TITLE

Sign in Please

PUB. DATE
September 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p88
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the significance of signature for security purposes in business and legal transactions. According to David Pintsov of Peladon Software who uses signature verification in his business, this form of security measure enables him to save labor cost. In dynamic signature verification, multiple biometric features of a signature are examined and compared with a reference sign to measure the confidence value of the signature's authenticity. INSET: A Safe Finger; a Finger Safe.
ACCESSION #
26578503

 

Related Articles

  • Upgrading Existing Biometric Security Systems by Implementing the Concept of Cancelable Biometrics. Bača, Miroslav; Antonić, Marko; Franjo, Magusic // Central European Conference on Information & Intelligent Systems;2008, p518 

    Today's biometric security systems have a number of problems that emerge from the fact that the biometric data of a person is stored in the system. The problems arise when that data is compromised. Standard password based security systems have the ability to cancel the compromised password and...

  • A BIOMETRIA JELENLEGI MEGÍTÉLÉSE. Katalin, Kondás // Hadmérnök;mar2013, Vol. 8 Issue 1, p23 

    There are various types os authentical methods, nowadays the most modern of these is the biometric identification. Although biometric identification is a basic technical defense in the area of the security systems, however its expensively spread unfrequented yet. There are several reasons for...

  • A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches.  // International Journal of Computer Applications;2010, Vol. 1, p55 

    The article presents a research study on biometrics and its significance in determining the off-line hand written signatures. It denotes the implementability of the said technology in signature recognition due to its low-cost application and maintenance. It cites the biometrics' applicability in...

  • Are You Who You Say You Are? Rood, Edwin P.; Hornak, Lawrence A. // World & I;Aug2003, Vol. 18 Issue 8, p142 

    Focuses on the identification technologies called biometrics that examine a person's unique traits to protect places and information and look for wanted individuals. Origin of the term biometrics; Basis of the use of biometrics for human recognition; Uses of fingerprinting recognition;...

  • Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics. Ceyhan, Ayse // Surveillance & Society;Apr2008, Vol. 5 Issue 2, p102 

    Contemporary security policies are characterized by a dramatic focus on high technology like biometrics as a security enabler. The process of the technologization of security, i.e. the making of technology the centerpiece of security systems and its perception as an absolute security provider,...

  • A novel Fingervein Recognition System based on Monogenic Local Binary Pattern Features. DAMAK MASMOUDI, Alima; BOUKHRIS TRABELSI, Randa; SELLAMI MASMOUDI, Dorra // International Journal of Engineering & Technology (0975-4024);Dec2013/Jan2014, Vol. 5 Issue 6, p4528 

    As a new approach to human identification, fingervein recognition is becoming an active biometric recognition mode. This paper focuses on fingervein recognition system. First, a preprocessing algorithm is used to enhance each fingervein image. Then, an improvement technique of feature extraction...

  • A New Multimodal Biometric Identification Approach. Samir, Akrouf; Yahia, Belayadi; Eddine, Mouhoub Nasser // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p238 

    Several authors [1] [2] [3] [4] [5] have shown that multimodality was a highly efficient solution for biometric identification and allows to increase performance and reliability. Indeed, the acquisition of multiple biometric features makes it much more difficult for an impostor to spoof the...

  • Robustness of Multi Biometric Authentication Systems against Spoofing. Hariri, Mahdi; Shokouhi, Shahriar B. // Computer & Information Science;2012, Vol. 5 Issue 1, p77 

    Nowadays biometric authentication systems have been more developed, especially in secure and financial systems; so cracking a biometric authentication system is now a growing concern. But their security has not received enough attention. Imitating a biometric trait of a genuine user to deceive a...

  • Biometrics and Travel Go Hand in Hand. Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p32 

    The article provides information on the usefulness of biometrics as one of the security systems used by companies in the U.S. It mentions that availability of biometrics in the market and cites that there are several companies have used and relied on this security product, particularly the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics