[go: up one dir, main page]

Thakur et al., 2024 - Google Patents

Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime Investigations

Thakur et al., 2024

Document ID
5950808498441825274
Author
Thakur R
Kumar S
Singh S
Singla K
Sharma S
Arya V
Publication year
Publication venue
Digital Forensics and Cyber Crime Investigation

External Links

Snippet

In the ever-evolving digital landscape, the fusion of biometrics with multimedia forensics is revolutionizing cybercrime investigations. This integration involves merging diverse biometric modalities, such as fingerprint and iris recognition, facial analysis, voice …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Mohsin et al. Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures
Mohsin et al. Based medical systems for patient’s authentication: Towards a new verification secure framework using CIA standard
Gayathri et al. Novel framework for multimodal biometric image authentication using visual share neural network
Gavrilova et al. A multifaceted role of biometrics in online security, privacy, and trustworthy decision making
Wells et al. Privacy and biometrics for smart healthcare systems: attacks, and techniques
Sharma et al. Behavioral biometrics: Past, present
Toli et al. A survey on multimodal biometrics and the protection of their templates
Naithani et al. Emerging biometric modalities and integration challenges
Aramide AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics
Choudhry et al. Security and privacy issues in AI-based biometric systems
Mukkamala et al. Leveraging AI and big data for enhanced security in biometric authentication: a comprehensive model for digital payments
Borra et al. Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security
Singla et al. Cyber synergy
Kolluri et al. Advancing biometric security through AI and ML: a comprehensive analysis of neural network architectures for multimodal authentication systems
Piugie Performance and security evaluation of behavioral biometric systems
Hernández-Álvarez et al. Biometrics and artificial intelligence: Attacks and challenges
Galla et al. Big Data And AI Innovations In Biometric Authentication For Secure Digital Transactions
Thakur et al. Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime Investigations
CA3191888A1 (en) Systems and methods for private authentication with helper networks
Zurita et al. Social engineering shoulder surfing attacks (ssas): A literature review. lessons, challenges, and future directions
US20250217952A1 (en) Multiple Fraud Type Detection System and Methods
Havrylovych et al. Deep learning application in continuous authentication
Konyavsky et al. New method for digital economy user’s protection
Aisyah et al. E-Commerce Authentication Security with AI: Advanced Biometric and Behavioral Recognition for Secure Access Control
Muhammad The Multimodal Biometric Authentication: Integrating Fingerprints, Face, and Voice Using AI: An AI-Based Approach to Secure Identity Verification Using Fingerprint, Face, and Voice Biometrics