process. Keywords: Biometrics, electoral process, facial recognition, finger print scanning
APA, Harvard, Vancouver, ISO, and other styles
34

Rivandi, Pranoko, Astuti Winda, Dewanto Satrio, and Mahmud Iwan Solihin. "Automotive Start–Stop Engine Based on Fingerprint Recognition System." E3S Web of Conferences 130 (2019): 01022. http://dx.doi.org/10.1051/e3sconf/201913001022.

Full text
Abstract:
Automated vehicle security system plays an important rule in nowadays advance automotive technology. One of the methods which can be applied for a security system is based on biometric identification system. Fingerprint recognition is one of the biometric systems that can be applied to the security system. In this work, fingerprint recognition system to start the motorcycle engine is developed. The fingerprint of the owner and other authorized persons will be stored into the database, then while the time of starting the engine of the vehicle, the fingerprint will be validated with the database. The minutiae extraction method is applied to find the difference of fingerprint each other after turn the image into grayscale and thinning. After the extraction, the next step is finding the ridge edge and bifurcation. The result of the image will be used as input to the Artificial Neural Network (ANN) to recognize authorized person only. The experiment of fingerprint recognition system shows that automatic start-stop engine using fingerprint recognition system based minutiae extraction and Artificial Neural Network (ANN) has accuracy 100 % and 100 %, respectively.
APA, Harvard, Vancouver, ISO, and other styles
35

Pratomo, Danang Yugo. "Sistem Keamanan Model Sidik Jari (Digital Key Security) Menggunakan Pemrograman Arduino Pada Sepeda Motor." Jurnal Teknik Mesin dan Pembelajaran 3, no. 2 (December 30, 2020): 99. http://dx.doi.org/10.17977/um054v3i2p99-108.

Full text
Abstract:
Abstract: The fingerprint-type digital key model driving safety system offers an accurate security system in minimizing motorcycle units from potential theft crimes that are rampant. This study aims to develop a security system for a fingerprint model on a motorcycle using the arduino-based prototype development method. The test was carried out to determine the results of the arduino programming configuration on the board with a fingerprint scanner. Research results: 1) the design processed using the Arduino application shows that done compiling means that the configuration is successful. 2) The fingerprint scanning test results show that the ignition of the starter is faster when the palm of the finger is dry; that is, the average is activated 2.31 seconds. 3) The result of detection on unknown finger will be activate the alarm. Keywords: Security system, Fingerprint, Arduino application
APA, Harvard, Vancouver, ISO, and other styles
36

Thanki, Rohit M., and Komal Rajendrakumar Borisagar. "Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 35–53. http://dx.doi.org/10.4018/ijisp.2018100103.

Full text
Abstract:
The security and privacy of biometric data in multibiometric systems has become a hot research topic. In this paper, a singular value decomposition (SVD) and fast discrete curvelet transform (FDCuT)-based watermarking scheme for authenticity of fingerprint image using watermark speech signal has been proposed and analyzed. This scheme also provides security to watermark speech signal, which is inserted into the fingerprint image. This proposed scheme has a number of steps including fingerprint image authentication using watermark speech signal. The human speech signal is taken as secret watermark information and inserting into the human fingerprint image in the proposed scheme. The singular value of high frequency curvelet coefficients of the host fingerprint image is modified according to watermark speech signal to get secured and watermarked fingerprint image. The analysis results show that the performance of fingerprint recognition system is not affected by inserted watermark speech signal into host fingerprint image.
APA, Harvard, Vancouver, ISO, and other styles
37

Hatekar, Mr Amit. "Fingerprint Based Security System using GSM Module." International Journal of Engineering Research and Applications 07, no. 05 (May 2017): 31–34. http://dx.doi.org/10.9790/9622-0705023134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

B.Awotunde, Joseph, Tolorunloju R. James, Suhurat I. Abdulkadir, and Fatimoh T. Adewumi-Olowabi. "Fingerprint Authentication System: Toward Enhancing ATM Security." International Journal of Applied Information Systems 7, no. 7 (August 5, 2014): 27–32. http://dx.doi.org/10.5120/ijais14-451214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

kumar, D. Vinod. "Fingerprint Based ATM Security by using ARM7." IOSR Journal of Electronics and Communication Engineering 2, no. 5 (2012): 26–28. http://dx.doi.org/10.9790/2834-0252628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

M.S, Kavitha. "Knock based Security Console with Fingerprint Sensor." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 15, 2021): 3400–3412. http://dx.doi.org/10.47059/revistageintec.v11i4.2379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Vibert, Benoit, Jean-Marie Le Bars, Christophe Charrier, and Christophe Rosenberger. "Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems." Sensors 20, no. 18 (September 21, 2020): 5410. http://dx.doi.org/10.3390/s20185410.

