دانلود و نمایش مقالات مرتبط با authentication::صفحه 6
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - authentication

تعداد مقالات یافته شده: 209
ردیف عنوان نوع
51 A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print
یک سیستم چند سنجی مبتنی بر ادغام اثر انگشت ، ورید انگشت و چاپ انگشتان دست-2021
Authentication systems play an essential role in our lives today. Human biological, behavioral, and morpho- logical characteristics are usually used in an authentication system in a vast scope of applications ranging from unlocking consumer devices to surveillance and forensic analysis and offered an alternative to credit cards, ID cards, passports, driving licenses, etc. Unibiometric systems, which use a single biometric modality, suffer from some drawbacks such as low protection of user’s privacy against attacks. Multibiometric systems, which fusefeatures of biometric characteristics, can cope with unibiometric systems’ drawbacks and improve security andrecognition accuracy. However, some main questions such as ‘what is the optimal number of biometric mo- dalities?’, ‘how much accuracy do we need for our system?’, and ‘how much money do we want to invest for our system?’ have to be considered and answered before designing and implementing a multibiometric system. Unfortunately, the existing multibiometric systems have not considered and responded to all questions. Furthermore, identification mode for multibiometric systems is a challenging task and almost all of them have focused on verification mode. In this paper, we only consider a finger and employ the maximum possible mo-dalities of the finger, i.e., fingerprint, finger-vein, and finger-knuckle-print, to increase user-friendliness and reducing the cost of implementation of the system. The proposed system only uses three cameras to capture all contactless fingerprint, finger-vein, and finger-knuckle images. Also, we propose an algorithm that makes enable the system to work in identification mode. The experiments on established databases exhibit that our proposed algorithm significantly increases recognition accuracy.
Keywords: Fingerprint | Finger-vein | Finger-knuckle-print | Multibiometrics | Information fusion
مقاله انگلیسی
52 Towards a self-sufficient face verification system
به سمت یک سیستم تأیید چهره خودکفا-2021
The absence of a previous collaborative manual enrolment represents a significant handicap towards designing a face verification system for face re-identification purposes. In this scenario, the system must learn the target identity incrementally, using data from the video stream during the operational authentication phase. So, manual labelling cannot be assumed apart from the first few frames. On the other hand, even the most advanced methods trained on large-scale and unconstrained datasets suffer performance degradation when no adaptation to specific contexts is performed. This work proposes an adaptive face verification system, for the continuous re- identification of target identity, within the framework of incremental unsupervised learning. Our Dynamic Ensemble of SVM is capable of incorporating non-labelled information to improve the performance of any model, even when its initial performance is modest. The proposal uses the self-training approach and is compared against other classification techniques within this same approach. Results show promising behaviour in terms of both knowledge acquisition and impostor robustness.
Keywords: Adaptive biometrics | Video surveillance | Video-to-video face verification | Unsupervised learning | Incremental learning
مقاله انگلیسی
53 Biometric keystroke barcoding: A next-gen authentication framework
بارکد ضربه زدن به کلید بیومتریک: یک چارچوب احراز هویت نسل بعدی-2021
Investigation of new intelligent solutions for user identification and authentication is and will be essential for enhancing the security of the alphanumeric passwords entered on touchscreen and traditional keyboards. Extraction of the keystrokes has been very beneficial given the intelligent authentication protocols operating in time-domain; while the time-domain solutions drastically lose their efficiency over time due to converging inter- key times. Realistically reflecting the habitual traits, the frequency-domain solutions, however, reveal unique biometric characteristics better, without any risk of convergence. On the contrary, the existing frequency-based frameworks don’t provide storable biometric data for further classification of the attempts. Therefore, we pro-pose a novel barcoding framework converting habitual biometric information into storable barcodes as very low- size barcode images. The key-press times are extracted and turned into pseudo-signals exhibiting binary-train characteristics for continuous wavelet transformation (CWT). The transformed signals are primarily catego- rized with 4-scale scalograms by various complex frequency B-spline wavelets and subsequently superposed to create the unique barcodes. One-class support vector machines (SVM) is employed as the main classifier for training and testing the barcodes and very promising results are achieved given the lowest equal error rate (EER) of 1.83%.
Keywords: Keystroke authentication | Biometrics | Complex wavelets | Scalogram | Barcode | CWT | SVM
مقاله انگلیسی
54 Trust issues? The need to secure contactless biometric payment cards
مسائل اعتماد؟ نیاز به ایمن سازی کارت های پرداخت بیومتریک بدون تماس-2021
Fingerprint authentication is a mature and trusted technology, refined through a decade of mass adoption across the mobile world. With biometrics now in over 80% of smartphones, it is also a preferred technology that has rapidly overtaken PIN authentication as the means to secure access to devices, make payments and secure applications.
مقاله انگلیسی
55 Face recognition: fighting the fakes
Face recognition: fighting the fakes-2021
Facial biometrics have become increasingly popular authentication tools for three main reasons. First, the user experience is familiar. Onboarding is easy – basically like taking a selfie – and since cameras are already on mobile devices, they’re ubiquitously accessible. Second, they remove much, if not all of the friction that users encounter trying to remember passwords. Third, the technology works – and it’s getting better every year.
مقاله انگلیسی
56 Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey
پیشرفت های اخیر در احراز هویت کاربر مبتنی بر بیومتریک برای دستگاه های پوشیدنی: یک مرور معاصر-2021
In recent years, wearable technology is interwoven with our everyday lives because of its commoditization and comfort. Security and privacy become a big concern as many user-sensitive data have been stored in such devices, such as personal emails and bank accounts. Traditional user authentication techniques like PIN entry are unfriendly and vulnerable to shoulder surfing attacks. To address these problems, a number of new authentication methods have been proposed. In this survey, we review and categorize recent advances in user authentication for wearable devices. We classify existing studies into physiological biometrics based and behavioral biometrics based methods. For each category, we review how signal processing techniques have been used to extract features in various wearable devices. Leveraging these extracted features, specifically designed classification methods can be used to realize user authentication. Finally, we review evaluation metrics for user authentication in wearable devices. Overall, in this survey, we systematically study assorted state-of-the-art user authentication methods for wearable devices, aiming to provide guidance and directions for future research in this area.
Keywords: Wearable devices | User authentication | Signal processing | Machine learning
مقاله انگلیسی
57 Attacks and defenses in user authentication systems: A survey
حملات و دفاع در سیستم های احراز هویت کاربر: مرور-2021
User authentication systems (in short authentication systems) have wide utilization in our daily life. Unfortunately, existing authentication systems are prone to various attacks while both system security and usability are expected to be satisfied. But the current research still lacks a thorough survey on various types of attacks and corresponding countermeasures regarding user authentication, including traditional password-based and emerging biometric-based systems. In this paper, we make a comprehensive review on attacks and defenses of the authentication systems. We firstly introduce a number of common attacks by classifying them into different categories based on attacker knowledge, attack target, attack form and attack strength. Then, we propose a set of evaluation criteria for evaluating different kinds of attack defense mechanisms. Furthermore, we review and evaluate the existing methods of detecting and resisting attacks in the authentication systems by employing the proposed evaluation criteria as a common measure. Specifically, we focus on comparing and analyzing the performance of different defense mechanisms in different types of authentication systems. Through serious re- view and analysis, we put forward a number of open issues and propose some promising future research directions, hoping to inspire further research in this field.
