We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

BSC: A Novel Scheme for Providing Security using Biometric Smart Card

by S. Mahaboob Hussain, A. S. N. Chakravarthy, G. S. Sarma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 1
Year of Publication: 2013
Authors: S. Mahaboob Hussain, A. S. N. Chakravarthy, G. S. Sarma
10.5120/13829-1659

S. Mahaboob Hussain, A. S. N. Chakravarthy, G. S. Sarma . BSC: A Novel Scheme for Providing Security using Biometric Smart Card. International Journal of Computer Applications. 80, 1 ( October 2013), 43-51. DOI=10.5120/13829-1659

@article{ 10.5120/13829-1659,
author = { S. Mahaboob Hussain, A. S. N. Chakravarthy, G. S. Sarma },
title = { BSC: A Novel Scheme for Providing Security using Biometric Smart Card },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 1 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number1/13829-1659/ },
doi = { 10.5120/13829-1659 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:27.725170+05:30
%A S. Mahaboob Hussain
%A A. S. N. Chakravarthy
%A G. S. Sarma
%T BSC: A Novel Scheme for Providing Security using Biometric Smart Card
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 1
%P 43-51
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Technology advances day by day and the new things are being developed. There are many new technologies being introduced and developed in any discipline. Data Security plays a vital role and Biometric security systems is one of the new trends to be developed, which has its advantages for controlling access, protecting sensitive data, tracking on-line systems, etc. ,. Biometric technologies such as fingerprint, face and iris recognition have seen an increasing interest throughout the past decades to increase the security, convenience, accountability. Such interest has been intensified with various large-scale initiatives from governments that seek to incorporate biometric technologies for the purposes of identification, verification and for fraud detection and deterrence. Being purely ad hoc technological implementations, biometric devices are now seen as being of strategic value and consequently of strategic importance. With the perception of better efficiency and effectiveness, governments are beginning to embrace biometric technologies. Industry is also geared up to sell the products, and all over the world businesses are looking to incorporate biometrics for many different uses ranging from access-control to e-commerce and entertainment. Biometrics and smart cards are two of the most powerful security solutions available today. This paper introduces a new mechanism to provide better security and services with Biometric Smart Card technology including hybrid biometric security, i. e. , with the combination of security for fingerprint pattern and for the smart card.

References
  1. K. Jain, K. Nandakumar, and A. Nagar. "Biometric template security". EUR-ASIP, vol. 8, no. 2, pp. 1–17, 2008.
  2. Jain, A. K. , Ross, A. , Pankanti, S. , Biometrics: a tool for information security. IEEE Trans. on Information Forensics and Security 1, 125–143, 2006.
  3. FIDIS (2005). D3. 2: A study on PKI and Biometrics. M. Gasson, M. Meints and K. Warwick: 1-138. BiometricFAQ, "http://www. biometrics. gov/Documents/FAQ. pdf"?
  4. Samir Nanvati. (2002), Biometrics: Identity Verification in a Networked World, New York: Wiley and Sons, Inc.
  5. Wayne Penny, (2002), Biometrics, A Double-Edged Sword,http://www. sans. org/rr/paper. php?id=137.
  6. Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The Comparison and Identification". 84th Annual Training Conference of the California State Division of IAI. Retrieved 30 August 2010.
  7. Langenburg, Glenn (January 24, 2005). "Are one's fingerprints similar to those of his or her parents in any discernable way?". Scientific American. Retrieved 28 August 2010.
  8. Fingerprints, palms and soles, Cummins, H. , 1943, http://www. dse. nl/~frvc/handresearch/derm. htm.
  9. Hueske, Edward. Firearms and Fingerprints. Facts on File/Infobase Publishing, New York. 2009. ISBN 13: 978-0-8160-5512-8.
  10. Engert, Gerald J. (1964). "International Corner". Identification News 14 (1).
  11. Some of the above wording is credited to the writing of Greg Moore, from his previous fingerprint history page at http://www. brawleyonline. com/consult/history. htm (no longer there). Also, David L. von Minden, Ph. D helped correct typos his students kept cutting and pasting into their homework.
  12. Interpol, "General Position on Fingerprint Evidence," by the Interpol European Expert Group on Fingerprint Identification, at www. interpol. int/public/Forensic/fingerprints/WorkingParties/IEEGFI/ieegfi. asp#val
  13. FingerprintPatterns,http://www. odec. ca/projects/2004/fren4j0/public_html/fingerprint_patterns. htm
  14. Smart card basics, http://www. smartcardbasics. com/smart-card-overview. html
  15. Biometric Scanning Technologies: Finger, Facialand Retinal Scanning, http://www. sans. org/reading-room/whitepapers/authentication/biometric-scanning-technologies-finger-facial-retinal-scanning-1177.
  16. Samir nanavati, Michael Thieme, Raj Nanavati, Biometrics: Identity Verification in a Network World. Willey India edition, 2002.
  17. The history of finger prints. Finger pak. http://www. fingerpak. com/thofingerprint. html
  18. Crime Scene Forensics. http://www. crimescene-forensics. com/Fingerprints. html
  19. Fingerprint recognition, http://en. wikipedia. org/wiki/Fingerprint_recognition
  20. Clue: Fingerprint patterns, http://www. odec. ca/projects/2004/fren4j0/public_html/fingerprint_patterns. htm
  21. Eurosmart, the voice of the smart security industry, http://www. eurosmart. com/index. php/publications/3-publications/204-figures-may-2012. html
  22. Wayne Jansen, Serban Gavrila, Clément Séveillac, Vlad Korolev. Computer Security. Smart Cards and Mobile Handheld Devices: An Overview and Implementation. July 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Biometric Security Fingerprint patterns Smart Cards Biometric Smart Cards Certification Authority.