7th International Conference on Broadband Communications and Biomedical Applications 2011
DOI: 10.1109/ib2com.2011.6217932
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of multimodal digital identity management system using fingerprint matching and face recognition

Abstract: In moving towards ubiquitous online services and hybrid network environment, a highly complex identity management environment is emerging due to the diversity of protocols, networks and devices as well as user requirements. The combination of distributed attributes and identities are often not associated across identity management systems and carries different amount of security data. This causes difficulties due to multiple identities and raises the need for an efficient design of an identity management syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…The objective of information security is to ensure data confidentiality, integrity and availability at any given point including during data entry, processing, storage and transmission (Kabuya et al, 2012). This process cannot be overlooked due to the fact that technology has become a critical component of business operations in every organization (Agbinya et al, 2011;Mwanza and Phiri, 2016). Today Zambia's public organizations are reliant on technological infrastructure for handling, processing and transmission of all the business data and its related activities (Hunker and Probst, 2010;Chinyemba and Phiri, 2018a).…”
Section: Introductionmentioning
confidence: 99%
“…The objective of information security is to ensure data confidentiality, integrity and availability at any given point including during data entry, processing, storage and transmission (Kabuya et al, 2012). This process cannot be overlooked due to the fact that technology has become a critical component of business operations in every organization (Agbinya et al, 2011;Mwanza and Phiri, 2016). Today Zambia's public organizations are reliant on technological infrastructure for handling, processing and transmission of all the business data and its related activities (Hunker and Probst, 2010;Chinyemba and Phiri, 2018a).…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of information and communication networks by governments, colleges, enterprises and individuals means that they are employing more and more information systems without clear distinctions of the persons and devices behind their use [1]. It is obvious that the need for identity that would provide complete privacy is vital [1]. It has been established that cybercrime has become one of the fastest growing crimes in the world [2].…”
Section: A Adverse Effects Of Internetmentioning
confidence: 99%
“…Johnson I Agbinya et. al attempted definition of digital identity with multimodal biometrics involving face and fingerprint traits along with other user attributes in digital IMS [11].…”
Section: Related Workmentioning
confidence: 99%