Threats, Consequences and Issues of Various Attacks on Online Social Networks

Full Text (PDF, 456KB), PP.50-60

Views: 0 Downloads: 0

Author(s)

Gururaj H L 1 Swathi B H 1 Ramesh B 2

1. Vidyavardhaka College of Engineering, Mysuru 570002,India

2. Malnad College of Engineering, Hassan 573201,India

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2018.04.05

Received: 6 Dec. 2017 / Revised: 20 Feb. 2018 / Accepted: 15 Mar. 2018 / Published: 8 Jul. 2018

Index Terms

Security, Biometric Recognition Systems, Finger Print Recognition System (FPRS), Face Recognition System(FRS), Palm Recognition System (PRS), Iris Recognition System (IRS), Voice Recognition System (VRS)

Abstract

Security is an important factor of life, which varies from home network to all aspects of our life. Data security is one of the challenges research areas where we can’t provide 100% security for any data and network. Initially the data were secured with Passwords and extended up to biometrics, eventually attackers also becoming stronger to heal the data. In this paper critical review has been done starting from the passwords for securing data to various biometric methods. By using modern tool the data are securing using biometric methods.

Cite This Paper

Gururaj H L, Swathi B H, Ramesh B,"Threats, Consequences and Issues of Various Attacks on Online Social Networks", International Journal of Education and Management Engineering(IJEME), Vol.8, No.4, pp.50-60, 2018. DOI: 10.5815/ijeme.2018.04.05

Reference

[1]Vladimir I. Ivanov, John S. Baras," Authentication for swipe fingerprint scanners". IEEE Transactions on Information Forensics and Security 2017.

[2]Belen Fernandez- Saavedra, Raul Sanchez-Reillo, Rodrigo Ros-Gomez, Judith Liu-Jimenez, "Small fingerprint scanners used in mobile devices: the impact on biometric performance", 2016.

[3]Gustavo Botelho de Souza, Daniel Felipe da Silva Santos, Rafael Gon?alves Pires,Aparecido Nilceu Marana, Jo?o Paulo Papa Deep" Texture features for robust face spoofing detection" IEEE Transactions on Circuits and Systems II: Express Briefs 2017.

[4]Santosh Kumar, Sanjay Kumar Singh, Amit Kumar Singh," Muzzle point pattern based techniques for individual cattle identification", 2017.

[5]Ceren Guzel Turhan, Hasan Sakir Bilge, "Class-wise two dimensional PCA method for face recognition" 2017.

[6]John Soldera, Guilherme Schu, Lucas RoyesSchardosim, Eric TadielloBeltrao," Facial biometrics and applications", IEEE Instrumentation & Measurement Magazine, 2017.

[7]Samik Chakraborty, MadhuchhandaMitra, Saurabh Pal, "Biometric analysis using fused feature set from side face texture and electrocardiogram", 2017.

[8]Jinwoo Kang; David V. Anderson; Monson H. Hayes "Face recognition for vehicle personalization with near infrared frame differencing ", IEEE Transactions on Consumer Electronics, Vol. 62,2016.

[9]ArashRikhtegar, Mohammad Pooyan, Mohammad TaghiManzuri-Shalmani"Genetic algorithm-optimised structure of convolutional neural network for face recognition applications" IET Comput. Vis., Vol. 10 Iss. 6, pp. 559-566, 2016.

[10]M.ShamimHossain,GhulamMuhammad, SkMdMizanurRahman, WadoodAbdul, AbdulhameedAlelaiwi; AtifAlamri "Toward end-to-end biometrics based security for Iot infrastructure", IEEE Wireless Communications 2016

[11]SandipJoardar, AmitavaChatterjee, AnjanRakshit "Real-time NIR imaging of palm Dorsa subcutaneous vein pattern based biometrics: An SRC based approach", IEEE Instrumentation & Measurement Magazine, 2016.

[12]Nassima Kihal, Salim Chitroub,Arnaud Polette, Isabelle Brunette, Jean Meunier"Efficient multimodal ocular biometric system for person authentication based on iris texture and corneal shape", 2017.

[13]Faisal Mansour Algashaam, Kien Nguyen, Vinod Chandran, Jasmine Banks "Elliptical Higher-order-Spectra periocular code", vol.5,2017.

[14]Jianxu Chen, FengShen, Danny Ziyi Chen, Patrick J. Flynn," Iris Recognition based on human Interpretable features "2016.

[15]Clariton Rodrigues Bernadelli, Paulo Ricadro da Silva, Antonio Claudio "Iris Movements: The Best state to dynamic Biometric Recognition process", IEEE Latin America Transactions, vol.14, 2016.

[16]Giorgio Biagetti, Paolo Crippa, Laura Falaschetti, Simone Orcioni, Claudio Turchetti, "An Investigation on the Accuracy of Truncated DKLT Representation for speaker identification With Short sequences of speech frames", IEEE transactions on cybernetics, vol.47, 2017

[17]Ge Peng, Gang Zhou, David T. Nguyen, Xin Qi, Qing Yang, Shuangquan Wang "Continuous Authentication with touch behavioral biometrics and voice on Wearable Glasses", IEEE transactions on human -machine systems, vol.47, 2017

[18]Pavel Korshunov, Sébastien "Marcel Impact of score Fusion on Voice Biometrics and presentation attack Detection in cross Database Evaluations" 2017.

[19]Dipjyoti Paul, Monisankha Pal, Goutam Saha "Spectral Features for synthetic speech detection", IEEE journal of selected topics in signal processing, vol. 11, 2017.