IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs

Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs
View Sample PDF
Author(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India), Somya Ranjan Sahoo (National Institute of Technology, Kurukshetra, India), Vaibhav Bhatia (National Institute of Technology, Kurukshetra, India), Adil Arafat (National Institute of Technology, Kurukshetra, India)and Abhik Setia (National Institute of Technology, Kurukshetra, India)
Copyright: 2020
Pages: 26
Source title: Handbook of Research on Intrusion Detection Systems
Source Author(s)/Editor(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India)and Srivathsan Srinivasagopalan (AT&T, USA)
DOI: 10.4018/978-1-7998-2242-4.ch012

Purchase

View Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs on the publisher's website for pricing and purchasing information.

Abstract

This chapter discusses a model that allows the user to access social networking sites through login using smart phone-based biometric authentication. Currently, social networking websites permit the user to access their page through login and some sites provide auto fill system to login into users account through browser by permit. The browser saves the password in password protected space and automatically auto fills the password to access the account by user. This facility is not highly reliable due to the auto fill system for laptop users. When someone uses the laptop of others and visits any website, the auto fill system opens the content with saved password. Secondly, elderly people have problems logging into today's websites. To remember the password for every account is very difficult for elderly people. This chapter describes a model for security and authenticity. Authors used a hybrid model with android as the application with fingerprint authentication and chrome extension as the auto fill process for user access.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom