Journal articles on the topic 'Identification and Authentication Techniques'

To see the other types of publications on this topic, follow the link: Identification and Authentication Techniques.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Identification and Authentication Techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Warda Hassan and Nosheen Sabahat. "Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques." VFAST Transactions on Software Engineering 12, no. 1 (March 31, 2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.

Full text
Abstract:
This paper provides an overview and analysis of existing biometric authentication methods. Biometric authentication enhances the security of traditional authentication methods by utilizing unique biological characteristics of individuals, such as fingerprints, facial features, or iris patterns, to verify identity. However, implementing biometric authentication may involve initial setup costs for service providers due to the need for specialized hardware and software. Additionally, users may experience some initial inconvenience during the enrollment process to register their biometric data. This paper presents a comparative analysis of the usability of biometric authentication techniques. Initially, a survey of existing work is conducted by comparing techniques, algorithms, and metrics used in research. Later the challenges of the distinct types of authentication techniques are discussed, and their problems are discovered. Subsequently, the findings of a quantitative study based on a are presented, aimed at assessing the usability of those techniques. The findings indicate that authentic biometric techniques are perceived as usable.
APA, Harvard, Vancouver, ISO, and other styles
2

Dara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini, and I, Triveni. "An Improved Quality Enhancement Fingerprint Analysis." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (May 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.

Full text
Abstract:
The use of fingerprint authentication as a biometric technique for secure authentication and access control has gained significant traction in recent years. This article presents an overview of the technology used for fingerprint identification, its history, as well as the fundamental components that make up a fingerprint recognition system. We also go through the many approaches to fingerprint identification techniques and algorithms, such as the minutiae-based approach, the ridge feature-based approach, and the pattern recognition-based approach. All of these are utilized in the process of authenticating fingerprints. In addition, we emphasize the limitations of fingerprint authentication as well as the security risks that are linked with it, as well as alternative methods to overcome these constraints.
APA, Harvard, Vancouver, ISO, and other styles
3

Sureshbabu, P., and M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.

Full text
Abstract:
Technology based on Biometric identification and verification is one leading research area. It deals with the concept analyzing the human body characteristics through Biometric devices for various authentications process. There are many Biometric authentication systems are available for verification process. This paper discusses the role of Fingerprint authentication. FP recognition is highly used biometric technique, because of abundance sources (i.e. ten fingers) availability for collecting data. Discussion on Fingerprint matching techniques, recognition methods and their performance analysis are made in the paper.
APA, Harvard, Vancouver, ISO, and other styles
4

B S, Shruthi, and Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD." International Journal of Computer Science and Mobile Computing 12, no. 4 (April 30, 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.

Full text
Abstract:
Personal identification numbers (PINS) are used to authenticate a user for security purpose. In order to authenticate himself the user should physically input the PIN, which might be susceptible to password cracking via shoulder surfing or thermal tracking. Authenticating a PIN with hands-off eye blinks PIN entry techniques, on the opposite hand, offers a safer password entry option by not leaving any physical footprints behind. User authentication using eye-blink password refers to finding the attention blinks in sequential image frames, and generation of PIN. This paper presents an application with three layer authentication system that are face detection, PIN entry by eye blink and OTP (One Time Password) to avoid thermal tracking attacks and shoulder surfing.
APA, Harvard, Vancouver, ISO, and other styles
5

Joshi, V. C., and I. A. Khan. "MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS." Acta Horticulturae, no. 720 (October 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dan, Man Kan, and Dr T. Meyappan. "WATERMARKING TECHNIQUES." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.

Full text
Abstract:
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Divya, C. D., and Dr A. B. Rajendra. "An investigation of IRIS Recognition Techniques: A Literature Survey." Applied and Computational Engineering 2, no. 1 (March 22, 2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.

Full text
Abstract:
Iris is a colored muscle located within the eye that helps to regulate the amount of light that reaches the eye. It has some specific textural details that is not easily altered or manipulated, making it a characteristic that is ideally suited to biometric systems. Iris has been considered in the field of biometric applications for authentication purpose. The main purpose of this study is, due to the stability and unique feature available in Iris region. Iris patterns play a major role in many possible identification or authentication applications due to their uniqueness, durability and stability, universality. Iris recognition techniques have evolved tremendously in biometric identification and authentication systems over the past two decades, since their evolution. The technique of Iris recognition is quantifiable, robust, and highly accurate so that it achieves the fundamental tenant of ideal biometric technology. Purpose of this paper is to include a timeline analysis of different iris recognition techniques and the development of a novel algorithm for the iris recognition system. This paper also discusses various methods used in performing the iris recognition measures involved.
APA, Harvard, Vancouver, ISO, and other styles
8

Yaseen Khudhur, Doaa, Belal Al-Khateeb, and Hadeel Amjed Saeed. "Secure login technique for online banking." International Journal of Engineering & Technology 7, no. 4 (April 3, 2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.

Full text
Abstract:
In recent years, there are many authentication protocols that are used in the accessing of the sensitive and private data. However most of those methods have many weaknesses by which data can be extracted and used by unauthorized people this due to the use of a one level authentication that may face many attacks. This paper presents an authentication method that involves three levels of user authentication; the first two levels use two level passwords authentication together with a Personal Identification Number (third level) for every operation in Electronic Banking system. Hash functions -Secure Hash Algorithms- and Cyclic Redundancy check (32) for the generations of Personal Identification Number are used. This system eliminates the problem that is related with single level password authentication system and improves the security by using Personal Identification Number.Â
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Preet Amol, Neha Bajwa, Subh Naman, and Ashish Baldi. "A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs." Letters in Drug Design & Discovery 17, no. 9 (September 11, 2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.

