Sign in Please

September 2007
Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p88
Trade Publication
The article focuses on the significance of signature for security purposes in business and legal transactions. According to David Pintsov of Peladon Software who uses signature verification in his business, this form of security measure enables him to save labor cost. In dynamic signature verification, multiple biometric features of a signature are examined and compared with a reference sign to measure the confidence value of the signature's authenticity. INSET: A Safe Finger; a Finger Safe.


Related Articles

  • Upgrading Existing Biometric Security Systems by Implementing the Concept of Cancelable Biometrics. Bača, Miroslav; Antonić, Marko; Franjo, Magusic // Central European Conference on Information & Intelligent Systems;2008, p518 

    Today's biometric security systems have a number of problems that emerge from the fact that the biometric data of a person is stored in the system. The problems arise when that data is compromised. Standard password based security systems have the ability to cancel the compromised password and...

  • A BIOMETRIA JELENLEGI MEGÍTÉLÉSE. Katalin, Kondás // Hadmérnök;mar2013, Vol. 8 Issue 1, p23 

    There are various types os authentical methods, nowadays the most modern of these is the biometric identification. Although biometric identification is a basic technical defense in the area of the security systems, however its expensively spread unfrequented yet. There are several reasons for...

  • A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches.  // International Journal of Computer Applications;2010, Vol. 1, p55 

    The article presents a research study on biometrics and its significance in determining the off-line hand written signatures. It denotes the implementability of the said technology in signature recognition due to its low-cost application and maintenance. It cites the biometrics' applicability in...

  • Are You Who You Say You Are? Rood, Edwin P.; Hornak, Lawrence A. // World & I;Aug2003, Vol. 18 Issue 8, p142 

    Focuses on the identification technologies called biometrics that examine a person's unique traits to protect places and information and look for wanted individuals. Origin of the term biometrics; Basis of the use of biometrics for human recognition; Uses of fingerprinting recognition;...

  • Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics. Ceyhan, Ayse // Surveillance & Society;Apr2008, Vol. 5 Issue 2, p102 

    Contemporary security policies are characterized by a dramatic focus on high technology like biometrics as a security enabler. The process of the technologization of security, i.e. the making of technology the centerpiece of security systems and its perception as an absolute security provider,...

  • A novel Fingervein Recognition System based on Monogenic Local Binary Pattern Features. DAMAK MASMOUDI, Alima; BOUKHRIS TRABELSI, Randa; SELLAMI MASMOUDI, Dorra // International Journal of Engineering & Technology (0975-4024);Dec2013/Jan2014, Vol. 5 Issue 6, p4528 

    As a new approach to human identification, fingervein recognition is becoming an active biometric recognition mode. This paper focuses on fingervein recognition system. First, a preprocessing algorithm is used to enhance each fingervein image. Then, an improvement technique of feature extraction...

  • Robustness of Multi Biometric Authentication Systems against Spoofing. Hariri, Mahdi; Shokouhi, Shahriar B. // Computer & Information Science;2012, Vol. 5 Issue 1, p77 

    Nowadays biometric authentication systems have been more developed, especially in secure and financial systems; so cracking a biometric authentication system is now a growing concern. But their security has not received enough attention. Imitating a biometric trait of a genuine user to deceive a...

  • An Effective Two-Finger, Two-Stage Biometric Strategy for the US-VISIT Program. Baveja, Manas; Wein, Lawrence M. // Operations Research;Sep2009, Vol. 57 Issue 5, p1068 

    Motivated by the cost and disruption involved in changing from a two-finger to a ten-finger biometric system for matching U.S. visitors to a watchlist of criminals and terrorists, we investigate whether any two-finger multistage biometric strategies would fix the inadequate matching performance...

  • A New Multimodal Biometric Identification Approach. Samir, Akrouf; Yahia, Belayadi; Eddine, Mouhoub Nasser // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p238 

    Several authors [1] [2] [3] [4] [5] have shown that multimodality was a highly efficient solution for biometric identification and allows to increase performance and reliability. Indeed, the acquisition of multiple biometric features makes it much more difficult for an impostor to spoof the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics