Preview

Biometric Based Web Security Using Ridges of Fingers

Best Essays
Open Document
Open Document
3825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometric Based Web Security Using Ridges of Fingers
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 2 Issue 8 August, 2013 Page No. 2348-2354

Biometric Based Web Security Using Ridges of
Fingers
Md. Majharul Haque1, R. H. M. Alaol Kabir2, Md. Shakil Ahamed Shohag3, Dr. Zerina Begum4
1

Dhaka University, Department of Computer Science & Engineering,
Dhaka, Bangladesh mazharul_13@yahoo.com 2

Dhaka University, Institute of Information Technology,
Dhaka, Bangladesh alaol_kabir@yahoo.com 3

University of Development Alternative, Department of Computer Science & Engineering
Dhaka, Bangladesh shakilshohag@gmail.com 41

Dhaka University, Institute of Information Technology,
Dhaka, Bangladesh zerinabegum@gmail.com Abstract: Web security is in general taken as providing safeguard at the borders of an organization by keeping out impostors. For this purpose password based verification system with public key cryptography is a common standard. Passwords however have their own weaknesses; not only weak passwords can be easily guessed but the strong ones can be broken through too. Sometime people use access cards or identity cards for authentication purpose which can easily be stolen or forged. So designing a high security using passwords, identity cards or access cards still remain an open problem. Biometric characteristics of an individual however are unique and do not change over time that makes biometrics well suited for authentication. There are a large number of applications of biometric system for authentication based on finger prints, hand geometry, iris and voice exist, such as forensics, driver license and passport control etc. Since the internet growth is increasing rapidly, restricted access to sensitive data on the Web to unauthorized users is needed. A hand geometry based system has been proposed here to authenticate users for imposing access restriction to web. This method has been tested on 100 individuals. This technique can be



References: [1] A. K. Jain, A. Ross and S. Prabhakar, “Biometrics-Based Web Access”, MSU Technical Report TR98-33, 1998. http://www.veridicom.com (Accessed: August 19, 2013) A. Jain, R. Bolle, and S. Pankanti (Eds.), Kluwer Academic Publishers, 1998. Technol., vol. 14, no. 1, pp. 4-20, Feb. 2004. Norwell, MA: Kluwer, pp. 87-101, 1999. vol. 22, no. 10, pp. 1168-1171, Oct. 2000. recognition”, Pattern Recognit. Letter, vol. 24, pp. 21452152, 2003. U.K., pp. 668-678, Jun. 9-11, 2003. Academic Publishers, 1998. http://kh.hd.uib.no/httpddoc/info/authtut.htm (Accessed: August 20, 2013) and Software Engineering, Dept. of Electr. Eng., Shahed Univ., Tehran, Iran, 2009. 1177-1180, May 13-15, 2008. Geometry Biometrics: A Neural Network Approach”, Neural Processing Letters 26(3): 201-216, 2007. Md. Majharul Haque, IJECS Volume 2 Issue 8 August, 2013 Page No.2348-2354 Page 2354

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant is that passwords can often be stolen, accidentally revealed, or forgotten.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Companies increase security by providing log in and password verification system for each of their employees that need to access their data.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Better Essays

    We Do Have

    • 8454 Words
    • 34 Pages

    The ability to verify a user’s identity, typically referred to as authentication, has become an essential basis for trust in business relationships. Authentication establishes trust by proving the identity of a participant in any communication, or in the case of conducting electronic business, any transaction. Simply put, authentication solutions within the enterprise environment are designed to ensure that a person is who he/she claims to be. Authentication solutions are typically used as the basis for critical…

    • 8454 Words
    • 34 Pages
    Better Essays
  • Powerful Essays

    Cardless Atm

    • 2555 Words
    • 11 Pages

    In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds. In particular we develop a prototype model for the utilization of biometrics equipped ATM to provide security solution against must of the well-known breaches. To ensure that such security approach will be accepted by the majority of users. And we hope that, this Paper will provide Secure Transactions.…

    • 2555 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Biometric Thumb Locker

    • 3792 Words
    • 16 Pages

    In Rizal Technological University, Faculty, Students are using lockers or cabinets in a way of storing files or important documents for privacy and security purposes. Some locker is controlled only by ordinary padlock, so that the user might not secure their important documents or files and other personal belongings. This study generates some alternative improvements regarding this matter and offered by biometric finger print locker with alarm systems are the higher level of security provided over existing products. It can be place in locker area of a specific college department, new users can be authorized for access instantly, since there is no need to have extra keys and the products are easy to fit and fast to use.…

    • 3792 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Dr. Mohamed Khairy Shahin

    • 5649 Words
    • 23 Pages

    Personal verification has become an important and highdemand technique for security access systems in the last…

    • 5649 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Smart Cards

    • 10712 Words
    • 43 Pages

    Smart cards help businesses evolve and expand their products and services in a changing global marketplace. The scope of uses for a smart card has expanded each year to include applications in a variety of markets and disciplines. In recent years, the information age has introduced an array of security and privacy issues that have called for advanced smart card security applications.…

    • 10712 Words
    • 43 Pages
    Good Essays
  • Powerful Essays

    Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses.…

    • 4892 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Mumbai University Bachelor of Information Technology (B.Sc. IT) Third year Semester V Internet Security April 2009 CON. -09 (3 Hours) N.B. [Total Marks: 100…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hotel Management System

    • 2911 Words
    • 12 Pages

    Bennet, D. (2000), Authorisation and Security Systems for E-Commerce, Murdoch Research Center [online], 1(3), 3-26. Available from: http://www.it.murdoch.edu.au/~smr/jour%/info/security/paper.html [Accessed 15 December 2004]…

    • 2911 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    poop

    • 1058 Words
    • 5 Pages

    1. INTRODUCTION 1.1. History of Authorization System The security of digital data has long been a concern of operating system designers. The first time-sharing systems in the early 1960s had password schemes as part of logging in, memory protection hardware, and access control lists on files.…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Good Essays

    When implementing a typical biometric system, one thing to note are five components which include a sensor, signal processing algorithms, data storage, matching algorithms, and decision processing. Biometric standards are being developed on national and international levels. The purpose of creating these standards is to create a simpler environment for deployment of biometric systems across organizations. Standards will also help reduce the cost and enable interoperability. Standards are being developed for technical interfaces, data interexchange formats, testing and reporting, and societal issues. Some of the organizations developing biometric standards include InterNational Committee for Information Technology Standards (INCITS) M1, National Institute of Standards and Technology, and Organization for Advancement of Structured Information Standards (OASIS).…

    • 471 Words
    • 2 Pages
    Good Essays