[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Joshi et al., 2020 - Google Patents

A comprehensive security analysis of match-in-database fingerprint biometric system

Joshi et al., 2020

Document ID
5449782353935811883
Author
Joshi M
Mazumdar B
Dey S
Publication year
Publication venue
Pattern Recognition Letters

External Links

Snippet

The match-in-database fingerprint biometric system has emerged as the most widely used human identification and authentication method in public and private sectors due to its high efficiency, low-cost, and ease of use. This paper provides an exhaustive insight into the …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Joshi et al. A comprehensive security analysis of match-in-database fingerprint biometric system
Jain et al. Biometric authentication: System security and user privacy.
Joshi et al. Security vulnerabilities against fingerprint biometric system
Jain et al. Biometrics: a tool for information security
Uludag et al. Attacks on biometric systems: a case study in fingerprints
US20100174914A1 (en) System and method for traceless biometric identification with user selection
Matyas Jr et al. A biometric standard for information management and security
AU2007264675A1 (en) System and method for traceless biometric identification
Singh et al. A taxonomy of biometric system vulnerabilities and defences
Rajeswari et al. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Maltoni et al. Securing fingerprint systems
Matyáš et al. Security of biometric authentication systems
Uludag Secure biometric systems
Sabena et al. A review of vulnerabilities in identity management using biometrics
Ratha Privacy protection in high security biometrics applications
Sabater Biometrics as password alternative
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
Zibran Biometric authentication: The security issues
Emmanuel et al. Vulnerability of Biometric Authentication System
Sukaitis Building a path towards responsible use of Biometrics
Sondrol Possible Attacks on Match-In-Database Fingerprint Authentication
Jain et al. Security of biometric systems
Yliana et al. Vulnerability of Biometric Protection
Habibu Development of secured algorithm to enhance the privacy and security template of biometric technology
Omotosho An Efficient Biometric Template Transformation Protection Technique Using Residue Number System