Security Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking
|
|
|
- Chrystal Baldwin
- 10 years ago
- Views:
Transcription
1 Security Issues in Smart Infrastructures for MMBS of Wireless s for ATM banking S.Koteswari #1, Dr.P.John Paul *2,S.Indrani ~3 # 1 Associate. Professor, Dept of ECE, D.N.R Engineering College, Bhimavaram,W.G.Dist, Andhra Pradesh. India. [email protected] * 2 Professor, Dept of CSE, GATES Engineering College, Gooty, Ananthapur, Andhra Pradesh, India. [email protected] ~ 3 Assistant Professor, Dept of CSE, Adarsh College, Bangalore, India [email protected] Abstract: Greater demand for fast and accurate user identification and authentication has increased the growth in electronic transactions. Personal identification numbers (PIN s) for identification and security clearances are often used as access codes for buildings, banks accounts and computer systems. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. A multimodal biometric authentication scheme for automated teller machine (ATM) banking systems is proposed in this paper. In this scheme, a fingerprint and iris biometric techniques are fused with the ATM for person enrollment and authentication to ameliorate the security level and Visual cryptography technique is used to increase the security. Discrete Cosine transform (DCT) is usually used in JPEG based image transform coding, but this paper presents DCT_DHT (Discrete Hartley Transform) transform for feature extraction. This paper also presents VLSI architecture of enrollment and authentication module for ATM banking, which is suitable of achieving low hardware circuit cost as well as low power consumption. This is demonstrated through a Xilinx FPGA, vertex-6 family and XC6VLX75T device. text,image,graphics,speech,audio,vedio,animatio n,handwriting,datafiles.the role of WMMC is to receive multimedia content from the multimedia distribution server and displayed to the user, where in the content may be live or on the demand. Different trends towards multimedia communications are represented in figure1.the need for providing a variety of multimedia communication services is becoming not only technical, but also economically feasible. WMMC requires bit rate channels of medium to high (64kb/s to 2Mb/s per user). Even with scalable compression schemes there is chance of loss of data on wireless system. The following issues need to considered i.e. Firstly different methods to increase the capacity of wireless channels, and secondly to provide quality of service (QoS) in a cost effective way and thirdly the different efficient procedures to combine the wireless channel impairments. Where in the human beings complex perception, communicating behaviors and the ways of acting suits best the multimedia. The multimedia includes audio, video and data and the applications such as in education, travel, banking insurance, administration and publishing are emerging at a fast pace and are need to be characterized by large multimedia documents and that must be communicated within very short delay. Keywords:ATM,DCT_DHT,security,Visual Cryptography,wireless communication. I.INTRODUCTION Motivation for Wireless Multimedia Services and Technologies: Wireless multimedia communication (WMMC)is the field referring to the representation, storage, retrieval of the information expressed in none other than the multiple media such as the Figure 1: Trends in Multimedia Communication
2 There are two key modes in the wireless multimedia systems, they are (1) Person to person communication. (2) Person to machine communication. The key requirements of these two modes are like instant availability[1,2], services from any terminal (mobile point of delivery), real time information transfer, service always on-line. With respect to the service offered to them by the communication system, multimedia applications have several requirements based on different technologies. This requirement which influences the criticality of the demands,that depends on the usage and type of the application gives to Universal multimedia access (UMA). UMA under different network conditions deals with the delivery of images, video, audio and multimedia content. With the limited communication, that is a need to enable the terminals is the main motivation behind UMA. Future services independently on their choice of access technology, usage preferences and terminal equipment are accessed by the users which are enabled by the UMA. Wireless multimedia services and technologies will perform effectively with the quality of service (QoS) and authentication, authorization and accounting of the end-to-end network to verify the users identities and rights and also to ensure the requirements of QoS, which provides a end-toend seamless service to the user. II. BACK GROUND 2.1. Multimodal biometrics & Security Any physical and /or behavioral characteristics of human can be considered as a Biometrics and the characteristics of biometrics include the universality, uniqueness, permanence, measurability, performance, acceptability, circumvention. In this paper, the main goal of accurate identification is to prevent the imposter accessing the secured application of ATM banking[1]. There are three ways in which users can be identified such as, something the user knows(passwords, PIN)[3], the user has (Key,Cards and Tokens) and the user is (Unique Biological properties).the data stored in database can be easily lost, stolen, shared or manipulated and there by the need for security plays the main role or any biometrics. Multimodal Biometrics System (MMBS) can be defined as a recognition system which is capable of identifying a person based on their biological properties. The biological properties can be physical characteristics like face, palm print, iris, hand vein etc and behavior properties like speech, gait, signature etc. Thus the biometric system offers a natural and reliable solution to recognize the individual. Biometric systems that perform the identification of person based on the information obtained from multiple biometric traits are known as multimodal biometric system. Although there has been much research on combining different biometrics for variety of purposes, in this paper it is focused on the combination of fingerprint and iris,which are two of the characteristics that can reach the best recognition performance for high security application and security is provided for the database through visual cryptography and the main application of these multimodal biometric database is for ATM banking. A lot of research has been carried out in the field of authentication and key exchange protocols, which are based on passwords. The Password based user authentication systems are low cost and easy to use but however, the use of passwords has intrinsic weaknesses. The user chosen passwords are inherently weak since most users choose short and easy to remember passwords. In particular, passwords are normally drawn from a relatively small dictionary; thereby prone to Brute-force dictionary attacks, where an attacker enumerates every possible password in the dictionary to determine the actual password. The fusion of fingerprint and iris features for cryptographic key generation is proposed by A.Jagadeesan. The use of multimodal biometrics for key generation provides better security, as it is made difficult for an intruder to spool multiple biometric traits simultaneously Visual cryptography Security of data has been a major issue from many years. Using the age old technique of encryption and decryption has been easy to track for people around. Providing security to data using new technique is the need of the hour. This project uses the technique of Visual cryptography and providing biometric authentication. As computing power becomes more and more fast, our older cryptographic systems becoming less secure because an attacker can attempt larger number of random attack attempts in shorter time. Hence, there is the need for security of biometrics in which information security is one of the most important issues in growing information technology environment. The need for very efficient security systems for preventing confidential information
3 from being accessed by unauthorized persons is achieved through this approach of research. Our approach is presented for iris images and finger print images and it can also applicable to other biometrics such as facial images, using grayscale and natural images such as face, pictures, using more biometric samples into meaningful shares. Visual cryptography [12,13]is a simple and powerful method which can provide high security for confidential information. Concept of visual cryptography is introduced by Moni Naor and Adi Shamir in 1994 during EUROCRYPT 94[13]. The idea is to split a message into n different pieces such that the original message is visible if any k (or more) of them are used together, but totally invisible if fewer than k pieces are used for getting the message. In this method each message is considered as an image of black and white pixels. This image is divided into n slides called transparency. Each pixel of the message appears in each transparency in a different modified version. For getting the original information from transparencies, all of them are stacked together with proper alignment. The simplest example of visual cryptography is a scheme in which we split the image[14] into two different shares. The decryption of the image will be done by overlapping the shares. When we place both the shares one over another with proper alignment, we can interpret the original image. But in this paper we have used same key for the encryption and decryption, if there is any difference in the key the original image cannot be retrieved. Another advantage of this method is that it also increases the randomness in the decrypted image. The pixels in the encrypted image are scattered more randomly then the existing pixel sieve method. III.PROPOSED APPROACH In the proposed work, the multimodal biometric information is used for mutual authentication and key generation. The user authentication for ATM banking is shown in figure 2 below, which includes the iris and finger print for multimodal biometrics and the security is provided using visual cryptography. The use of multimodal biometrics for key generation provides better security, as it is made difficult for an intruder to spool multiple biometric traits simultaneously. In this paper VLSI architecture for the visual cryptography of the multimodal biometric is obtained which is used for ATM banking. An important factor which must be considered for iris recognition system is the effect of noise on its performance. The four kinds of noises that exist in a normalized iris image are eye lids, eyelashes, pupil and reflection noises. In this paper, a complete solution for compensating these types of noises should be implemented to achieve higher accuracy rate by using canny edge detector and Hough transform. Automatic segmentation is achieved through the use of the canny edge detector and Hough transform for localizing the iris and pupil regions. The energycompaction characteristics of DCT _DHT [10,15] are used to capture iris texture variations contained in both horizontal and vertical detail sub bands of second level wavelet decomposition. In order to reduce the size of the database, binary bit stream instead of binary image is stored in the database for matching purpose. The same is repeated for finger print [5]in which segmentation is achieved by sobel edge detection and feature extraction is performed using DCT_DHT. The reduced feature vector size provides faster recognition rate. Biometric systems[6] that perform the identification of person based on the information obtained from multiple biometric traits are known as multimodal biometric system. Although there has been much research on combining different biometrics for variety of purposes. In this paper it is focused on the combination of fingerprint[4,9] and iris, which are two of the characteristics that can reach the best recognition performance for high security application and the security is provided for the database through visual cryptography. The main application of this multimodal biometric database is for ATM banking to increase the security of the system, visual cryptography is done by the process such that the bit stream obtained is first encrypted using the user key obtained from user password and then the encrypted bit pattern template is stored. The use of multimodal biometrics for key generation provides better security, as it is made difficult for an intruder to spool multiple biometric traits simultaneously. Experimental results show that the proposed algorithm provides better matching along with less computational complexity and better security on a thorough experimental investigations based on two types of biometrics (i.e. fingerprint and iris), into the effectiveness of various fusion approaches in both unimodal and multimodal biometrics and the application of relative quality-based score level fusion to reduce the effects of relative degradation in
4 multimodal fusion.. The scope of the investigation includes the use of verification scores obtained from different types of feature extracted from biometric data for ATM banking. their usage. And Table 1, shows the timing summary for the user module. Visual Cryptography Key Encrypted Iris image System Data Base Decrypted Iris Fusion Of IFT & FPFT Yes New Finger Print Pre- Processing Feature Extraction Using DCT+DHT FPFT Matching No New Eye Segmentation Normalization Feature Extraction Using DCT+DHT IFT Figure 3: User Authentication for ATM banking IV. EXPERIMENTAL RESULTS Multimodal biometric systems take input from single or multiple sensors measuring two or more different modalities of biometric characteristics. Larger data base with diversified populations should be used for evaluating the iris recognition algorithms. Most researchers use the publicly available iris database for the experiments, here we have taken CASIA data base[16] and University of Bath database[17].these data bases have limited number of iris images and the images are captured under controlled condition. The inputs of the project are images of iris and finger print of 8x8(8 bit width) matrix for both the images. Then the 8x8 input bit of iris image goes to the canny-edge detector and the output will be 16- bit. The 8x8 input bit of fingerprint goes to the sobel detector and the output will 8-bit. The output canny edge detector and sobel detector will go to the feature extraction process of DCT[10] and the output will be 16 bit for iris image and 8 bit finger print image. The output of the DCT will go to the DHT[10] for further compression of the images and output of IRIS will be 20bit and for the finger print image is 10bit. The output of the both DHT will be go to the fusion process and both the outputs will be combined and output is of 30bit The Output of the fusion will encrypted using visual cryptography process and the output will be stored in the Memory. Table 2, represents the synthesis report of different macro statistics and Figure 5: Simulation results and RTL view of the authentication module. Table 1.Timing Summary Time Minimum period Minimum input arrival time before clock Maximum output required time after clock Maximum combinational path delay Duration 0.946ns 6.116ns 0.562ns No-path found Table 2: Synthesis report Macro Statistics Used Adders/Subtractions 142 Registers 232 Multiplexers 41 Logic shifters 1 Xors 25 These data bases have limited number of iris images and the images are captured under controlled condition. The inputs of the project are images iris and finger print of 8x8 (8 bit width) matrix for both the images. The 8x8 input bit of iris image goes to the canny-edge detector and the output will be 16-bit. The 8x8 input bit of fingerprint goes to the sobel detector and the output will be of 8-bit. The output canny edge detector and sobel detector will go to the feature extraction process of DCT and the output will be
