Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2
Abstract
Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication by using a set of biological characteristics. In this paper, I aim to survey the security risks and defects in identity verification systems that are based on biometrics, and try to suggest risk management solutions in order to increase the security factor whenever using such systems.
Authors and Affiliations
Dr. Mozamel M. Saeed, Dr. Abdulwahid A. Fadul, Mesfer A. Al Duhayyim
The Fuzzy Control for Rotor Flux Orientation of the double-fed asynchronous generator Drive
In This paper we present a new contribution of fuzzy logic for electrical machine control. We are interested to the control direction of the rotor flux applied to Doubly-Fed Induction Generators (DFIG)At first, the princ...
Cloud Computing Environment: A Review
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is...
RANKING of the E-TRUST FACTORS in ELECTRONIC TRANSACTIONS in the CONTEXT of B2C E-COMMERCE (from the consumers point of view and by using Friedmans ranking method)
Today, a considerable amount of commercial transactions have appertained to the electronic transactions and electronic markets, aside from or versus the traditional markets, have attracted and collected a large number of...
HMotion: An Algorithm for Human Motion Detection
Computer memory is expensive and the recording of data captured by a webcam needs memory. In order to minimize the memory usage in recording data from human motion as recorded from the webcam, this algorithm will use mot...
A Review of Digital Signature Using Different Elliptic Cryptography Technique
Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital sig...