Thakur et al., 2024 - Google Patents
Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime InvestigationsThakur et al., 2024
- Document ID
- 5950808498441825274
- Author
- Thakur R
- Kumar S
- Singh S
- Singla K
- Sharma S
- Arya V
- Publication year
- Publication venue
- Digital Forensics and Cyber Crime Investigation
External Links
Snippet
In the ever-evolving digital landscape, the fusion of biometrics with multimedia forensics is revolutionizing cybercrime investigations. This integration involves merging diverse biometric modalities, such as fingerprint and iris recognition, facial analysis, voice …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mohsin et al. | Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures | |
| Mohsin et al. | Based medical systems for patient’s authentication: Towards a new verification secure framework using CIA standard | |
| Gayathri et al. | Novel framework for multimodal biometric image authentication using visual share neural network | |
| Gavrilova et al. | A multifaceted role of biometrics in online security, privacy, and trustworthy decision making | |
| Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
| Sharma et al. | Behavioral biometrics: Past, present | |
| Toli et al. | A survey on multimodal biometrics and the protection of their templates | |
| Naithani et al. | Emerging biometric modalities and integration challenges | |
| Aramide | AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics | |
| Choudhry et al. | Security and privacy issues in AI-based biometric systems | |
| Mukkamala et al. | Leveraging AI and big data for enhanced security in biometric authentication: a comprehensive model for digital payments | |
| Borra et al. | Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security | |
| Singla et al. | Cyber synergy | |
| Kolluri et al. | Advancing biometric security through AI and ML: a comprehensive analysis of neural network architectures for multimodal authentication systems | |
| Piugie | Performance and security evaluation of behavioral biometric systems | |
| Hernández-Álvarez et al. | Biometrics and artificial intelligence: Attacks and challenges | |
| Galla et al. | Big Data And AI Innovations In Biometric Authentication For Secure Digital Transactions | |
| Thakur et al. | Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime Investigations | |
| CA3191888A1 (en) | Systems and methods for private authentication with helper networks | |
| Zurita et al. | Social engineering shoulder surfing attacks (ssas): A literature review. lessons, challenges, and future directions | |
| US20250217952A1 (en) | Multiple Fraud Type Detection System and Methods | |
| Havrylovych et al. | Deep learning application in continuous authentication | |
| Konyavsky et al. | New method for digital economy user’s protection | |
| Aisyah et al. | E-Commerce Authentication Security with AI: Advanced Biometric and Behavioral Recognition for Secure Access Control | |
| Muhammad | The Multimodal Biometric Authentication: Integrating Fingerprints, Face, and Voice Using AI: An AI-Based Approach to Secure Identity Verification Using Fingerprint, Face, and Voice Biometrics |