SECURE USER AUTHENTICATION USING AUTOMATED BIOMETRICS
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP
**

Posts: 604
Joined: Dec 2008
#1
29-01-2009, 11:47 PM


Authentication and security have been major issues right from the beginning of the computer age. One of the emerging and efficient keys to security problem is Biometrics-a technology that strives towards identifying the identity of a living person based on biological characteristics. Biometrics possesses many advantages over conventional user authentication processes. Because a biometric is an intrinsic property of some individual they are difficult to duplicate and impossible to share. Examples of automated biometrics include fingerprints, faces, iris and speech. Even though biometric based system is more reliable and secure than conventional authentication methods, it is still possible to hack into a biometric system. There are 8 possible weak links in a generic biometric system. This paper highlights the attacks points on a fingerprint based biometric system and suggestions to alleviate them. Resubmitting of old digitally stored biometrics signals is one of the weakest links. Two techniques are proposed. One method involves hiding messages in the image and works in conjunction with the image compression method (WSQ). Other method involves checking the liveliness of the signal acquired from an intelligent sensor using a challenge/response strategy. Two key issues associated with a biometric system are privacy concern and re-issuance of identity tokens. A new technique has been proposed called cancelable biometrics in which the biometric signals are distorted using well defined transformations. The techniques proposed enhance the security of a biometric system.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Image Authentication Techniques computer science crazy 4 4,305 23-08-2013, 09:29 AM
Last Post: study tips
  FAULT TOLERANT NANO-MEMORY WITH FAULT SECURE ENCODER AND DECODER seminar tips 2 717 08-03-2013, 12:12 PM
Last Post: study tips
  Automated Distribution System ppt seminar tips 0 369 07-02-2013, 02:34 PM
Last Post: seminar tips
  MPLAB C30 C COMPILER USER’S GUIDE project girl 0 385 26-12-2012, 02:37 PM
Last Post: project girl
  Biological Neural Networks (BNNs) Toolbox for MATLAB: User Guide PPT project girl 0 433 01-12-2012, 05:38 PM
Last Post: project girl
  A SEAMLESS AUTOMATED MANUAL TRANSMISSION seminar tips 0 313 16-10-2012, 02:59 PM
Last Post: seminar tips
  Automated Distribution System computer science crazy 13 10,337 20-08-2012, 02:45 PM
Last Post: Guest
  e-Fraud Prevention based on the Self-Authentication of e-Documents seminar flower 0 654 01-06-2012, 12:31 PM
Last Post: seminar flower
  Secure Communications Over Wireless Broadcast Networks seminar flower 0 861 26-05-2012, 11:17 AM
Last Post: seminar flower
  SECURE STEGANOGRAPHY seminar ideas 0 402 10-05-2012, 02:01 PM
Last Post: seminar ideas