scholarly journals Spoofing detection on adaptive authentication System‐A survey

2021 ◽  
Author(s):  
Hind Baaqeel ◽  
Sunday Olatunji
2003 ◽  
Vol 03 (03) ◽  
pp. 425-446
Author(s):  
MARIUS TICO ◽  
PAULI KUOSMANEN

We present the design and implementation of a fingerprint-based remote authentication system. In this system, the fingerprint features captured at a client terminal are transmitted over a communication channel to a central server location where the verification takes place. In order to overcome replay attacks, we propose an original approach to fingerprint matching that relies on different fingerprint features for every execution of the authentication protocol. The paper also introduces an efficient approach for fingerprint image enhancement that constitutes the core of the feature extraction module included in the proposed authentication system. A public domain collection of fingerprint images is used to evaluate the system performance. The experimental results reveal that the proposed system can achieve good matching performance on this data collection and, furthermore, is able to accurately reject replay attacks.


2016 ◽  
Vol 11 (1) ◽  
pp. 8-14 ◽  
Author(s):  
Mustapha Ayoola Ishola

Almost everyone agrees that present day banking systems and payment authorization techniques are far from perfect. This qualitative and conceptual paper attempts to redefine some roles of the central bank in financial systems and economic stability and proposes a new and innovative banking system authorization process. This new process will help to curb most financial irregularities and banking failures by offering central banks a draconian interventionist technique in retail banking that could shape the future structural development of the financial system and the economy and curtail crises. Identity is key to banking. It should, therefore, be of utmost importance that a good banking system be identity based. Hence, one should use a biometric authentication system for access control and operational management by a re-organization of the modus operandi in bank processing systems


2020 ◽  
Vol 8 (5) ◽  
pp. 3676-3680

This present paper aims to extract robust dynamic features used to spoofing detection and countermeasure in ASV system. ASV is a biometric person authentication system. Researchers are aiming to develop spoofing detection and countermeasure techniques to protect this system against different spoofing attacks. For this, replayed attack is considered, because of very common accessibility of recording devices. In replay spoofing, the speech utterances of target (genuine) speakers are recorded and played against ASV system for gaining access unauthorizedly. For this purpose, as a first step, different dynamic features will be extracted for each speech sample. For feature extraction MFCC, LFCC, and MGDCC feature extraction techniques are used. As a second step, a classifier is used to classify whether the given speech sample is genuine or not. As a classifier, GMM and universal background model is used. In this present work, GMM based ASV system and Countermeasure systems using different feature extraction techniques are developed, and the performance of the methods is evaluated using EER and t- DCF. Basing on the performance values, the best feature extraction technique is selected.


Author(s):  
Ambika N.

IoT is an assembly of equipment of different calibers and functionality working towards a single goal. A blockchain is a computerized record that contains the whole history of exchanges made on the system. A multi-WSN arrangement model is structured. The hubs of the IoT are isolated into base stations, group heads, and conventional hubs as per their capacities, which encourage the administration and participation of the hubs. A hybrid blockchain model is proposed. To fit the multi-WSN arrange model better, as indicated by the various capacities and energies of various hubs, neighborhood blockchain and open blockchain are sent between group head hubs and base stations individually, and a crossbreed blockchain model is framed. A shared validation plot for IoT hubs is proposed. For group head hubs, the creators utilize the worldwide blockchain for validation, and for customary hubs, they utilize the nearby blockchain for confirmation. The proposal aims in increasing reliability by 1.17% and minimizes sinkhole attack by 2.42% compared to previous contribution.


2012 ◽  
Vol 479-481 ◽  
pp. 2082-2085 ◽  
Author(s):  
Yuan Wang ◽  
Li Liu ◽  
Qian Song ◽  
Ya Ping Bao

Aiming at low portability and undue dependence on the SSD database of most of authentication system, a fingerprint identification system based on a two-dimensional bar code and DSP was proposed. The central processor TMS320VC5416 was used, and the fingerprint information obtained from PDF417 barcode by the barcode reading device was fuzzy matched with that by online real-time collection. The quick verification of the card holder’s identity was realized.


2020 ◽  
Author(s):  
Manoranjan Paul ◽  
Cameron C White ◽  
Subrata Chakraborty

Abstract Blockchain is a relatively new technology that can be seen as a decentralised database. Blockchain systems heavily rely on cryptographic hash functions to store their data, which makes it difficult to tamper with any data stored in the system. A topic that was researched along with blockchain is image authentication. Image authentication focuses on investigating and maintaining the integrity of images. As a blockchain system can be useful for maintaining data integrity, image authentication has the potential to be enhanced by blockchain. There are many techniques that can be used to authenticate images; the technique investigated by this work is image hashing. Image hashing is a technique used to calculate how similar two different images are. This is done by converting the images into hashes and then comparing them using a distance formula. To investigate the topic, an experiment involving a simulated blockchain was created. The blockchain acted as a database for images. This blockchain was made up of devices which contained their own unique image hashing algorithms. The blockchain was tested by creating modified copies of the images contained in the database, and then submitting them to the blockchain to see if it will return the original image. Through this experiment it was discovered that it is plausible to create an image authentication system using blockchain and image hashing. However, the design proposed by this work requires refinement, as it appears to struggle in some situations. This work shows that blockchain can be a suitable approach for authenticating images, particularly via image hashing. Other observations include that using multiple image hash algorithms at the same time can increase performance in some cases, as well as that each type of test done to the blockchain has its own unique pattern to its data.


2012 ◽  
Vol 6-7 ◽  
pp. 843-847
Author(s):  
Chuan Xie

The application of LAN in enterprises has become wider and wider, it brings efficiency and convenience to management and production, but at the same time, security threat is increasing. This threat is influenced by the factors such as network environment, network management and the level of the staff. Therefore it causes the realization of LAN security strategic planning is not entirely reliable, reflecting mainly in the subjective factors such as network user identity authentication. Through research, on the basis of the application of Single Sign-On technology and introducing the agency identity authentication system, a new security strategy is built up, which can improve the whole LAN security.


Author(s):  
Dai Shi ◽  
Dan Tao ◽  
Jiangtao Wang ◽  
Muyan Yao ◽  
Zhibo Wang ◽  
...  

Pattern lock has been widely used in smartphones as a simple and effective authentication mechanism, which however is shown to be vulnerable to various attacks. In this paper, we design a novel authentication system for more secure pattern unlocking on smartphones. The basic idea is to utilize various behavior information of the user during pattern unlocking as additional authentication fingerprints, so that even if the pattern password is leaked to an attacker, the system remains safe and protected. To accommodate a variety of user contexts by our system, a context-aware module is proposed to distinguish any of such contexts (e.g., body postures when drawing the pattern) and use it to guide the authentication. Moreover, we design a polyline weighted strategy with overlapping based on the consistency of pattern lock, which analyzes the behavior information of the user during the unlock process in a fine-grained manner and takes an overall consideration the results of different polylines. Based on 14,850 samples collected from 77 participants, we have extensively evaluated the proposed system. The results demonstrate that it outperforms state-of-the-art implicit authentication based pattern lock approaches, and that each key module in our system is effective.


Sign in / Sign up

Export Citation Format

Share Document