It is defined by Markus Kahn as follows, "Steganography is the science and art of communicating in a way which hides the existence of the message. In Cryptography, the enemy is allowed and able to detect, intercept and modify messages without being able to offend certain security premises guaranteed by a cryptosystem, the main aim of Steganography is to conceal messages inside other messages in a way that does not permit any enemy to even detect that there is a something fishy in
The fingerprint recognition is one of the oldest and most well known means of identification. It involves the comparison of two human fingerprints. It analyzes the ridges and valleys patterns on the fingertip for differences. Advantages: -The rate of accuracy is very high. -It is an easy mean of idenfication.
SECRET SHARING Shamir’s Secret Sharing algorithm in cryptography is developed by Adi Shamir. It is a method of secret sharing, where a secret is divided into pieces, giving each authenticated member its own unique part, where at least half the parts or more than half are needed together to reconstruct the secret. All shares required together seems to be not practical, and therefore sometimes the threshold scheme is used where any no. of share are sufficient to reconstruct the original secret. Shamirs (t, n)-threshold scheme.
With fingerprint authentication, there is no need to provide sensitive information or save passwords. In this way, it physically inconceivable for hackers to take over your accounts. Is Biometric Authentication The Future of Digital Security? Biometric authentication analyzes specific attributes. Aside from fingerprints, it can also use the person’s face, voice, penmanship, palm print, retina or iris, hand geometry, or a combination of two or more these characteristics.
Biometric Security Biometric security contributes to the enhancement of privacy because of its accurate data and how well it specifies each person. This is based on knowing that each one has special biometric identity which specifies him or her, and no one in the world has the same profile. Also I acknowledge these objections that dealing with biometric data and applying them into security needs is complex. We recognize its complexity by imagining the possibility of integrating the accuracy of observation and a device that does not interact as a creature. My response to the challenge is that researchers started to simplify the biometric data in a way that allows us to be able to use it in our daily life.
The advancements in information technology (IT) have raised concerns about the risks to data associated with weak IT security, including vulnerability to viruses, malware, attacks and compromise of network systems and services. Inadequate IT security may result in compromised confidentiality, integrity, and availability of the data due to unauthorized access. It is important to ensure the individual privacy remains carefully protected and secured. What is information security threat? A threat is any circumstance or event with the potential to harm an information system can cause different types of damages that might lead to significant financial losses.
Abstract: In human identification biometrics is one of the biggest tendencies. Nowadays, in many real applications like forensic, security and other identification and recognition purposes biometrics is widely used. Here we have discussed and comparisons of different biometric features along with their uses. In biometrics fingerprint is the most widely used. Even further multimodal biometrics can improve the reliability and performance of biometric authentication.
Information security is composed of computer security and communications security. Computer security includes the collection of tools to protect the data and prevent from hackers in a system. Network means the connection of computers, the security which can be included here is to protect the data during the transmissions. One type of attack in is computer virse 1.2 AUTHENTICATION Authentication is a process in which the credentials which are provided to the system is
Abstract: Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. In addition to security, the driving force behind biometric verification has been convenience. Among different available biometric techniques, fingerprint recognition is the most prominent one. Fingerprint authentication refers to the automated method of verifying a match between two human fingerprints.