Dhameja, 2005 - Google Patents
Multi-Characteristic Biometric Systems: Who Are You?Dhameja, 2005
- Document ID
- 547401134543729331
- Author
- Dhameja S
- Publication year
- Publication venue
- Information Security Journal
External Links
Snippet
Biometrics can be defined as science by which an individual is identified through analyses of physical data and behavioral characteristics. Since the assumption that a single biometric cannot be borrowed, stolen, forgotten, or forged has been proven wrong, a large number of …
- 230000003542 behavioural 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bolle et al. | Biometric perils and patches | |
Jain | Biometric recognition: how do I know who you are? | |
Prabhakar et al. | Biometric recognition: Security and privacy concerns | |
Ahmad et al. | Technical issues and challenges of biometric applications as access control tools of information security | |
Mudholkar et al. | Biometrics authentication technique for intrusion detection systems using fingerprint recognition | |
Alwahaishi et al. | Biometric authentication security: an overview | |
Syed et al. | Biometric authentication systems in banking: A technical evaluation of security measures | |
Lone et al. | A novel OTP based tripartite authentication scheme | |
Matyáš et al. | Security of biometric authentication systems | |
El-El-Sofany | A Proposed Biometric Authentication Model to Improve Cloud Systems Security. | |
Nair et al. | An approach to improve the match-on-card fingerprint authentication system security | |
Kalra et al. | A survey on multimodal biometric | |
Ratha | Privacy protection in high security biometrics applications | |
Bagwan et al. | Robust Multi-Bio-Metric Authentication Framework in Face and Iris recognition | |
Sharma et al. | Human recognition methods based on biometric technologies | |
Okokpujie et al. | A bimodal biometric bank vault access control system | |
Oluwadamilola et al. | An improved authentication system using hybrid of biometrics and cryptography | |
Boonkrong | Biometric Authentication | |
Dhameja | Multi-Characteristic Biometric Systems: Who Are You? | |
Zibran | Biometric authentication: The security issues | |
Kumar et al. | To study of various security attacks against Biometric template in a generic Biometric Recognition System. | |
Sharma et al. | Biometrics: Introduction and applications | |
Meghanathan | Biometric systems for user authentication | |
Sandeep Dhameja et al. | Multi-Characteristic Biometric Systems: Who Are You? | |
Dhakal | Multi-biometric systems their application and security |