Please use this identifier to cite or link to this item: https://repositorio.ufrn.br/jspui/handle/123456789/29749
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSouza, Daniel-
dc.contributor.authorBulamarqui, Aquiles Medeiros Filgueira-
dc.contributor.authorSouza Filho, Guido-
dc.date.accessioned2020-07-29T14:27:28Z-
dc.date.available2020-07-29T14:27:28Z-
dc.date.issued2017-01-28-
dc.identifier.citationSOUZA, Daniel; BURLAMAQUI, Aquiles; SOUZA FILHO, Guido. Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimedia Tools And Applications, [s.l.], v. 77, n. 2, p. 2013-2032, 28 jan. 2017. Disponível em: https://link.springer.com/article/10.1007%2Fs11042-017-4374-x. Acesso em: 28 jul. 2020. http://dx.doi.org/10.1007/s11042-017-4374-xpt_BR
dc.identifier.issn1573-7721-
dc.identifier.urihttps://repositorio.ufrn.br/jspui/handle/123456789/29749-
dc.languageenpt_BR
dc.publisherSpringerpt_BR
dc.rightsAttribution 3.0 Brazil*
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/br/*
dc.subjectMulti-factor authenticationpt_BR
dc.subjectBiometric authenticationpt_BR
dc.subjectTwo-beam interferencept_BR
dc.subjectChaotic mapspt_BR
dc.titleImproving biometrics authentication with a multi-factor approach based on optical interference and chaotic mapspt_BR
dc.typearticlept_BR
dc.identifier.doi10.1007/s11042-017-4374-x.-
dc.description.resumoWe propose a method to improve biometric authentication systems using a multifactor approach. For this security scheme a user authenticates successfully using a set of three characteristics related to physical, possession and knowledge factors. Besides biometric authentication representing the physical factor, we propose the use of an optical authentication technique based on two-beam interference and chaotic maps. In this sense, the seed of a chaotic map represents a user password corresponding to a knowledge factor and a resultant interferogram from optical authentication technique is used as a possession factor. The feasibility of our method is tested using numerical simulation. Moreover, key space and statistical analysis are performed to demonstrate the effectiveness of the solutionpt_BR
Appears in Collections:ECT - Artigos publicados em periódicos

Files in This Item:
File Description SizeFormat 
ImprovingBiometricsAuthentication_BULAMARQUI_2017.pdfArtigo4,7 MBAdobe PDFThumbnail
View/Open


This item is licensed under a Creative Commons License Creative Commons