Department of Computer

More ...

About Department of Computer

Facts about Department of Computer

We are proud of what we offer to the world and the community












Some of publications in Department of Computer

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Most Common and Reliable Traits for Fusion of Biometrics

Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on "who an individual is", rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his identity, these traits cannot be easily lost or forgotten or faked. Since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet biometric systems are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. In this paper we present the most common and reliable known biometric systems suitable for Multimodal Biometrics Fusion, providing highly efficient and secure systems, showing their strengths and weaknesses and also presenting technologies in which may have great benefits for security applications in the near future.
Abdulmonam Omar Ahmed Alaswad, Ihab Meftah Elfituri, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Documents you Need