Preview

Biometric Based Web Security Using Ridges of Fingers

Best Essays
Open Document
Open Document
3825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometric Based Web Security Using Ridges of Fingers
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 2 Issue 8 August, 2013 Page No. 2348-2354

Biometric Based Web Security Using Ridges of
Fingers
Md. Majharul Haque1, R. H. M. Alaol Kabir2, Md. Shakil Ahamed Shohag3, Dr. Zerina Begum4
1

Dhaka University, Department of Computer Science & Engineering,
Dhaka, Bangladesh mazharul_13@yahoo.com 2

Dhaka University, Institute of Information Technology,
Dhaka, Bangladesh alaol_kabir@yahoo.com 3

University of Development Alternative, Department of Computer Science & Engineering
Dhaka, Bangladesh shakilshohag@gmail.com 41

Dhaka University, Institute of Information Technology,
Dhaka, Bangladesh zerinabegum@gmail.com Abstract: Web security is in general taken as providing safeguard at the borders of an organization by keeping out impostors. For this purpose password based verification system with public key cryptography is a common standard. Passwords however have their own weaknesses; not only weak passwords can be easily guessed but the strong ones can be broken through too. Sometime people use access cards or identity cards for authentication purpose which can easily be stolen or forged. So designing a high security using passwords, identity cards or access cards still remain an open problem. Biometric characteristics of an individual however are unique and do not change over time that makes biometrics well suited for authentication. There are a large number of applications of biometric system for authentication based on finger prints, hand geometry, iris and voice exist, such as forensics, driver license and passport control etc. Since the internet growth is increasing rapidly, restricted access to sensitive data on the Web to unauthorized users is needed. A hand geometry based system has been proposed here to authenticate users for imposing access restriction to web. This method has been tested on 100 individuals. This technique can be



References: [1] A. K. Jain, A. Ross and S. Prabhakar, “Biometrics-Based Web Access”, MSU Technical Report TR98-33, 1998. http://www.veridicom.com (Accessed: August 19, 2013) A. Jain, R. Bolle, and S. Pankanti (Eds.), Kluwer Academic Publishers, 1998. Technol., vol. 14, no. 1, pp. 4-20, Feb. 2004. Norwell, MA: Kluwer, pp. 87-101, 1999. vol. 22, no. 10, pp. 1168-1171, Oct. 2000. recognition”, Pattern Recognit. Letter, vol. 24, pp. 21452152, 2003. U.K., pp. 668-678, Jun. 9-11, 2003. Academic Publishers, 1998. http://kh.hd.uib.no/httpddoc/info/authtut.htm (Accessed: August 20, 2013) and Software Engineering, Dept. of Electr. Eng., Shahed Univ., Tehran, Iran, 2009. 1177-1180, May 13-15, 2008. Geometry Biometrics: A Neural Network Approach”, Neural Processing Letters 26(3): 201-216, 2007. Md. Majharul Haque, IJECS Volume 2 Issue 8 August, 2013 Page No.2348-2354 Page 2354

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Better Essays

    We Do Have

    • 8454 Words
    • 34 Pages

    The ability to verify a user’s identity, typically referred to as authentication, has become an essential basis for trust in business relationships. Authentication establishes trust by proving the identity of a participant in any communication, or in the case of conducting electronic business, any transaction. Simply put, authentication solutions within the enterprise environment are designed to ensure that a person is who he/she claims to be. Authentication solutions are typically used as the basis for critical…

    • 8454 Words
    • 34 Pages
    Better Essays
  • Powerful Essays

    Cardless Atm

    • 2555 Words
    • 11 Pages

    In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds. In particular we develop a prototype model for the utilization of biometrics equipped ATM to provide security solution against must of the well-known breaches. To ensure that such security approach will be accepted by the majority of users. And we hope that, this Paper will provide Secure Transactions.…

    • 2555 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    ABSTRACT The providers of Internet banking services must be more responsive towards security requirements. While there is no doubt that Internet banking transaction should have layered protection against security threats, the providers should approach security considerations as part of their service offerings. Biometric based authentication and identification systems are the new solutions to address the issues of security and privacy. Using biometrics for identification restrict individuals from access to physical spaces and electronic services An effective authentication method should have customer acceptance, reliable performance, scalability to accommodate growth, and interoperability with existing systems and future plans. In this study, the security threats in Internet banking, its solutions in biometrics and its acceptance in the consumer market are studied using descriptive and exploratory research. The methods of descriptive research are used to obtain information concerning the major security issues in e-Banking. The research had been completed on the basis of secondary data (online databases, scientific journals, surveys, news). Keywords: Biometrics, e-banking, electronic banking, e-security, secure transactions, security threats, Identity thefts © Amtul Fatima, 2011…

    • 4647 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Biometric Thumb Locker

    • 3792 Words
    • 16 Pages

    The other major technological advance has been the advent of biometric technology. Biometric identification technology was invented during the latter half of the 20th century. However, it only became a commonly used technology around. This study was automated method of recognizing a person based on a physiological or behavioral characteristic. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.…

    • 3792 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Dr. Mohamed Khairy Shahin

    • 5649 Words
    • 23 Pages

    Personal verification has become an important and highdemand technique for security access systems in the last…

    • 5649 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Smart Cards

    • 10712 Words
    • 43 Pages

    Smart cards help businesses evolve and expand their products and services in a changing global marketplace. The scope of uses for a smart card has expanded each year to include applications in a variety of markets and disciplines. In recent years, the information age has introduced an array of security and privacy issues that have called for advanced smart card security applications.…

    • 10712 Words
    • 43 Pages
    Good Essays
  • Powerful Essays

    than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).…

    • 4892 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Mumbai University Bachelor of Information Technology (B.Sc. IT) Third year Semester V Internet Security April 2009 CON. -09 (3 Hours) N.B. [Total Marks: 100…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    poop

    • 1058 Words
    • 5 Pages

    1. INTRODUCTION 1.1. History of Authorization System The security of digital data has long been a concern of operating system designers. The first time-sharing systems in the early 1960s had password schemes as part of logging in, memory protection hardware, and access control lists on files.…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Hotel Management System

    • 2911 Words
    • 12 Pages

    Bennet, D. (2000), Authorisation and Security Systems for E-Commerce, Murdoch Research Center [online], 1(3), 3-26. Available from: http://www.it.murdoch.edu.au/~smr/jour%/info/security/paper.html [Accessed 15 December 2004]…

    • 2911 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    When implementing a typical biometric system, one thing to note are five components which include a sensor, signal processing algorithms, data storage, matching algorithms, and decision processing. Biometric standards are being developed on national and international levels. The purpose of creating these standards is to create a simpler environment for deployment of biometric systems across organizations. Standards will also help reduce the cost and enable interoperability. Standards are being developed for technical interfaces, data interexchange formats, testing and reporting, and societal issues. Some of the organizations developing biometric standards include InterNational Committee for Information Technology Standards (INCITS) M1, National Institute of Standards and Technology, and Organization for Advancement of Structured Information Standards (OASIS).…

    • 471 Words
    • 2 Pages
    Good Essays