谷歌浏览器插件
订阅小程序
在清言上使用

A biometrics-based secure architecture for mobile computing

mag(2012)

引用 4|浏览13
暂无评分
摘要
Mobile computing devices such as smartphones, tablets and wireless enabled laptops are getting widely popular and being frequently used to access information in secure networks through third party providers. With the increasing number of intrusion, device and identity theft incidents, improved security measures are becoming essential for accessing devices as well as various mobile applications. In this paper, a novel security architecture has been proposed for mobile computing platform which utilizes biometric signatures to authenticate users against large databases. Identifying correct biometric credentials in mobile devices can be a challenging task as there are no biometric input devices available with these systems. The task of scanning biometric signatures can be performed via device camera and microphone. The primary challenge is to precisely collect the biometric signatures and minimize the effects of noise, intra class variations, surrounding environment and high error rate when comparing against millions of similar signatures. A multimodal verification scheme applying face, hand geometry, fingerprint and other biometric signatures which can be scanned through mobile devices will increase the reliability of the system. The next challenge this architecture will address is the size of biometric signature and verification data that is sent for comparison. A fusion of multiple signatures can be performed by applying segmented data in order to increase the verification speed while maintaining high accuracy. Fusion also protects against spoofing where criminals and predatory users submit false or modified biometric information for verification. As multiple signatures are weighted and compared, false or unmatched signatures can be easily identified and addressed accordingly. In order to protect the information during data transfer and future storage, encryption and other security enhancement techniques are proposed to be integrated. The proposed architecture is ex- ected to provide secure access to only legitimate users of a system within a short period of time and prohibit intruders from gaining any access.
更多
查看译文
关键词
security architecture,face,authentication,error rate,information security,computer architecture,biometrics,fingerprint,hand geometry,encryption,mobile computing,mobile computer,identity theft,mobile device,cryptography,information protection,databases,input device,network security,intrusion,data transfer,digital signatures
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要