Research Article | Open Access
Volume 2 | Issue 7 | Year 2015 | Article Id. IJCSE-V2I7P111 | DOI : https://doi.org/10.14445/23488387/IJCSE-V2I7P111

A login strategy using fingerprint verification


Huiyi Han, Zhiyi Qu, Weiwei Kang

Citation :

Huiyi Han, Zhiyi Qu, Weiwei Kang, "A login strategy using fingerprint verification," International Journal of Computer Science and Engineering , vol. 2, no. 7, pp. 35-39, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I7P111

Abstract

So far, majority of applications and websites mainly use traditional login method based on username and password. These identity authentication systems acquire two steps that users must execute. Firstly, users must complete registration. Secondly, they must enter correct username and password to login, only these two steps will spend seven or eight minutes. Moreover, the account can be forgotten, lost and stolen. So this paper proposes a technique which based on fingerprint verification. When logged in, people only need to brush fingerprint to verify identity. This kind of login method is simple and quick, safe and reliable

Keywords

System login, account security, fingerprint verification.

References

[1] Jain A K, Hong L, Pankanti S.Biometrics Identification, Comm.ACM,2000,2,91-98. 
[2] Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol, Version 3.0.INTERNET- DRAFT (November 1996), http://draft-freier-ssl-version3-02.txt
[3] Boneh, D., Gentry, C., Hamburg, M.: Space Efficient Identity Based Encryption without Pairings. In: Proceedings of FOCS 2007, pp. 647–657 (2007) 
[4] Boneh, D.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455–470. Springer, Heidelberg (2008) 
[5] Boyen, X.: General Ad Hoc Encryption from Exponent Inversion IBE. In: Naor, M. (ed.) 
[6] F. Galton, Finger Prints, Macmillan, London, UK, 1892. 
[7] A.Farina,Z.M. Kovács-Vajna and A. Leone, “Fingerprint Minutiae Extraction from Skeletonized Binary Images,” Pattern Recognition, Vol. 32, No. 5, pp. 877-889, 1999. 
[8] A. K. Jain, S. Prabhakar, L. Hong and S. Pankanti , “Filterbank-Based Fingerprint Matching,” IEEE Transactions on Image Processing, Vol. 9, No. 5, pp. 846-859, 2000. Fig 3. system deployment diagram