Secured network authentication using biometrics application

M. H. Laili, Md Zaini Jamaludin, Norashidah Md Din, N. H.M. Said

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.

Original languageEnglish
Title of host publication2002 Student Conference on Research and Development
Subtitle of host publicationGlobalizing Research and Development in Electrical and Electronics Engineering, SCOReD 2002 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages368-370
Number of pages3
ISBN (Electronic)0780375653, 9780780375659
DOIs
Publication statusPublished - 01 Jan 2002
EventStudent Conference on Research and Development, SCOReD 2002 - Shah Alam, Malaysia
Duration: 16 Jul 200217 Jul 2002

Other

OtherStudent Conference on Research and Development, SCOReD 2002
CountryMalaysia
CityShah Alam
Period16/07/0217/07/02

All Science Journal Classification (ASJC) codes

  • Biomedical Engineering
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Education

Fingerprint Dive into the research topics of 'Secured network authentication using biometrics application'. Together they form a unique fingerprint.

  • Cite this

    Laili, M. H., Jamaludin, M. Z., Md Din, N., & Said, N. H. M. (2002). Secured network authentication using biometrics application. In 2002 Student Conference on Research and Development: Globalizing Research and Development in Electrical and Electronics Engineering, SCOReD 2002 - Proceedings (pp. 368-370). [1033134] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SCORED.2002.1033134