Analysis of Authentication Method
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 7)Publication Date: 2016-07-05
Authors : Shilpa S. Nagargoje; Sarika B. Solanke;
Page : 2144-2147
Keywords : BioCapsule BC; Reference Subject RS; Iris Recognition; Cancelable Biometric CB; Biometric Cryptosystem BCS; Cross Matching Resistance CMR;
Abstract
The iris authentication method gives the more security privacy preserving and cross matching resistance are the properties that iris biometric security system must implement during authentication. There are two categories of biometric identifiers namely physiological and behavioral characteristics. A large portion of system breaches proxy based or biometrics based are caused by authentication method. In this, I survey a biometrics based user centric authentication approach. This method involves introducing a reference subject (RS), securely fusing the user iris biometrics with the RS, generating a BioCapsule (BC) from the fused biometrics, and employing BC for authentication. Such as approach is user friendly, privacy-preserving and revocable once a BC is compromised. The fusion process applies to different stages of biometric processing such as signal, feature or template level. The fusion based BC construction is more usable and flexible, while also secure, resilient to different attacks, and tolerant to the closure of both the RS and BC. It also supports oneclick sign-on across system by fusing the users biometrics with a distinct RS on each system.
Other Latest Articles
- Duplication Removal and Auditing Check Over Cloud
- Outcome of Thompson's Quadricepsplasty for Extension Contracture of Knee
- Origanum majorana Essential Oil Reduces VAS Score and Modulates Cerebral Activity during 10 NeurOptimal? Sessions in Patients
- Clinical Decision Support System Using SVM with the Preservation of Privacy
- Temporal Analysis of Forest Cover Change: East Khasi Hills Meghalaya, India: Using Remote Sensing and GIS
Last modified: 2021-07-01 14:40:32