Full text
Abstract:
Background: Over the last decade, there has been a sudden rise in the demand for herbal as well as Information and Technology (IT) industry around the world. Identification of plant species has become useful and relevant to all the members of the society including farmers, traders, hikers, etc. Conventional authentication techniques such as morphological characterization, histological methods, and optical microscopy require multiple skills which are tedious, timeconsuming and difficult to learn for non-experts. This creates a hurdle for individuals interested in acquiring knowledge of species. Relying on rapid, economical and computerized approaches to identify and authenticate medicinal plants has become a recent development. Objective: The purpose of this review is to summarize artificial intelligence-based technologies for wider dissemination of common plant-based knowledge such as identification and authentication to common people earlier limited to only experts. Methods: A robust plant identification design enabling automated plant-organ and feature-based identification utilizing pattern recognition and image processing techniques resulting in image retrieval and recognition has been highlighted in this review for all the concerned stakeholders. Attempts have been made to compare conventional authentication methods with advanced computerized techniques to emphasize the advantages and future applications of an automated identification system in countering adulteration and providing fair trade opportunities to farmers. Results: Major findings suggested that microscopical features such as shape and size of calcium oxalate crystals, trichomes, scleriods, stone cells, fibers, etc. are the essential descriptors for identification and authentication of herbal raw drugs using computational approaches. Conclusion: This computational design can be successfully employed to address quality issues of medicinal plants. Therefore, computational techniques proved as a milestone in the growth of agriculture and medicinal plant industries.
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Myra. "Biometric Authentication using Gait Recognition." Universal Research Reports 10, no. 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.

Full text
Abstract:
The necessity for trustworthy and secure means of user identification has become critical in a society that is becoming more and more digital. The widespread use of biometric authentication has emerged as a possible answer to the hacker-proneness of conventional authentication techniques like passwords and PINs. Biometric authentication uses a person's distinctive physiological and behavioral traits to confirm their identity. "Biometric Authentication using Gait Recognition" is one such new and creative strategy.
APA, Harvard, Vancouver, ISO, and other styles
11

Selvarani, P., and N. Malarvizhi. "Multibiometric authentication with MATLAB simulation." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i1.7.9389.

Full text
Abstract:
Multimodal Biometric Authentication has been used as more security purpose for establishing the user Identification, Authentication and Verification purpose. Multimodal Biometric like Fingerprint and iris are used in this research work for authentication purpose using Matlab simulation. Fingerprint recognition process like Image Enhancement, binarization, Segmentation, thinning, Minutia marking, and Matching are performed with various techniques like Histogram Equalization, Adaptive Binarization, Morphological operations, Minutiae based techniques etc.,Iris recognition process like Segmentation, Normalization, Encoding and Matching are performed with various techniques like Canny edge detection, Daughman’s Rubber sheet model, Hamming Distance etc., can be applied for Fingerprint and iris recognition for authentication purpose. Finally Performance the measure of Precision, Recall, F-Score and Accuracy has evaluated in both fingerprint and iris. It can be concluded Iris Accuracy is higher 0.96% compared with fingerprint accuracy 0.81%.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhao, Yi, and Song-Kyoo Kim. "Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms." Information 15, no. 4 (March 29, 2024): 187. http://dx.doi.org/10.3390/info15040187.

Full text
Abstract:
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise in breaches associated with traditional techniques that rely on unique biological and behavioral traits. These techniques are emerging as more reliable alternatives. Among the biological features used for authentication, ECGs offer unique advantages, including resistance to forgery, real-time detection, and continuous identification ability. A key contribution of this work is the introduction of a variant of the ECG time-slicing technique that outperforms existing ECG-based authentication methods. By leveraging machine learning algorithms and tailor-made compact data learning techniques, this research presents a more robust, reliable biometric authentication system. The findings could lead to significant advancements in network information security, with potential applications across various internet and mobile services.
APA, Harvard, Vancouver, ISO, and other styles
13

G S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala, and Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (September 1, 2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.

Full text
Abstract:
A multimodal human identification system based on face and body recognition may be made available for effective biometric authentication. The outcomes are achieved by extracting facial recognition characteristics using several extraction techniques, including Eigen-face and Principle Component Analysis (PCA). Systems for authenticating people using their bodies and faces are implemented using artificial neural networks (ANN) and genetic optimization techniques as classifiers. Through feature fusion and scores fusion, the biometric systems for the human body and face are merged to create a single multimodal biometric system. Human bodies may be identified with astonishing accuracy and effectiveness thanks to the SDK for the Kinect sensor. To identify people, biometrics aims to mimic the pattern recognition process. In comparison to traditional authentication methods based on secrets and tokens, it is a more dependable and safe option. Human physiological and behavioral traits are used by biometric technologies to identify people automatically. These characteristics must fulfill many criteria, especially those that relate to universality, efficacy, and applicability.
APA, Harvard, Vancouver, ISO, and other styles
14

K N, Madhu, and Mrs Bhavana G. "Signature Recognition for Banking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.

Full text
Abstract:
Abstract: The use of signatures for personal identification and verification is very common. Verifying signatures is necessary for many documents, including legal transactions and bank checks. The authentication of several papers using signatures is an extremely challenging and time-consuming job. As a result, systems for biometric personal verification and identification that rely on measurable, distinctive physical traits (such as fingerprints, hand geometry, faces, iris scans, or DNA) or behavioural traits have experienced an accelerating expansion (gait, voice etc.). Since tokens, passwords, pins, and other commonly used identity verification techniques have a number of fatal flaws and can't meet security requirements, the research looks into a feature that is far more often used: signature verification. We discuss the methods for authenticating signatures. We classify and outline the many techniques put forth for verification of signatures
APA, Harvard, Vancouver, ISO, and other styles
15

Hossain, Dr M. A. Motalib. "Role of nanomaterials in food authentication techniques: A mini-review." Malaysian NANO-An International Journal 4, no. 1 (July 3, 2024): 57–69. http://dx.doi.org/10.22452/mnij.vol4no1.4.

Full text
Abstract:
Food authentication is critical for ensuring food safety, quality, and compliance with regulatory standards. The growing complexity of food supply chains and increasing incidents of food fraud necessitate advanced and reliable methods for verifying food authenticity. Nanomaterials (NMs) have emerged as powerful tools in food authentication due to their unique physicochemical properties. This mini-review explores the application of various NMs, including metal nanoparticles (NPs), carbon-based NMs, and quantum dots, in the detection and identification of food adulteration and contamination. The review highlights recent advancements, practical applications, and future prospects of NMs in enhancing food authentication techniques. In this review, we explore the latest advancements in the application of NMs in food analysis. We summarize recent developments in NP usage for detecting contaminants in food and highlight the prospects and future directions for creating dependable devices for authentic analysis.
APA, Harvard, Vancouver, ISO, and other styles
16

R, Dr Sharavanakumar. "EYE Blinking for Password Authentication." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.

Full text
Abstract:
Abstract: Personal identification numbers area unit used for user authentication and security. word verification exploitation PINs requires users to enter a physical PIN, which may be vulnerable to word breakage or hacking via shoulder water sport or thermal chase. PIN authentication with eye blinks entry techniques, doesn't leave any quite physical footprints behind and therefore provide a safer word entry possibility. This project presents a time period application to avoid. The personal identification numbers (PINS) is a common user authentication method for many applications, such as money transaction is online banking application and automatic teller machine(ATMs).unlocking personal devices ,event centers, shopping malls, Medical centers, schools/collages and opening Doors. I
APA, Harvard, Vancouver, ISO, and other styles
17

Cicareli, Rodrigo dos Santos, and José Carlos Pizolato Junior. "Um sistema alternativo para a verificação da autenticidade de produtos utilizando criptografia visual." Semina: Ciências Exatas e Tecnológicas 41, no. 2 (December 11, 2020): 117. http://dx.doi.org/10.5433/1679-0375.2020v41n2p117.

Full text
Abstract:
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques for physical products have been proposed. Among the techniques commonly employed, the most popular are QR codes (Quick Response Code), Holographic Seals, and RFID (Radio Frequency Identification) tags. This paper aims to propose an alternative product authentication system that applies the visual cryptography technique (NAOR; SHAMIR, 1995). This system employs two masks that, when overlaid, allow visual authentication by the user, without the need for any computational processing. The use of this authentication system for the need in question has not yet been reported in the literature.
APA, Harvard, Vancouver, ISO, and other styles
18

K, Ambika, and Radhika K. R. "Remora Optimization Based Sample Weighted Random SVM For Human Gait Authentication." International Journal of Electrical and Electronics Research 10, no. 4 (December 30, 2022): 969–75. http://dx.doi.org/10.37391/ijeer.100436.

Full text
Abstract:
In this paper, we present a novel ESVM-SWRF method for authenticating human using a gait cycle. The different covariates related to walking are analyzed and investigated. The walking speed of people may change due to the individual body structure, gender, and age thereby creating a complex situation. Based on the studies over past decades, different perspectives with cross-speed gait authentication were suggested. The factors influencing the identification of gait are some of the covariate factors namely walking speed, injuries, walking surface, viewpoint, and clothing. Our proposed work uses an effective dataset CASIA-C. Most of the existing techniques achieved a nearly 100% authentication accuracy rate for normal walking conditions but their performance is not optimal when applied under different covariate conditions. Our proposed work proves a high accuracy rate of 89% for different covariate conditions compared to other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
19

Jing Yang, Et al. "Multimedia Identification and Analysis Algorithm of Piano Performance Music Based on Deep Learning." Journal of Electrical Systems 19, no. 4 (January 25, 2024): 196–210. http://dx.doi.org/10.52783/jes.632.

Full text
Abstract:
In the biometric biomedical applications, the study presents a pioneering research endeavor focused on the development of a multimedia identification and analysis algorithm tailored for piano performance music. With the power of deep learning techniques, this algorithm has been designed to address the intricate challenges posed by the convergence of musical data analysis and biometrics. The core objectives encompass the extraction, recognition, and interpretation of biometric information from piano performances, exploring the intricate patterns, nuances, and individualistic characteristics inherent to musicians. The study focuses on the development of advanced biometric authentication and identification systems capable of capturing and analyzing a user's unique behavioral patterns across diverse modalities. These biometric modalities offer the potential for highly secure and non-intrusive user identification. Hence, this paper developed an architecture of Marker Controlled Point (MCP) Estimation for the computation of the gesture in biometric-based applications. This architecture utilizes markers or reference points to precisely track and analyze user gestures, resulting in accurate and reliable biometric data. The research details the architecture's implementation, integrating advanced deep-learning techniques for feature extraction, pattern recognition, and authentication. This system finds versatile applications in various domains, from healthcare and cybersecurity to finance, where secure and user-friendly authentication is paramount. Experimental results underscore the system's effectiveness and robustness, demonstrating its potential for enhancing biometric authentication. The proposed model represents a significant stride in biometric technology, offering secure, non-intrusive user identification through the synergy of behavior biometrics and emerging modalities.
APA, Harvard, Vancouver, ISO, and other styles
20

D., Ostapets, Dziuba V., and Rusetskyi V. "Tools for studying of facial identification and authentication." System technologies 4, no. 153 (May 1, 2024): 157–65. http://dx.doi.org/10.34185/1562-9945-4-153-2024-15.

Full text
Abstract:
One of the most common and popular among biometric techniques is biometry of face. Currently, a large number of information systems have been created using these techniques. Thus, there is a problem of studying the methods of machine face recognition during the training of relevant specialists. The aim of the work is to develop a software tools for studying the mechanism of biometric face authentication. Face is static biometry methodic. For implementation in the developed tools the method of comparison on key points was chosen. The main stages of comparing faces are: finding a face in a photo, formation of key points, normalization, formation of segments, formation of relations, comparison of ratios. A high-level cross-platform programming language C++ with the use of additional libraries was chosen to develop the software of the tools. An open face database was used to work with the tools. The tools have a demonstration nature. During its use, you can explore and study all the components of the process of biometric identifi-cation and authentication of the user by face: demonstration of the process of finding of key points on the face, forming of distances between points, calculating of their ratios and their comparison; comparison of etalon and candidate photos during the procedure of identification and authentication and response. Examples of the main processing stages of the complex and the corresponding screen forms (windows) are given. The com-position of the tools and software are developed in the work, the main examples and stages of its work are given. It is shown that the tools can be used in the educational process, for example in laboratory or practical classes.
APA, Harvard, Vancouver, ISO, and other styles
21

Farid, Farnaz, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed, and Ergun Gide. "A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services." Sensors 21, no. 2 (January 14, 2021): 552. http://dx.doi.org/10.3390/s21020552.

Full text
Abstract:
This paper proposes a novel identity management framework for Internet of Things (IoT) and cloud computing-based personalized healthcare systems. The proposed framework uses multimodal encrypted biometric traits to perform authentication. It employs a combination of centralized and federated identity access techniques along with biometric based continuous authentication. The framework uses a fusion of electrocardiogram (ECG) and photoplethysmogram (PPG) signals when performing authentication. In addition to relying on the unique identification characteristics of the users’ biometric traits, the security of the framework is empowered by the use of Homomorphic Encryption (HE). The use of HE allows patients’ data to stay encrypted when being processed or analyzed in the cloud. Thus, providing not only a fast and reliable authentication mechanism, but also closing the door to many traditional security attacks. The framework’s performance was evaluated and validated using a machine learning (ML) model that tested the framework using a dataset of 25 users in seating positions. Compared to using just ECG or PPG signals, the results of using the proposed fused-based biometric framework showed that it was successful in identifying and authenticating all 25 users with 100% accuracy. Hence, offering some significant improvements to the overall security and privacy of personalized healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Shaheed, Kashif, Hangang Liu, Gongping Yang, Imran Qureshi, Jie Gou, and Yilong Yin. "A Systematic Review of Finger Vein Recognition Techniques." Information 9, no. 9 (August 24, 2018): 213. http://dx.doi.org/10.3390/info9090213.

Full text
Abstract:
Biometric identification is the study of physiological and behavioral attributes of an individual to overcome security problems. Finger vein recognition is a biometric technique used to analyze finger vein patterns of persons for proper authentication. This paper presents a detailed review on finger vein recognition algorithms. Such tools include image acquisition, preprocessing, feature extraction and matching methods to extract and analyze object patterns. In addition, we list some novel findings after the critical comparative analysis of the highlighted techniques. The comparative studies indicate that the accuracy of finger vein identification methods is up to the mark.
APA, Harvard, Vancouver, ISO, and other styles
23

Shet, Nagaraj. "Eye Based Secure Authentication System." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 4860–63. http://dx.doi.org/10.22214/ijraset.2024.60664.

Full text
Abstract:
Abstract: Personal identification numbers are commonly utilized for user verification and enhanced security. When users authenticate passwords through PINs, they must be obligatory to physically input the PIN, making them susceptible to password cracking techniques like shoulder surfing or thermal tracking. In contrast, utilizing hands-off gaze-based PIN entry methods eliminates any physical traces, providing a significantly more secure option for password entry. Gaze-based authentication involves determining the eye location across consecutive image frames and continuously tracking the precise eye center.
APA, Harvard, Vancouver, ISO, and other styles
24

Al-Mahadeen, Eyhab, Mansoor Alghamdi, Ahmad S. Tarawneh, Majed Abdullah Alrowaily, Malek Alrashidi, Ibrahim S. Alkhazi, Almoutaz Mbaidin, Anas Ali Alkasasbeh, Mohammad Ali Abbadi, and Ahmad B. Hassanat. "Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data." Sustainability 15, no. 13 (July 3, 2023): 10456. http://dx.doi.org/10.3390/su151310456.

Full text
Abstract:
With the increasing popularity of smartphones, user identification has become a critical component to ensure security and privacy. This study looked into how smartphone sensors’ data can be utilized to identify/authenticate users and gives suggestions for the best application components. A public smartphone dataset was used to train a deep learning algorithms, conventional classifiers, and voting classifiers, which were then used to identify the users. Feature selection and Pre-processing techniques were investigated to improve the performance. According to the results, Recursive Feature Elimination beat the other feature-selection approaches, and Long Short-Term Memory (LSTM) had the best identification performance, as evidenced by a relatively large number of machine learning performance metrics. Even with a larger number of users, the proposed identification system performed well and outperformed existing approaches, which were primarily designed and tested on the same public smartphone dataset. In terms of user authentication, this study compared the effectiveness of accelerometer data against gyroscope data. According to the findings, the accelerometer data surpassed the gyroscope data in the authentication process. Notably, the study revealed that employing LSTM to combine the accelerometer and gyroscope data resulted in near-perfect user authentication. The insights gained from this study help to develop user identification and authentication approaches that employ smartphone accelerometer data.
APA, Harvard, Vancouver, ISO, and other styles
25

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
APA, Harvard, Vancouver, ISO, and other styles
26

Hassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (October 2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.

Full text
Abstract:
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.
APA, Harvard, Vancouver, ISO, and other styles
27

Baldini, Gianmarco, Raimondo Giuliani, and Gary Steri. "Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform." Applied Sciences 8, no. 11 (November 6, 2018): 2167. http://dx.doi.org/10.3390/app8112167.

Full text
Abstract:
This paper addresses the problem of authentication and identification of wireless devices using their physical properties derived from their Radio Frequency (RF) emissions. This technique is based on the concept that small differences in the physical implementation of wireless devices are significant enough and they are carried over to the RF emissions to distinguish wireless devices with high accuracy. The technique can be used both to authenticate the claimed identity of a wireless device or to identify one wireless device among others. In the literature, this technique has been implemented by feature extraction in the 1D time domain, 1D frequency domain or also in the 2D time frequency domain. This paper describes the novel application of the synchrosqueezing transform to the problem of physical layer authentication. The idea is to exploit the capability of the synchrosqueezing transform to enhance the identification and authentication accuracy of RF devices from their actual wireless emissions. An experimental dataset of 12 cellular communication devices is used to validate the approach and to perform a comparison of the different techniques. The results described in this paper show that the accuracy obtained using 2D Synchrosqueezing Transform (SST) is superior to conventional techniques from the literature based in the 1D time domain, 1D frequency domain or 2D time frequency domain.
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Chia-Chen, Aristophane Nshimiyimana, Morteza SaberiKamarposhti, and Ersin Elbasi. "Authentication Framework for Augmented Reality with Data-Hiding Technique." Symmetry 16, no. 10 (September 24, 2024): 1253. http://dx.doi.org/10.3390/sym16101253.

Full text
Abstract:
Currently, most existing research on the security of augmented reality (AR) primarily focuses on user-to-user or user-to-infrastructure authentication, aiming to establish secure communication and prevent potential attacks, such as man-in-the-middle attacks, among others. AR techniques enable users to interact with virtual information and objects within the real environment. However, creating virtual objects can be time-consuming, and unfortunately, malicious individuals may unlawfully copy these objects and integrate them into their own AR scenarios. It is essential to authenticate whether AR objects and the associated content they interact with are legitimately integrated. This paper proposes a novel method for authenticating AR-delivered content using data-hiding techniques with the symmetric property. The proposed method utilizes data hiding to embed data within the content that AR objects interact with, enabling the identification of illegal and tampered AR objects. A scenario involving an AR e-book is defined, and two data-hiding methods are applied to this scenario. The experimental results demonstrate that both data-hiding methods effectively identify the tampered image page of an AR e-book under different tone versions, new trigger image(s) added, or new image(s) replacement.
APA, Harvard, Vancouver, ISO, and other styles
29

Nini, Deepthi Mohan, BSajini Krishnadas, and KV Jyothi. "PA02.24. Importance of microscopic techniques for the identification/authentication of herbal medicines." Ancient Science of Life 32, no. 5 (2013): 69. http://dx.doi.org/10.4103/0257-7941.123892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Aleidan, Anfal Ahmed, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim, and Alaa E. S. Ahmed. "Biometric-Based Human Identification Using Ensemble-Based Technique and ECG Signals." Applied Sciences 13, no. 16 (August 21, 2023): 9454. http://dx.doi.org/10.3390/app13169454.

Full text
Abstract:
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics have been developed in the past. Biometric information is hard to lose, forget, duplicate, or share because it is a part of the human body. Many authentication methods focused on electrocardiogram (ECG) signals have achieved great success. In this paper, we have developed cardiac biometrics for human identification using a deep learning (DL) approach. Cardiac biometric systems rely on cardiac signals that are captured using the electrocardiogram (ECG), photoplethysmogram (PPG), and phonocardiogram (PCG). This study utilizes the ECG as a biometric modality because ECG signals are a superior choice for accurate, secure, and reliable biometric-based human identification systems, setting them apart from PPG and PCG approaches. To get better performance in terms of accuracy and computational time, we have developed an ensemble approach based on VGG16 pre-trained transfer learning (TL) and Long Short-Term Memory (LSTM) architectures to optimize features. To develop this authentication system, we have fine-tuned this ensemble network. In the first phase, we preprocessed the ECG biosignal to remove noise. In the second phase, we converted the 1-D ECG signals into a 2-D spectrogram image using a transformation phase. Next, the feature extraction step is performed on spectrogram images using the proposed ensemble DL technique, and finally, those features are identified by the boosting machine learning classifier to recognize humans. Several experiments were performed on the selected dataset, and on average, the proposed system achieved 98.7% accuracy, 98.01% precision, 97.1% recall, and 0.98 AUC. In this paper, we have compared the developed approach with state-of-the-art biometric authentication systems. The experimental results demonstrate that our proposed system outperformed the human recognition competition.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Bailing, Hongri Liu, Kaixin Wang, Guodong Xin, and Jia Song. "Research Notes: User Identification Model Based on Mouse Behaviors." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (February 2018): 175–92. http://dx.doi.org/10.1142/s0218194018400028.

Full text
Abstract:
This study investigates the user identification method based on the computer mouse dynamic behaviors. One of the purposes is to refine seven types of mouse actions, and about 110 dimensional features have been employed from user session statistics and operating characteristics. And then, two basic techniques, principal component analysis (PCA) and weighted multiclassifier, are used to lay out the mouse behavior. Combing PCA and the new proposed classifier, two experiments on identification and authentication have been carried out. By validating the selected mouse data, the accuracy rate is as high as 85% in the identification experiment, and the false rejection rate (FRR) reaches 5.5% and false acceptance rate (FAR) reaches 8.8% in the authentication experiment. The results show that the proposed methods and the selected features can be well applied in practice.
APA, Harvard, Vancouver, ISO, and other styles
32

Ziyatbekova, G. Z., and M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, no. 4 (December 30, 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.

Full text
Abstract:
This paper presents an efficient fingerprint verification algorithm that improves matching accuracy. Algorithms for image processing for biometric technologies of identification and authentication of a person using fingerprints are considered. They are essential tools for improving performance across a wide range of industries. The recognition system is designed for storing data, further processing it, identifying and displaying fingerprints. In forensics, modern image processing algorithms are used and provide a significant improvement in work results. Fingerprint images are degraded and damaged due to changes in skin and print conditions. Thus, image enhancement techniques are used before feature points are detected and fine details are extracted. Templates are generated based on feature vector extraction and databases are created for verification and identification of fingerprint images. The method of experimental research is carried out, the process of processing the identification results is considered. To solve this problem, a recognition system was proposed, which is designed to store data, further process it, identify and display fingerprints. They are used in places of high secrecy as a kind of password access key based on scanning and verifying fingerprints with the FVC2002 database. The results obtained show that the proposed algorithm is more efficient and reliable.
APA, Harvard, Vancouver, ISO, and other styles
33

Kharabe, Shwetambari, and C. Nalini. "Survey on finger-vein segmentation and authentication." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 9. http://dx.doi.org/10.14419/ijet.v7i1.2.8962.

Full text
Abstract:
Exploding growth in the field of electronic information technology, the finger vein authentication technique plays a vibrant role for personal identification and verification. In recent era, this technique is gaining popularity, as it provides a high security and convenience approach for personal authentication. Vein biometrics is an emerging methodologycomparing to other systems, due to its strengths of low forgery risk, aliveness detection and stableness over long period of time. Literatures published based on different techniques used forand authentication process are described and evaluated in this paper. These processes hadgained an outstanding promise in variety of applications and much attention among researchers to provide combine accuracy, universality and cost efficiency. This paper in brief, reviews various approaches used for finger vein segmentation and feature extraction. The reviews are based on finger vein basic principles, image acquisition methodology, pre-processing functions, segmentation, feature extraction,classification, matching and identification procedures, which are analyzed scientifically, thoroughly and comprehensively.Based on the analysis, the ideal process and procedure is identified, which will be an idyllic solution for finger vein authentication.
APA, Harvard, Vancouver, ISO, and other styles
34

Perez-Meana, Hector Manuel, and Mariko Nakano-Miyatake. "Identification Card Authentication System Based on Watermarking Technique." Telecommunications and Radio Engineering 67, no. 20 (2008): 1847–55. http://dx.doi.org/10.1615/telecomradeng.v67.i20.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Arjun Kharavane, Lakshmi, J. S. Awati, and M. S. Kumbhar. "Fuzzy Controller for Visitor Monitor System." Journal of Embedded Systems and Processing 8, no. 3 (2023): 1–7. http://dx.doi.org/10.46610/joesp.2023.v08i03.001.

Full text
Abstract:
The field of image identification using deep learning has made great strides, and home services and security systems that utilize biometric data such as fingerprint, iris, and face recognition are in demand. This article has focused on user authentication techniques that make use of facial recognition. A webcam-based visitor authentication system is presented in this paper. A webcam is used to gather face data with four attributes that can be used to identify a person during the preprocessing stage of face recognition.
APA, Harvard, Vancouver, ISO, and other styles
36

Sultan, Shahad, and Mayada Faris Ghanim. "Human Retina Based Identification System Using Gabor Filters and GDA Technique." Journal of communications software and systems 16, no. 3 (September 15, 2020): 243–53. http://dx.doi.org/10.24138/jcomss.v16i3.1031.

Full text
Abstract:
A biometric authentication system provides an automatic person authentication based on some characteristic features possessed by the individual. Among all other biometrics, human retina is a secure and reliable source of person recognition as it is unique, universal, lies at the back of the eyeball and hence it is unforgeable. The process of authentication mainly includes pre-processing, feature extraction and then features matching and classification. Also authentication systems are mainly appointed in verification and identification mode according to the specific application. In this paper, preprocessing and image enhancement stages involve several steps to highlight interesting features in retinal images. The feature extraction stage is accomplished using a bank of Gabor filter with number of orientations and scales. Generalized Discriminant Analysis (GDA) technique has been used to reduce the size of feature vectors and enhance the performance of proposed algorithm. Finally, classification is accomplished using k-nearest neighbor (KNN) classifier to determine the identity of the genuine user or reject the forged one as the proposed method operates in identification mode. The main contribution in this paper is using Generalized Discriminant Analysis (GDA) technique to address ‘curse of dimensionality’ problem. GDA is a novel method used in the area of retina recognition.
APA, Harvard, Vancouver, ISO, and other styles
37

Najafi, Fatemeh, Masoud Kaveh, Diego Martín, and Mohammad Reza Mosavi. "Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks." Sensors 21, no. 6 (March 12, 2021): 2009. http://dx.doi.org/10.3390/s21062009.

Full text
Abstract:
Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. However, PUFs are often sensitive to internal and external noises, which cause reliability issues. The requirement of additional robustness and reliability leads to the involvement of error-reduction methods such as error correction codes (ECCs) and pre-selection schemes that cause considerable extra overheads. In this paper, we propose deep PUF: a deep convolutional neural network (CNN)-based scheme using the latency-based DRAM PUFs without the need for any additional error correction technique. The proposed framework provides a higher number of challenge-response pairs (CRPs) by eliminating the pre-selection and filtering mechanisms. The entire complexity of device identification is moved to the server side that enables the authentication of resource-constrained nodes. The experimental results from a 1Gb DDR3 show that the responses under varying conditions can be classified with at least a 94.9% accuracy rate by using CNN. After applying the proposed authentication steps to the classification results, we show that the probability of identification error can be drastically reduced, which leads to a highly reliable authentication.
APA, Harvard, Vancouver, ISO, and other styles
38

V L, Pavani. "A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 8 (December 24, 2018): 4. http://dx.doi.org/10.3991/ijim.v12i8.8194.