Index Terms: Authentication system | Attack detection | Defense mechanisms | Spoofing attack | Liveness detection | CAPTCHA | Biometric authentication | Machine learning | Deep neural networks
مقاله انگلیسی
58 Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
احراز هویت پیوسته دستگاه تلفن همراه مبتنی بر لمس: آخرین فن آوری ، چالش ها و فرصت ها-2021
The advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs. The increasing usage of this device has led to the need for a secure and efficient authentication mechanism. For securing mobile devices, password, PIN, and swipe patterns are commonly used for user authentication. Entry-point face and fingerprint recognition have also gained traction in the past years. However, these authentication schemes cannot authenticate a user after the initial-login session. This limitation might put the device exposed to information theft and leakage if an illegitimate user could bypass the initial-login session. Therefore, a mobile device needs a continuous authentication mechanism that can protect a user throughout the entire working session, which complements the initial-login authentication to provide more comprehensive security protection. Touch biometric is a behavioural biometric that represents the touch behaviour pattern of a user when interacting with the touchscreen of the device. Touch biometric has been proposed as a continuous authentication mechanism, where the device can collect touch biometric data transparently while a user is using the device. However, there are still plenty of challenges and obstacles in touch-based continuous mobile device authentication due to its challenges as a biometric modality. This paper provides a comprehensive overview of fundamental principles that underpin touch-based continuous mobile device authentication. Our work discusses state-of- the-art methods in touch data acquisition, behavioural feature extraction, user classification, and evaluation methods. This paper also discusses some challenges and opportunities in the current touch-based continuous mobile device authentication domain to obtain a broad research community and market acceptance.
Keywords: Biometrics | Mobile device security | Continuous authentication | Touch biometric
مقاله انگلیسی
59 Iris based cancelable biometric cryptosystem for secure healthcare smart card
رمزنگاری بیومتریک بیومتریک قابل لغو برای کارت هوشمند مراقبت های بهداشتی-2021
Health related information of an individual is very sensitive and demands a high level of security and pri- vacy. Healthcare providers have the responsibility to ensure that patient information is secure and acces- sible only to authorized users. Healthcare systems are using biometrics since long for authentication and/ or access control purposes. Biometrics can also be used for healthcare data security and privacy. This paper proposes an iris based cancelable biometric cryptosystem to securely store the healthcare data of patients on the smart card. It employs symmetric key cryptography to encrypt the healthcare data and store it on the smart card in encrypted form. We use the fuzzy commitment scheme to bind the secret encryption key with the cancelable iris template of the patient. Our proposed scheme provides user authentication as well as the decryption of healthcare data when needed by using the iris template of the owner of the healthcare smart card. The implementation results show that our proposed scheme provides better performance as compared to other schemes. It can generate an encryption key of a maximum of 252 bits from the input iris template with a false acceptance rate (FAR) of 0 and a false rejection rate (FRR) of 0.07. The generated key can be used for encrypting the health care data of patients using a sym- metric encryption algorithm, e.g. Advance Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, etc. As compared to a conventional encryption system where the security of the system depends on keeping the key secret, our proposed scheme binds the encryption key with the iris - template of the patient impeccably without the need to store it securely. The security analysis demonstrates that it is not possible for an attacker to retrieve the secret key or healthcare data of the patient from the stolen healthcare card.© 2021 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Artificial Intelli- gence, Cairo University. This is an open access article under the CC BY-NC-ND license (http://creative-commons.org/licenses/by-nc-nd/4.0/).
Keywords: Biometric cryptosystem | Authentication | Key binding | Healthcare | Cancelable biometric
مقاله انگلیسی
60 Retrieval performance analysis of multibiometric database using optimized multidimensional spectral hashing based indexing
تجزیه و تحلیل عملکرد بازیابی پایگاه داده چند سنجی با استفاده از نمایه سازی بهینه سازی طیفی چند بعدی بهینه سازی شده-2021
Demand for efficient retrieval of data from biometric databases is increasing due to its widespread authentication applications that range from e-passport to attendance system. Major research contribution in this area is by using tree based indexing methods and data independent random hashing methods. In this work, the data dependent hashing technique using optimized multidimensional spectral hashing that uses hash table lookup is employed. Palmprint, Iris and Face biometric features are generated using GIST, optimized features are fused based on bio-inspired cuckoo search algorithm and then converted into binary hash code. The compact binary codes representing the fused features form the multibiometric database on which the retrieval performance is analyzed. Simulation results obtained indicate that the hit rate and penetration rate have improved considerably for the desired recognition accuracy.© 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Biometrics | Retrieval | Cuckoo search | Fusion | Hashing
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 8811 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 8811 :::::::: افراد آنلاین: 84