Full text
Abstract:
Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric reference template and for the matching with a probe template (on-card-comparison). In order to assess the performance and robustness against attacks of these systems, it is necessary to better understand which information could help an attacker successfully impersonate a legitimate user. The first part of the paper details a new attack based on the use of a priori information (such as the fingerprint classification, sensor type, image resolution or number of minutiae in the biometric reference) that could be exploited by an attacker. In the second part, a new countermeasure against brute force and zero effort attacks based on fingerprint classification given a minutiae template is proposed. These two contributions show how fingerprint classification could have an impact for attacks and countermeasures in embedded biometric systems. Experiments show interesting results on significant fingerprint datasets.
APA, Harvard, Vancouver, ISO, and other styles
42

Budiman, Muhammad Arif, and I. Gusti Agung Widagda. "Fingerprints Image Recognition by Using Perceptron Artificial Neural Network." BULETIN FISIKA 21, no. 2 (May 5, 2020): 37. http://dx.doi.org/10.24843/bf.2020.v21.i02.p01.

Full text
Abstract:
Security systems that use passwords or identity cards can be hacked and misused. One of alternative security system is to use biometric identification. The biometric system that is popularly used is fingerprints, because the system is safe and comfortable. Fingerprints have a distinctive pattern for each individual and this makes fingerprints relatively difficult to fake, so the system is safe. Comfortable because the verification process is easily done. The problem that often occurs on the system of fingerprint scanner is found an error and the user has difficulty when accessing. To handle with these problems has developed an artificial intelligence system. One of arificial intelligence in pattern identification is artificial neural networks (ANN). From some of the results of previous research showed that the ANN method is reliable in pattern identification. Based on these facts, the method used in this research is the perceptron ANN method with values learning rate varying. In the research the program conducted by testing 20 samples showed that the performance of the perceptron ANN method is relatively good method in fingerprint image recognition. This can be indicated from the value of accuracy (0.95), precision (0.83), TP rate (1), and FP rate (0.07)). In addition, the location of the point coordinate (FP rate; TP rate) is (0.07; 1) in ROC graphs is located on the upper left (perfect classifier region).
APA, Harvard, Vancouver, ISO, and other styles
43

Wardoyo, Jalu, Noor Hudallah, and Aryo Baskoro Utomo. "SMART HOME SECURITY SYSTEM BERBASIS MIKROKONTROLER." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 10, no. 1 (April 29, 2019): 367–74. http://dx.doi.org/10.24176/simet.v10i1.2684.

Full text
Abstract:
Tingginya tindak kejahatan pencurian di rumah tangga perlu diantisipasi dengan penggunaan sistem keamanan rumah yang modern, salah satunya yaitu smart home. Salah satu penerapan smart home berupa safety system. Studi ini mengajukan perancangan sistem keamanan smart home berbasis mikrokontroler. Sistem keamanan smart home ini menggunakan kombinasi metode pengaman biometric fingerprint dan password. Metode perancangan sistem dengan metode Research and Development (RnD). Proses RnD dibagi menjadi tiga tahap yaitu tahap studi, research, dan pengembangan. Tahap studi meliputi studi pustaka dan studi lapangan terkait sistem keamanan rumah, tahap research berupa pembuatan dan pengujian prototype sistem keamanan, dan tahap pengembangan berupa pengujian dan perbaikan terhadap kekurangan sistem keamanan. Penelitian ini menghasilkan prototype sistem keamanan smart home yang memiliki kemampuan memberikan akses terhadap pintu dengan metode autentifikasi biometric fingerprint dan password serta fitur tambahan emergency backup supply dan emergency entry. Akses pintu diberikan ketika autentifikasi berhasil dilakukan dan mikrokontroler akan memberikan perintah untuk menghidupkan solenoid door lock sebagai mekanisme penguncian pintu. Sistem ini bekerja menggunakan beberapa perangkat diantaranya: Arduino Mega, modul fingerprint, keypad, LCD, power supply unit (PSU), magnetic switch, solenoid door lock, dan buzzer.
APA, Harvard, Vancouver, ISO, and other styles
44

Bukit, Alexander Victor, I. Nengah Putra, Herdhig Prima Yudha, and Muhammad Zulkifli. "DESIGN OF ENCRYPT ROOM SECURE SYSTEM ON SATKOM LANTAMAL V SURABAYA BASED ON FINGERPRINT AND QUICK RESPONSE CODE." JOURNAL ASRO 11, no. 04 (November 19, 2020): 1. http://dx.doi.org/10.37875/asro.v11i04.352.

Full text
Abstract:
Technology and information are currently growing rapidly so that computers are no longer used as a computing tool, but have turned into a machine that has the same ability as the human brain, especially searching on a very large fingerprint database. Supervision through a security system that is designed is very helpful for the performance of the Indonesian Navy code personnel who serve in the communication unit, especially the code room. The Code Room is one of the important rooms specifically used as a place for coding activities for the Indonesian Navy. In addition, the code room also functions as a news center for both confidential and open news. This security system using fingerprint (Fingerprint) and Qrcode (Quick Response Code) is designed to be able to control the door with serial communication from android to microcontroller (wemoss) and personal computer (PC) so that it will move the selenoid (door lock) to open the door on condition fingerprint and qrcode are recognized by the system. The level of success of this security system depends on the user's fingerprint identification and the validity of the data stored in the database. The test results of the security system developed in this final project show a success rate of 98%. This tool is expected to be used as a Security System for the Password Room at the Satkom Lantamal V Surabaya. Keywords: Fingerprint and Quick Response Code
APA, Harvard, Vancouver, ISO, and other styles
45

Rajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.

Full text
Abstract:
Biometrics refers to the automatic identification of a living person based on physiological or behavioural characteristics for authentication purpose. Among the existing biometric technologies are the face recognisation, fingerprint recognition, finger-geometry, hand geometry, iris recognition, vein recognition, voice recognition and signature recognition, Biometric method requires the physical presence of the person to be identified. This emphasizes its preference over the traditional method of identifying what you have such as, the use of password, a smartcard etc. Also, it potentially prevents unauthorized admittance to access control systems or fraudulent use of ATMs, Time Attendance Systems, cellular phones, smart cards, desktop PCs, Workstations, vehicles and computer networks. Biometric recognition systems offer greater security and convenience than traditional methods of personal recognition.
APA, Harvard, Vancouver, ISO, and other styles
46

Selvarani, P., and N. Malarvizhi. "Secure data in cloud with multimodal key generation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 27. http://dx.doi.org/10.14419/ijet.v7i1.7.9382.

Full text
Abstract:
Data Security is the Major problem in Cloud Computing. In order to overcome the data security problem the proposed technique utilizes effective data storage using biometric-based cryptographic authentication to support the user authentication for the cloud environment. For user authentication here we are considering iris and fingerprint. Initially the feature values are extracted from the iris and fingerprint using local binary pattern and Minutiae extraction respectively. Local binary pattern operator works with the eight neighbors of a pixel, using the value of this center pixel as a threshold. Minutiae points are the major features of a fingerprint image and are used in the matching of fingerprints. These minutiae points are used to determine the uniqueness of a fingerprint image. Based on that the proposed feature values are extracted from the iris and fingerprint image. In order to improve the security, the suggested technique utilizes the optimal features. For selecting the optimal features hybrid particle swarm optimization and genetic algorithm (HPSOGA) is utilized. Particle swarm optimization (PSO) is a population based stochastic optimization technique. The system is initialized with a population of random solutions and searches for optima by updating generations. In PSO, the potential solutions, called particles, fly through the problem space by following the current optimum particles. Genetic Algorithms (GAs) are adaptive heuristic search algorithm based on the evolutionary ideas of natural selection and genetics. In our proposed method these two optimization algorithm is hybrid for more secure. From the optimization algorithm the suggested technique selects the optimal features. and then the optimal features are used to encrypt the input data. For encryption and decryption, the proposed technique utilizes Triple DES algorithm. Finally the encrypted data is stored in cloud. The performance of the proposed technique is evaluated in terms of encryption and decryption time, memory utilization and overall execution time. Our proposed data storage using biometric-based authentication is implemented with the help of Cloud simulator in the working platform of java.
APA, Harvard, Vancouver, ISO, and other styles
47

Solomon, Zakkam, Meghana K M, Manjula, and Roshini B. "SURVEY ON E-FINGERPRINT TICKET." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 53–57. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3351.

