[go: up one dir, main page]

Dhameja, 2005 - Google Patents

Multi-Characteristic Biometric Systems: Who Are You?

Dhameja, 2005

Document ID
547401134543729331
Author
Dhameja S
Publication year
Publication venue
Information Security Journal

External Links

Snippet

Biometrics can be defined as science by which an individual is identified through analyses of physical data and behavioral characteristics. Since the assumption that a single biometric cannot be borrowed, stolen, forgotten, or forged has been proven wrong, a large number of …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification

Similar Documents

Publication Publication Date Title
Bolle et al. Biometric perils and patches
Jain Biometric recognition: how do I know who you are?
Prabhakar et al. Biometric recognition: Security and privacy concerns
Ahmad et al. Technical issues and challenges of biometric applications as access control tools of information security
Mudholkar et al. Biometrics authentication technique for intrusion detection systems using fingerprint recognition
Alwahaishi et al. Biometric authentication security: an overview
Syed et al. Biometric authentication systems in banking: A technical evaluation of security measures
Lone et al. A novel OTP based tripartite authentication scheme
Matyáš et al. Security of biometric authentication systems
El-El-Sofany A Proposed Biometric Authentication Model to Improve Cloud Systems Security.
Nair et al. An approach to improve the match-on-card fingerprint authentication system security
Kalra et al. A survey on multimodal biometric
Ratha Privacy protection in high security biometrics applications
Bagwan et al. Robust Multi-Bio-Metric Authentication Framework in Face and Iris recognition
Sharma et al. Human recognition methods based on biometric technologies
Okokpujie et al. A bimodal biometric bank vault access control system
Oluwadamilola et al. An improved authentication system using hybrid of biometrics and cryptography
Boonkrong Biometric Authentication
Dhameja Multi-Characteristic Biometric Systems: Who Are You?
Zibran Biometric authentication: The security issues
Kumar et al. To study of various security attacks against Biometric template in a generic Biometric Recognition System.
Sharma et al. Biometrics: Introduction and applications
Meghanathan Biometric systems for user authentication
Sandeep Dhameja et al. Multi-Characteristic Biometric Systems: Who Are You?
Dhakal Multi-biometric systems their application and security