Search results for "biometric authentication."

showing 9 items of 9 documents

A multimodal retina-iris biometric system using the Levenshtein distance for spatial feature comparison

2020

Abstract The recent developments of information technologies, and the consequent need for access to distributed services and resources, require robust and reliable authentication systems. Biometric systems can guarantee high levels of security and multimodal techniques, which combine two or more biometric traits, warranting constraints that are more stringent during the access phases. This work proposes a novel multimodal biometric system based on iris and retina combination in the spatial domain. The proposed solution follows the alignment and recognition approach commonly adopted in computational linguistics and bioinformatics; in particular, features are extracted separately for iris and…

Biometric systemComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONspatial domain biometric featuresbiometric authentication system4603 Computer Vision and Multimedia Computation46 Information and Computing SciencesmedicineIris (anatomy)multimodal systemRetinabusiness.industrymultimodal retina-iris biometric systemLevenshtein distancePattern recognitionbiometric recognition systemQA75.5-76.95Levenshtein distanceretina and iris featuresmedicine.anatomical_structureFeature (computer vision)Electronic computers. Computer scienceSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftware
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

Multi-modal biometric authentication systems

2010

The main goal of a biometric system is to discriminate automatically subjects in a reliable and dependable way, accordingly to a specific target application. The discrimination is based on one or more types of information derived from physical or behavioural traits, such as fingerprint, face, iris, voice, hand, or signature. Applications of biometrics range from homeland security and border control to e-commerce and e-banking, including secure networking and authentication. Traditionally, biometric systems working on a single biometric feature, have many limitations, such as, trouble with data sensors, where captured sensor data are often affected by noise, distinctiveness ability, because …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMulti-modal systems biometric authentication user recognition
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct

Fingerprint and Iris based Authentication in Intercooperative Emerging e-Infrastructures

2013

E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fi…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniUser authenticationAuthenticationBiometricsComputer sciencebusiness.industryFingerprint (computing)Context (language use)Biometric Authentication Systems Unimodal and Multimodal Systems Embedded SensorsSoftwareHuman–computer interactionAuthentication protocolEmbedded systemLightweight Extensible Authentication Protocolbusiness
researchProduct

Fuzzy techniques for access and data management in home automation environments

2012

Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniWireless Sensor Networks Real-time scheduling Biometric Authentication Data Management Fuzzy Techniques
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

Biometric Features for Mobile Agents Ownership

2005

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

biometric authentication systemsmulti-agent systems security.ComputingMilieux_LEGALASPECTSOFCOMPUTINGagent ownershipComputingMethodologies_ARTIFICIALINTELLIGENCE
researchProduct

Smart Wireless Sensor Networks and Biometric Authentication for Real Time Traffic Light Junctions Management

2013

The main challenge of intelligent transportation systems (ITS) is to deal with ‘real-time’ information to improve vehicular traffic management. Road data can be processed and used for dynamic traffic light management in order to reduce waiting times in queues. This paper proposes an innovative distributed architecture based on a wireless sensor network (WSN) with a network coordinator providing remote and ubiquitous authentication module for managing unexpected events. The architecture is completed by a dynamic module for street priority management depending on traffic rate. Many experimental trials have been carried out considering three different levels of traffic intensity to prove the e…

traffic lightAuthenticationbusiness.industryComputer scienceFloating car dataWSNAdvanced Traffic Management SystemTraffic intensitywireless sensor networkintelligent transportation systemembedded sensorTraffic shapingbusinessbiometric authentication.Intelligent transportation systemTraffic generation modelWireless sensor networkInformation SystemsComputer network
researchProduct