Pandiaraja et al., 2023 - Google Patents
An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain TechnologyPandiaraja et al., 2023
- Document ID
- 14455717584974824438
- Author
- Pandiaraja P
- Harishma R
- Haritha J
- Karthika R
- Publication year
- Publication venue
- 2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)
External Links
Snippet
Nowadays, voting is done electronically, which has various characteristics which is different from current voting methods. Though there are many demerits in the e-voting systems like voter fraud, requires high security features, damages to the machines can cause the …
- 238000005516 engineering process 0 title abstract description 11
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | Introduction to biometrics | |
Bolle et al. | Guide to biometrics | |
Jain et al. | Biometrics: a tool for information security | |
Sumalatha et al. | A comprehensive review of unimodal and multimodal fingerprint biometric authentication systems: Fusion, attacks, and template protection | |
Elhoseny et al. | Multimodal biometric personal identification and verification | |
Sheng et al. | Template-free biometric-key generation by means of fuzzy genetic clustering | |
Ezz et al. | A silent password recognition framework based on lip analysis | |
Selwal et al. | Low overhead octet indexed template security scheme for multi-modal biometric system | |
Jadhav et al. | Review on multimodal biometric recognition system using machine learning | |
Hossam Eldein Mohamed et al. | Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix | |
Sharma et al. | Encryption of text using fingerprints as input to various algorithms | |
Khallaf et al. | Implementation of quaternion mathematics for biometric security | |
Neha et al. | Biometric re-authentication: An approach towards achieving transparency in user authentication | |
Choquehuanca-Chuctaya et al. | The security of biometric data in devices with cancellable biometrics technology: A systematic review of the literature | |
Abd-Aljabbar et al. | Secure Cloud Storage Using Multi-Modal Biometric Cryptosystem: A Deep Learning-Based Key Binding Approach | |
Ahmad | Global and local feature-based transformations for fingerprint data protection | |
Omolewa et al. | Border Control via Passport Verification using Fingerprint Authentication Technique | |
Vinothkanna et al. | A multimodal biometric approach for the recognition of finger print, palm print and hand vein using fuzzy vault | |
Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology | |
Pathak et al. | Performance of multimodal biometric system based on level and method of fusion | |
Abd Hamid et al. | A secure online voting system using face recognition technology | |
Meghanathan | Biometric systems for user authentication | |
Abed et al. | Advancements and Challenges in Low-Quality Fingerprint Identification: A Comprehensive Survey | |
Sharma et al. | Biometrics: Introduction and applications | |
Tait | Behavioural biometrics authentication tested using eyewriter technology |