Results 1 to 10 of about 35,630 (203)

A novel privacy-preserving biometric authentication scheme [PDF]

open access: yesPLoS ONE, 2023
Most existing secure biometric authentication schemes are server-centric, and users must fully trust the server to store, process, and manage their biometric data.
Xuechun Mao   +3 more
doaj   +3 more sources

Securing biometric authentication system using blockchain

open access: yesICT Express, 2021
Biometric authentication systems have major security weaknesses: risk of biometric information leakage, unreliability of authentication modules, and non-transparency of biometric information management.
Youn Kyu Lee, Jongwook Jeong
doaj   +3 more sources

ToMAS: Torus-based secure multi-factor biometric authentication system [PDF]

open access: yesComputational and Structural Biotechnology Journal
Biometric authentication has emerged as a convenient method for identity verification, but its widespread adoption raises serious privacy concerns. In this paper, we propose a Torus-based secure Multi-factor biometric Authentication System (ToMAS) that ...
Mi Yeon Hong   +3 more
doaj   +2 more sources

Using biometric data to protect information

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the
K. N. Vlasov   +2 more
doaj   +1 more source

BioShare: An Open Framework for Trusted Biometric Authentication under User Control

open access: yesApplied Sciences, 2022
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode.
Quan Sun, Jie Wu, Wenhai Yu
doaj   +1 more source

Method of Two-Factor Authentication of Electronic Documents Using Enhanced Encrypted Non-Certified Digital Signature with the Use of Security Token with Biometric Data [PDF]

open access: yesTelfor Journal, 2023
The purpose of this study is to develop a method for two-factor authentication of electronic documents using an enhanced encrypted non-certified digital signature with the use of a security token with biometric data (fingerprint image).
T. A. Burganova   +2 more
doaj   +1 more source

Biometric Authentication [PDF]

open access: yes2014 4th International Conference on Image Processing Theory, Tools and Applications (IPTA), 2014
User authentication is the keystone of information security. Even the most craftily built and diligently monitored computer system will crumble if there is a flaw in its user authentication system(Minaev, 2010). A hacker able to exploit such a flaw will be able to convince the computer system that he is a legitimate user – possibly even a specific ...
  +4 more sources

Factors influencing smartphone owners' acceptance of Biometric Authentication methods

open access: yesIlkom Jurnal Ilmiah, 2022
Smartphones are the world's most widely used personal computing devices. PINs and passcodes have long been the most popular authentication methods in smartphones and even in the pre-smartphone era.
La Ode Abdul Wahid, Ahmad R Pratama
doaj   +1 more source

Bilateral Ear Acoustic Authentication: A Biometric Authentication System Using Both Ears and a Special Earphone

open access: yesApplied Sciences, 2022
In existing biometric authentication methods, the user must perform an authentication operation such as placing a finger in a scanner or facing a camera.
Masaki Yasuhara, Isao Nambu, Shohei Yano
doaj   +1 more source

Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC

open access: yesIEEE Access, 2021
Biometric authentication is getting increasingly popular and demands a wide range of solutions to against increasing cybercrimes and digital identity thefts.
Lei Wu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy