Book Details


IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to re-authenticate him for continued access to the protected resource. This may not be sufficient for high security environment in which the protector resource name needs to be continuously monitored for unauthorized use. In such cases, continues verification is needed. The proposed approach for continues user verification is CASHMA (Context Aware Security by Hierarchical Multilevel Architecture) System. The protocol determines adaptive timeouts based on the quality, frequency and type of biometric data transparently acquired from the user. The new proposed system that continually verify the presence/participation of a logged in user. For most computer system, once the identity of the user has been verified at login, the system resources are typically made available to the user until the user exits the system. In such system username and password are used for authentication. Here biometric technique offer solution for secure and trusted authentication. We use multiple biometric verification for continuous and transparent verification. So that achieves Higher Security then traditional authentication system. To achieve high security over data transmission, AODV (ad-hoc on demand distance vector) protocol has been used in this proposed work. The proposed method provides security and fast transmission. Simulation result shows that, this proposed method minimizes the time delay and provides secure data delivery.


[1] CASHMA-Context Aware Security by Hierarchical Multilevel Architectures, MIUR FIRB, 2005

[2] R. Brunelli and D. Falavigna, Person Identification using Multiple Cues, IEEE Transactions on PAMI, Vol 12, pp. 955-966, Oct. 1995.

[3]. N.K. Ratha, J.H. Connell, and R.M. Bolle, “An analysis of minutiae matching strength”, Proc. AVBPA 2001, Third International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 223-228, 2001.

[4] John Daugman, Biometric Decision Landscapes, Technical Report, University of Cambridge, UK, 1999.

[5]. D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.

[6] L. Hong and A. Jain, Integrating Faces and Fingerprints for Personal Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, No. 12, pp. 1295-1307, Dec. 1998.

[7] L. Hong, A. K. Jain, and S. Pankanti, Can Multibiometrics Improve Performance?, In Proceedings AutoID?99, NJ, USA, pp. 59-64, Oct. 1999.

[8] A. K. Jain, R. Bolle, and S. Pankanti, Multimodal Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, pp. 1-38, 1999.

[9] N. Poh and J. Korczak, Hybrid Biometric Authentication System Using Face and Voice Features, Third International Conference on AVBPA, pp. 348-353, 2001.


CASHMA, Security, Biometric User Verification.

  • Format Volume 5, Issue 1, No 22, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Reference IJCS-261
  • Page No 1663-1672

Copyright 2022 SK Research Group of Companies. All Rights Reserved.