Research on the Network Security and Identity Authentication Technology

2014 ◽  
Vol 926-930 ◽  
pp. 2819-2822
Author(s):  
Yi Hui He

Network security and identity authentication is confirmed the true identity whether the user and the claimed identity is consistent or not, in order to prevent the illegal user access the system for resources by identity fraud. The one-time password authentication technology with high safety, convenient for using, easy for management and lower cost is applied widely and has bright prospection. The one-time password authentication technology support to add uncertain factors in the login process, so that the login authentication informations are not the same each time. It is useful to improve the security of the login process. In this paper, a new system which is based on the the one-time password authentication technology called biometric system is first introduced. Then the framework of multi-biometric system is presented, and several examples are also shown. The prospect about multi-biometric fusion is also given.

Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Xinman Zhang ◽  
Kunlei Jing ◽  
Guokun Song

The security problems of online transactions by smartphones reveal extreme demand for reliable identity authentication systems. With a lower risk of forgery, richer texture, and more comfortable acquisition mode, compared with face, fingerprint, and iris, palmprint is rarely adopted for identity authentication. In this paper, we develop an effective and full-function palmprint authentication system regarding the application on an Android smartphone, which bridges the algorithmic study and application of palmprint authentication. In more detail, an overall system framework is designed with complete functions, including palmprint acquisition, key points location, ROI segmentation, feature extraction, and feature coding. Basically, we develop a palmprint authentication system having user-friendly interfaces and good compatibility with the Android smartphone. Particularly, on the one hand, to guarantee the effectiveness and efficiency of the system, we exploit the practical Log-Gabor filter for feature extraction and discuss the impact of filtering direction, downsampling ratio, and discriminative feature coding to propose an improved algorithm. On the other hand, after exploring the hardware components of the smartphone and the technical development of the Android system, we provide an open technology to extend the biometric methods to real-world applications. On the public PolyU databases, simulation results suggest that the improved algorithm outperforms the original one with a promising accuracy of 100% and a good speed of 0.041 seconds. In real-world authentication, the developed system achieves an accuracy of 98.40% and a speed of 0.051 seconds. All the results verify the accuracy and timeliness of the developed system.


Author(s):  
Maitreya Maity ◽  
Dhiraj Manohar Dhane ◽  
Tushar Mungle ◽  
Rupak Chakraborty ◽  
Vasant Deokamble ◽  
...  

2013 ◽  
Vol 5 (2) ◽  
pp. 45-49
Author(s):  
Suha Hameed ◽  
Zahraa Muhsen ◽  
Salwa Alsamarai

2020 ◽  
Vol 7 (2) ◽  
pp. 22-37
Author(s):  
Adewale Olumide Sunday ◽  
Boyinbode Olutayo ◽  
Salako E. Adekunle

The detection of a false individual who had not been enrolled as a genuine participant in an election could be potentially detected in electronic voting systems as against paper-based methods. In recent time, one-time password and biometrics have been used to curtail false acceptance of imposters. However, imposters had unlawfully stolen the credentials of genuine individuals, gained unauthorized access, and polled illegitimate votes due to poor authentication methodology. The accuracy of a multi-biometric system is a function of the data type used and fusion method adopted. This paper presented a computational fusion approach that involved the use of fingerprint and randomly generated voter identification number to effectively satisfy the authentication security requirement of the electronic voting system. New architectural and mathematical equations on the proposed approach were presented to tackle the problem of false acceptance rate and improve on the true acceptance rate of a biometric system. Algorithm to achieve the proposed approach was presented in this paper as well.


Sign in / Sign up

Export Citation Format

Share Document