Full text
Abstract:
Earlier work has demonstrated that when going in a transport the installment accomplished for ticket is with money .The transport ticket has such an installment figure which makes the voyager or the conductor shy of cash as far as change. This makes the conductor to keep the change with himself .This makes bother to the explorers. Subsequently there is a requirement for better workplace. To conquer this issue we are making utilization of fingerprints of the voyager which are connected to the database. The enrollment procedure will take every one of the points of interest of the client when going surprisingly. The record is made with some e-cash in it .While venturing out client needs to give his unique mark and pay the cash for ticket through his record naturally .This beats the client bother. What's more, Security is the fundamental calculate all associations and has more significance in transport. Security can be given by any mean can't give greater adaptability, the current E-Ticket framework does not contain adequate security, so we think to execute biometrics in our examination and after that we moved to another imaginative innovation to utilize unique mark module likewise for the extra for client adaptability utilizing Global System for Mobile Communication module for Communication reason for sending and accepting message. By this Survey, we can limit Fraud in transport and give greater office to voyager and enhances security for the general public.
APA, Harvard, Vancouver, ISO, and other styles
48

Chaudhary, Sumit, Monika Garg, and Neha Singh. "IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 428–32. http://dx.doi.org/10.24297/ijct.v3i3a.2950.

Full text
Abstract:
Personal authentication that correctly identifies valid users in an indispensable security technology for enabling people to enjoy the access to data services with a sense of confidence and assurance. Passwords have been extensively used to identify authorized users in the past, but passwords alone are vulnerable because people tend to choose weak password relating to some aspect of them (e.g. birthday, phone number, family name) that can be guessed. This has led to growing interest in biometric authentication using fingerprints that make it possible to identify personal authentication correctly. It eliminates problems of forgotten passwords or lost cards and is currently becoming more popular for convenient and secure authentication. NTT Microsystems is a new and exclusive technology that overcomes the limitations of previous systems and sets a new standard for compact, reliable and low-cost fingerprint authentication. NTT laboratories have developed Finger Token, a portable fingerprint identification device that substitutes a fingerprint instead of password for authentication
APA, Harvard, Vancouver, ISO, and other styles
49

Dey, Swarnadip, Sajal Kumar Karmakar, Surajit Goon, and Prianka Kundu. "A SURVEY ON FINGERPRINT PATTERN RECOGNITION." International Journal of Research -GRANTHAALAYAH 7, no. 8 (August 31, 2019): 496–506. http://dx.doi.org/10.29121/granthaalayah.v7.i8.2019.704.

Full text
Abstract:
In this advance technical time, we all need accuracy to any security system. Among all security system, biometric recognition process is very popular in that time. Not only security purpose, identification is the main cause of using biometric characteristic. A pin, password combination is not enough to secure all things because that’s tracking is possible, but a person biometric characteristic is unique, so it is near to impossible to by-pass. In this paper, we discuss about the fingerprint types such as arch, loop, and whorl. We also discuss how the fingerprint will be recognized; however, where this technique is used in very large scale and what is the future scope of this technique, we discuss what improvement is needed in future.
APA, Harvard, Vancouver, ISO, and other styles
50

Voznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska, and Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.

Full text
Abstract:
The method of biometric identification, designed to ensure the protection of confidential information, is considered. The method of classification of biometric prints by means of machine learning is offered. One of the variants of the solution of the problem of identification of biometric images on the basis of the k-means algorithm is given. Marked data samples were created for learning and testing processes. Biometric fingerprint data were used to establish identity. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. Experimental results indicate that the k-means method is a promising approach to the classification of fingerprints. The development of biometrics leads to the creation of security systems with a better degree of recognition and with fewer errors than the security system on traditional media. Machine learning was performed using a number of samples from a known biometric database, and verification / testing was performed with samples from the same database that were not included in the training data set. Biometric fingerprint data based on the freely available NIST Special Database 302 were used to establish identity, and the learning outcomes were shown. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. The machine learning system is built on a modular basis, by forming combinations of individual modules scikit-learn library in a python environment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography