A login strategy using fingerprint verification

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 7
Year of Publication : 2015
Authors : Huiyi Han, Zhiyi Qu, Weiwei Kang

pdf
Citation:
MLA Style:

Huiyi Han, Zhiyi Qu, Weiwei Kang, "A login strategy using fingerprint verification" SSRG International Journal of Computer Science and Engineering 2.7 (2015): 35-39.

APA Style:

Huiyi Han, Zhiyi Qu, Weiwei Kang, (2015). A login strategy using fingerprint verification. SSRG International Journal of Computer Science and Engineering 2.7, 35-39.

Abstract:

So far, majority of applications and websites mainly use traditional login method based on username and password. These identity authentication systems acquire two steps that users must execute. Firstly, users must complete registration. Secondly, they must enter correct username and password to login, only these two steps will spend seven or eight minutes. Moreover, the account can be forgotten, lost and stolen. So this paper proposes a technique which based on fingerprint verification. When logged in, people only need to brush fingerprint to verify identity. This kind of login method is simple and quick, safe and reliable

References:

[1] Jain A K, Hong L, Pankanti S.Biometrics Identification, Comm.ACM,2000,2,91-98. 
[2] Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol, Version 3.0.INTERNET- DRAFT (November 1996), http://draft-freier-ssl-version3-02.txt
[3] Boneh, D., Gentry, C., Hamburg, M.: Space Efficient Identity Based Encryption without Pairings. In: Proceedings of FOCS 2007, pp. 647–657 (2007) 
[4] Boneh, D.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455–470. Springer, Heidelberg (2008) 
[5] Boyen, X.: General Ad Hoc Encryption from Exponent Inversion IBE. In: Naor, M. (ed.) 
[6] F. Galton, Finger Prints, Macmillan, London, UK, 1892. 
[7] A.Farina,Z.M. Kovács-Vajna and A. Leone, “Fingerprint Minutiae Extraction from Skeletonized Binary Images,” Pattern Recognition, Vol. 32, No. 5, pp. 877-889, 1999. 
[8] A. K. Jain, S. Prabhakar, L. Hong and S. Pankanti , “Filterbank-Based Fingerprint Matching,” IEEE Transactions on Image Processing, Vol. 9, No. 5, pp. 846-859, 2000. Fig 3. system deployment diagram

Key Words:

System login, account security, fingerprint verification.