5 16 bit for iris image and 8bit finger print image. The output of the DCT will go to the DHT for further compression of the images and output of Iris will be 20bit and finger print is of 10bit. The output of the both DHT will be go to the fusion process and both the outputs, will be combined and output is of 30bit The output of the memory will be decrypted and compare with the fusion output and gives the result of the matching module. Figure 5 shows the RTL view of the user authentication module and also its simulation results. Table 1 represents the synthesis report of different macro statistics and their usage. And Table 2, shows the timing summary for the user authentication module. V.CONCLUSION In this paper firstly, in designing a multimodal biometric system, we have presented a brief overview and challenges involved by the selection of modalities which strongly depends on the application and level of security[7,8] involved and this will also decides the complexity in designing a system. Secondly, the level of fusion (like sensor, feature, match and decision) plays a crucial role in making a decision. The sensor and feature level fusion preserves a rich set of information and they also result in a high computation, and hence its preferred to increase security. Thus, choosing the level of fusion is a challenging issue and further depends upon type of sources employed, application and the level of security. Thus the main aim in designing a multimodal biometric system is to address the drawbacks in designing a unimodal biometrics based in increasing the security system such as non universality, less sensitive to spoof attacks and noise REFERENCES [1] S.S, Das and J. Debbarma, Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp , [2] W.W.N. Wan, C.L. Luk, and C.W.C. Chow, Customers Adoption of Banking Channels in Hong Kong, International Journal of Bank Marketing, vol. 23, no. 3, pp , [3] Wikipedia the free encyclopedia, Biometrics, Downloaded March 20, 2012 from [4] L. O Gorman, Overview of fingerprint verification technologies, Elsevier Information Security Technical Report, vol. 3, no. 1, [5] G.B. Iwasokun, O.C. Akinyokun, B.K. Alese, and O. Olabode. Fingerprint enhancement: Segmentation to thinning, International Journal of Advanced Computer Science and Applications, vol. 3, no. 1, pp , [6] C. Roberts, Biometrics. Downloaded February 13,2012, ionnotes/2005/biometrics.pdf, [7] C. Michael and E. Imwinkelried, Defence practice tips, a cautionary note about fingerprint analysis and reliance on digital technology, Public Defense Backup Centre Report, 2006 [8] M. J. Palmiotto, Criminal Investigation, Chicago: Nelson Hall, 1994 [9] D. Salter, Fingerprint: An Emerging Technology, Engineering Technology, New Mexico State University, 2006 [10]P.John Paul, P.N.Girija, A High Performance Novel Compression Technique using Hybrid Transform for Multimedia Applications IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.4, April 2011.pp [11]Wildes, R.P, Iris Recogntion: An Emerging Biometric Technology, Proceedings of the IEEE, VOL. 85, NO. 9, September 1997, pp [12]Moni Naor and Adi Shamir. Visual Cryptography, EUROCRYPT 1994, ppl- 12. [13]Shamir, Adi. How to share a secret. Communications of the ACM 22 (II): 1979, [14]P.S.Revenkar, Anisa Anjum, W.Z.Gandhare. Survey of Visual Cryptography Schemes ". International Journal of Securityand Its Applications,Vol. 4, No. 2, April, [15]Peng Chungan, Cao Xixin, Yu Dunshan, Zhang Xing. " A 250 MHz optimized distributed architecture of 2 D 8X8 DCT, 7 th International Conference on ASIC, pp ,oct [16] CASIA Iris Database, [17] University of Bath Iris Database, database.htm,2007.
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
ATM Security Using Fingerprint Biometric Identifer: An Investigative Study
ATM Security Using Fingerprint Biometric Identifer: An Investigative Study Moses Okechukwu Onyesolu Department of Computer Science Nnamdi Azikiwe University, Awka Anambra State, Nigeria. Ignatius Majesty
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach
, pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic
Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic Mr.P.Akilan 1, Mr.K.Gunasekaran 2, M.Tech. Mr.D.Saravanan 3, M.E., (Ph.D), PG Scholar, Dept. of CSE, Pavendar Bharathidasan
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
A STUDY ON AUTHENTICATED ADMITTANCE OF ATM CLIENTS USING BIOMETRICS BASED CRYPTOSYSTEM
A STUDY ON AUTHENTICATED ADMITTANCE OF ATM CLIENTS USING BIOMETRICS BASED CRYPTOSYSTEM M. Subha 1 and S. Vanithaasri 2 1 Assistant Professor & 2 M.phil Research Scholar, Department of Computer Science,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Load Balancing in Fault Tolerant Video Server
Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Very large scale systems
Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
A bachelor of science degree in electrical engineering with a cumulative undergraduate GPA of at least 3.0 on a 4.0 scale
What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF
ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT
216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