Full text
Abstract:
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The perception of single sign-on allows a legitimate user to access a different service provider on a DCN using a single session key. Recently, several user identification techniques being proposed for DCN. Unfortunately, the existing proposals cannot maintain user anonymity when the majority of probable attacks. In addition, the further time synchronization mechanism they use can result in widespread overhead costs. To overcome these shortcomings, we propose a novel authentication mechanism to prevent unauthorized service access for a mobile device in distributed networks. The mechanism implements methods to generate securely encrypted keys using RSA algorithm to validate the authentication of user login id and password. Later, it implements a secure session key generation using DH algorithm which allows accessing the different services without repeating the authentication mechanism. An experimental evaluation was performed to measure execution time overhead for the registration process, an authentication process, session key generation process and Service Request Performance. The comparison results with existing authentication mechanism show an improvisation in all the measures.
APA, Harvard, Vancouver, ISO, and other styles
39

Aksun Tümerkan, Elif Tuğçe. "Effect of Industrial and Domestic Processing Techniques On the DNA Degradation of Anchovy." Turkish Journal of Agriculture - Food Science and Technology 9, sp (January 5, 2022): 2385–89. http://dx.doi.org/10.24925/turjaf.v9isp.2385-2389.4706.

Full text
Abstract:
Food fraudulent activities have become a serious issue over the world recently. Seafood products have trading and profitable potential in Turkey owing to the abundance of fisheries and other species. While morphological features are commonly used for species identification in raw seafood products, this identification does not meet the correct classification in cryptic species and processed seafood products. Molecular techniques have been utilized for species authentication in processed seafood items successfully. In this study, the effect of different processing techniques on the DNA quality and DNA degradation isolated from raw and processed anchovy was investigated. Anchovy is one of the important species in both fisheries activities and processing and consumption in Turkey. For this aim, DNA was isolated from processed anchovy groups and un-processed anchovy groups as control by the same extraction methods and the quality of DNA was compared among the groups. The most common processing techniques, frying, baking, smoking, roasting, baking and grilling were applied to anchovy. The results revealed that not only different thermal processing but also treatment with acid and salt cause DNA degradation and quality loss of DNA parameters which are essential for authentication of species and traceability for public health.
APA, Harvard, Vancouver, ISO, and other styles
40

Ingale, Kiran, Madhur Patil, Samarth Bhamare, Saurav Chaudhari, and Prof Sonal Chanderi. "A Research Paper on Smart Authentication System for Identity Verification." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1400–1405. http://dx.doi.org/10.22214/ijraset.2023.50349.

Full text
Abstract:
Abstract: This research paper focuses on the creation of aweb application that employs modern techniques to authenticate and verify the identities of students and employees. In the era of digital transformation, conventional identification methods have become less effective. To overcome this challenge, the proposed solution leverages advanced biometric technologies like facial recognition and QR codes to ensure precise identification of individuals. Moreover, the application offers SMS and email notifications, along with a performance chart generated by machine learning to provide comprehensive user information.The
APA, Harvard, Vancouver, ISO, and other styles
41

Hebri, Dheeraj, and Vasudeva . "Multimodal Authentication of Ocular Biometric and Finger Vein Verification in Smartphones: A Review." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 161. http://dx.doi.org/10.14419/ijet.v7i3.12.15909.

Full text
Abstract:
Biometric authentication has demanded a lot of attention from the researchers in the current age, as the field aimsto identify human behavioral charcteristics based on fingerprint, finger vein, ocular, face, palm, etc. So, this field is useful in many applications for offering security and authentication of industry or business. Also, the multimodal biometric system is used to provide a greater security and higher reliability that combines two or more biometric identifiers. Finger vein and ocular-based multimodal biometric authentication system are one of the major techniques which have been considered for efficient identification and verification purpose. This system mainly works in some common stages which include, scanning of finger vein and ocular, pre-processing, feature extraction and matching of finger vein and ocular in a database as well. This paper attempts to review various recent and advanced multimodal finger vein and ocular biometric authentication systems. Finally, possible directions in the multimodal biometric authentication system for the future work are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
42

C. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C., and Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.

Full text
Abstract:
Abstract: Security is one of the major challenges faced by individuals, organizations, and the world at large. The evolution of technology assists in solving this menace of insecurity and with the continuous growth in technology; several techniques have been used in tackling this problem of insecurity, starting from traditional systems like the door locks with handles to automated doors. In recent times, most of these doors lock security systems are based on microcontrollers, GSM, GPS, sensors, biometrics like eye scanner, fingerprint, face recognition, password, etc., and each of these techniques has its advantages and disadvantages. The developed system involves the design of a prototype door access control system that will control the access of personnel to a location/office using voice recognition and Radio Frequency Identification (RFID) authentication techniques. The system at first detects the movement of a person and prompts the person for verification. If verified either by voice or by RFID, the door automatically opens and closes after 5 seconds. The aim of this developed system is to restrict the access of an office/location using Radio Frequency Identification and voice recognition authentication, thus offering security to the lives and properties of people. Keywords: Biometrics, Radio Frequency Identification (RFID), LCD, Arduino, GPS, GSM
APA, Harvard, Vancouver, ISO, and other styles
43

Kusban, Muhammad, Aris Budiman, and Bambang Hari Purwoto. "Image enhancement in palmprint recognition: a novel approach for improved biometric authentication." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (April 1, 2024): 1299. http://dx.doi.org/10.11591/ijece.v14i2.pp1299-1307.

Full text
Abstract:
Several researchers have used image enhancement methods to reduce detection errors and increase verification accuracy in palmprint identification. Divergent opinions exist among experts regarding the best method of image filtering to improve image palmprint recognition. Because of the unique characteristics of palmprints and the difficulties in preventing counterfeiting, image-filtering techniques are the subject of this current research. Researchers hope to create the best biometric system possible by utilizing various techniques. These techniques include image enhancement, Gabor orientation scales, dimension reduction techniques, and appropriate matching strategies. This study investigates how different filtering approaches might be combined to improve images. The palmprint identification system uses a 3W filter, which combines wavelet, Wiener, and weighted filters. Optimizing results entails coordinating the 3W filter with Gabor orientation scales, matching processes, and dimension reduction methods. The research shows that accuracy may be considerably increased using a 3W filter with a Gabor orientation scale of [8×7], the kernel principal component analysis (KPCA) dimension reduction methodology, and a cosine matching method. Specifically, a value of 99.722% can be achieved. These results highlight the importance of selecting appropriate settings and techniques for palmprint recognition systems.
APA, Harvard, Vancouver, ISO, and other styles
44

K. Selsiya, Dr. D. Banumathy, Nijanthan, and Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (May 31, 2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.

