Ara et al., 2022 - Google Patents
An efficient privacy-preserving user authentication scheme using image processing and blockchain technologiesAra et al., 2022
View PDF- Document ID
- 11373078196745079242
- Author
- Ara A
- Sharma A
- Yadav D
- Publication year
- Publication venue
- Journal of Discrete Mathematical Sciences and Cryptography
External Links
Snippet
User authentication is a measurement challenge for handheld devices and online accounts such as bank accounts, social media accounts etc. because illegal access results in money loss and user privacy. Individual devices, online financial services, and intelligent spaces …
- 238000000034 method 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jain et al. | Biometrics: Trust, but verify | |
| Rui et al. | A survey on biometric authentication: Toward secure and privacy-preserving identification | |
| Dasgupta et al. | Advances in user authentication | |
| Ahmad et al. | Technical issues and challenges of biometric applications as access control tools of information security | |
| Yusuf et al. | A survey of biometric approaches of authentication | |
| Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
| Lone et al. | A novel OTP based tripartite authentication scheme | |
| Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
| Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
| Naithani et al. | Emerging biometric modalities and integration challenges | |
| Kwon et al. | CCTV-based multi-factor authentication system. | |
| Bodepudi et al. | Spoofing attacks and mitigation strategies in biometrics-as-a-service systems | |
| Maltoni et al. | Securing fingerprint systems | |
| Prasad et al. | A study on multifactor authentication model using fingerprint hash code, password and OTP | |
| Malik | Biometric Authentication-Risks and advancements in biometric security systems | |
| Kavitha et al. | Enhancing digital security: a comprehensive multi-model authentication framework leveraging cryptography and biometrics | |
| Bock | Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication | |
| Mohialden et al. | Enhancing User Authentication with Facial Recognition and Feature-Based Credentials | |
| Kumar et al. | Sustainable approach to data security: multi-key biometric encryption and cloud storage for SDG-focused businesses | |
| Yokesh et al. | Issues and Challenges in Traditional Biometric Systems | |
| Sawant et al. | A Study on Biometric Authentication Systems, Privacy Concerns and Mitigation Strategies | |
| Cimato et al. | Biometrics and privacy | |
| Krishna Prasad | Multifactor authentication model using fingerprint hash code and iris recognition | |
| Bali et al. | Biometrics Security in Mobile Application Development & its Applications | |
| Pais et al. | Illusion PIN: tricking the eye to defeat shoulder surfing attack by using hybrid images |