2013
DOI: 10.7763/ijcee.2013.v5.769
|View full text |Cite
|
Sign up to set email alerts
|

Effective Method of Web Site Authentication Using Finger Print Verification

Abstract: Abstract-Computer network is supported by network security, network security is facing a lot of problem in real world. The proposed authentication security system supports to avoid database hacking and spoof matching process of web-based network. The proposed security system combines the usage of both fingerprint biometrics and pin-number. The fingerprint biometrics includes the modules such as ridge enhancement, feature extraction, core detection and baseline matching. Applied biometric cryptosystem supports … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…This research through the result of its experiment has proven to be faster in processing time compared to the previous schemes. This research performed better in terms of efficiency when compared to the previous schemes by Raja & Perumal [11] and Li, et al [28]. The previous scheme by Raja & Perumal [11] were having high processing time during the random number generator step.…”
Section: Resultsmentioning
confidence: 64%
See 4 more Smart Citations
“…This research through the result of its experiment has proven to be faster in processing time compared to the previous schemes. This research performed better in terms of efficiency when compared to the previous schemes by Raja & Perumal [11] and Li, et al [28]. The previous scheme by Raja & Perumal [11] were having high processing time during the random number generator step.…”
Section: Resultsmentioning
confidence: 64%
“…This research performed better in terms of efficiency when compared to the previous schemes by Raja & Perumal [11] and Li, et al [28]. The previous scheme by Raja & Perumal [11] were having high processing time during the random number generator step. The random number was sent to the mobile user phone which was on a different network which is GSM, which then contributed to higher processing time.…”
Section: Resultsmentioning
confidence: 64%
See 3 more Smart Citations