Full text
Abstract:
Biometrics is the automated process used to recognize human by measuring their behavioural and physiological characteristics. Biometrics are generally used either for verification The use of biometric for identification purposes requires that a particular biometric factor be unique for each individual that it can be calculated, and that it is invariant over time. Biometrics such as signatures, photographs, fingerprints, voiceprints and retinal blood vessel patterns all have noteworthy drawbacks. Although signatures and photographs are cheap and easy to obtain and store, they are impossible to identify automatically with assurance, and are easily forget. Human iris on the other hand as an internal organ of the eye and as well protected from the external environment, yet it is easily visible from within one meter of distance makes it a perfect biometric for an identification system with the ease of speed, reliability and automation Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on images of the irises of an individual’s eyes, whose complex random patterns are unique. Proposed system provides a comprehensive implementation of periocular biometrics and a deep insight of various aspects such as utility of peri-ocular region In this project face and eye points are captured using Grassmann algorithm and Gabor filter for eye features extraction. Each trait is analysed separately and given its own score. The results are combined using deep leaning algorithm to provide a single decision in real time environments.
APA, Harvard, Vancouver, ISO, and other styles
45

Weerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.

Full text
Abstract:
Summary Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. Results: The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. Conclusion: The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
APA, Harvard, Vancouver, ISO, and other styles
46

Chiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.

Full text
Abstract:
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
APA, Harvard, Vancouver, ISO, and other styles
47

A, Dr Arudra. "MORSE CODE-BASED AUTHENTICATION SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 27, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31829.

Full text
Abstract:
To tackle analytically complex issues, data science is a multidisciplinary combination of data inference, algorithm development, and technology. Nearly every industry, including business, finance, healthcare, and education, uses data science to manage massive volumes of data. Practical uses include text prediction, image processing, identity recognition, audio processing for speech, stock movement, and cancer prediction. Given that the majority of individuals on the planet have issues with security and authentication, For those who use Morse Code for self-authentication, we can offer real-time eye tracing for password authentication. As we all know, the 21st century has seen significant support for advancements in authorization and authentication technology. Since the late 1990s, personal identification numbers, or PINs, have been extensively used for user authentication and security. These days, it is easy to crack PIN codes, so we would rather use a different strategy. On the other hand, PIN authentication using hands-off gaze-based PIN entry techniques offers a more secure password entry option because it leaves no physical traces behind. Key Words: Morse code, Face recognition, Pin Entry, Eye Blinks, Gaze based
APA, Harvard, Vancouver, ISO, and other styles
48

Sadahide, Ayako, Hideki Itoh, Ken Moritou, Hirofumi Kameyama, Ryoya Oda, Hitoshi Tabuchi, and Yoshiaki Kiuchi. "A Clinical Trial Evaluating the Efficacy of Deep Learning-Based Facial Recognition for Patient Identification in Diverse Hospital Settings." Bioengineering 11, no. 4 (April 15, 2024): 384. http://dx.doi.org/10.3390/bioengineering11040384.

Full text
Abstract:
Background: Facial recognition systems utilizing deep learning techniques can improve the accuracy of facial recognition technology. However, it remains unclear whether these systems should be available for patient identification in a hospital setting. Methods: We evaluated a facial recognition system using deep learning and the built-in camera of an iPad to identify patients. We tested the system under different conditions to assess its authentication scores (AS) and determine its efficacy. Our evaluation included 100 patients in four postures: sitting, supine, and lateral positions, with and without masks, and under nighttime sleeping conditions. Results: Our results show that the unmasked certification rate of 99.7% was significantly higher than the masked rate of 90.8% (p < 0.0001). In addition, we found that the authentication rate exceeded 99% even during nighttime sleeping. Furthermore, the facial recognition system was safe and acceptable for patient identification within a hospital environment. Even for patients wearing masks, we achieved a 100% success rate for authentication regardless of illumination if they were sitting with their eyes open. Conclusions: This is the first systematical study to evaluate facial recognition among hospitalized patients under different situations. The facial recognition system using deep learning for patient identification shows promising results, proving its safety and acceptability, especially in hospital settings where accurate patient identification is crucial.
APA, Harvard, Vancouver, ISO, and other styles
49

J. Balachandran, M., and P. Sujatha. "Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 773. http://dx.doi.org/10.14419/ijet.v7i4.36.24241.

Full text
Abstract:
Last couple of decades, internet usage has been changed each and every technology domain. This has lead to implementation and accommodation of cloud computing. As the Cloud has the nature of sharing the data, it led to various types of security attacks. Hence security mechanisms which has various features/types are needed and hence security breaches can be prevented. Authentication is one of the vital techniques playing a major role in security part. Cloud Computing verifies the identification of a user during the process of accessing the services from cloud servers. Different authentication techniques are used to verify the user’s identity before granting the access to them. This paper analyze the performance of AES and 3DES algorithms and find out the best suit for implementing multi level authentication in cloud. Based on execution time, request and response time against the concurrent user load and file size, AES is faster, more secure and safer than 3DES.
APA, Harvard, Vancouver, ISO, and other styles
50

Dr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.

Full text
Abstract:
Digital watermarking is the effective method of copyright defence. Typically robot-proof watermarks used to secure copyright, and are immune to some deletion or adjustment of protected documents. Fragile watermarks are typically used for content identification and are vulnerable to small alterations. In this paper, we suggest a hybrid watermarking approach that combines a solid and fragile watermark with copyright and material authentication. This mechanism is often resistant to manipulation and to clone attacks at the same time. The relationship between a delicate watermark and a stable watermark is characterised by our involvement. DCT coefficients are used to integrate the values of the watermark.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography