Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2644
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Karunathilake, H | - |
dc.contributor.author | Shahan, A. R. M | - |
dc.contributor.author | Shamry, M. N. M | - |
dc.contributor.author | De Silva, M. W. D. S | - |
dc.contributor.author | Senarathne, A. N | - |
dc.contributor.author | Yapa, K | - |
dc.date.accessioned | 2022-06-21T03:24:26Z | - |
dc.date.available | 2022-06-21T03:24:26Z | - |
dc.date.issued | 2021-12-06 | - |
dc.identifier.citation | K. K. H. Karunathilake, A. R. M. Shahan, M. N. M. Shamry, M. W. D. S. De Silva, A. Senarathne and K. Yapa, "A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks," 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2021, pp. 0286-0292, doi: 10.1109/IEMCON53756.2021.9623240. | en_US |
dc.identifier.issn | 2644-3163 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2644 | - |
dc.description.abstract | In the modern world, unique biometrics of every individual play a vital role in authentication processes. However, as convenient as it seems, biometrics come with their own set of drawbacks. For instance, if a passphrase is compromised (which is highly likely), changing it to a new passphrase would solve the issue. However, when someone's biometrics are compromised, there is no turning back. Simultaneously, biometric systems are often compromised due to the use of fake physical biometrics and trojan horse attacks that are capable of modifying the authentication process to fulfill a malicious user's intents. This research focuses on proposing a novel and secure authentication process that uses steganography. This “all-in-one” solution also focuses on mitigating the aforementioned drawbacks with the use of four modules, namely, the feature extraction module, the payload generation and authentication module, the fake physical biometrics countering module and the trojan horse countering module. This solution is implemented such that the idea behind it can be easily adopted to enhance the existing biometric authentication systems as well as improve the overall condition and user experience of the multi-factor authentication processes that are widely in use today. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON); | - |
dc.subject | steganography-based | en_US |
dc.subject | fingerprint | en_US |
dc.subject | authentication | en_US |
dc.subject | mechanism | en_US |
dc.subject | counter fake | en_US |
dc.subject | physical biometrics | en_US |
dc.subject | trojan horse attacks | en_US |
dc.title | A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/IEMCON53756.2021.9623240 | en_US |
Appears in Collections: | Department of Computer systems Engineering-Scopes |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A_steganography-based_fingerprint_authentication_mechanism_to_counter_fake_physical_biometrics_and_trojan_horse_attacks.pdf Until 2050-12-31 | 588.61 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.