International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 2 Issue 8 August, 2013 Page No. 2348-2354
Biometric Based Web Security Using Ridges of
Fingers
Md. Majharul Haque1, R. H. M. Alaol Kabir2, Md. Shakil Ahamed Shohag3, Dr. Zerina Begum4
1
Dhaka University, Department of Computer Science & Engineering,
Dhaka, Bangladesh mazharul_13@yahoo.com 2
Dhaka University, Institute of Information Technology,
Dhaka, Bangladesh alaol_kabir@yahoo.com 3
University of Development Alternative, Department of Computer Science & Engineering
Dhaka, Bangladesh shakilshohag@gmail.com 41
Dhaka University, Institute of Information Technology,
Dhaka, Bangladesh zerinabegum@gmail.com Abstract: Web security is in general taken as providing safeguard at the borders of an organization by keeping out impostors. For this purpose password based verification system with public key cryptography is a common standard. Passwords however have their own weaknesses; not only weak passwords can be easily guessed but the strong ones can be broken through too. Sometime people use access cards or identity cards for authentication purpose which can easily be stolen or forged. So designing a high security using passwords, identity cards or access cards still remain an open problem. Biometric characteristics of an individual however are unique and do not change over time that makes biometrics well suited for authentication. There are a large number of applications of biometric system for authentication based on finger prints, hand geometry, iris and voice exist, such as forensics, driver license and passport control etc. Since the internet growth is increasing rapidly, restricted access to sensitive data on the Web to unauthorized users is needed. A hand geometry based system has been proposed here to authenticate users for imposing access restriction to web. This method has been tested on 100 individuals. This technique can be
References: [1] A. K. Jain, A. Ross and S. Prabhakar, “Biometrics-Based Web Access”, MSU Technical Report TR98-33, 1998. http://www.veridicom.com (Accessed: August 19, 2013) A. Jain, R. Bolle, and S. Pankanti (Eds.), Kluwer Academic Publishers, 1998. Technol., vol. 14, no. 1, pp. 4-20, Feb. 2004. Norwell, MA: Kluwer, pp. 87-101, 1999. vol. 22, no. 10, pp. 1168-1171, Oct. 2000. recognition”, Pattern Recognit. Letter, vol. 24, pp. 21452152, 2003. U.K., pp. 668-678, Jun. 9-11, 2003. Academic Publishers, 1998. http://kh.hd.uib.no/httpddoc/info/authtut.htm (Accessed: August 20, 2013) and Software Engineering, Dept. of Electr. Eng., Shahed Univ., Tehran, Iran, 2009. 1177-1180, May 13-15, 2008. Geometry Biometrics: A Neural Network Approach”, Neural Processing Letters 26(3): 201-216, 2007. Md. Majharul Haque, IJECS Volume 2 Issue 8 August, 2013 Page No.2348-2354 Page 2354