The American Society for Industrial Security and Price Waterhouse (ASIS/PWC) study determined that the greatest losses occur in information related to Research and Development (R&D) and Manufacturing Processes. This is particularly relevant in the pharmaceutical industry. The Pharmaceutical Industry Profile for 2002 pointed out that the pharmaceutical industry budget for R&D has grown from $1.3B…

The Purdue University airport is located on the main campus at West Lafayette, IN. Post 9/11, the airline industry was impacted by new additional security rules and regulations. The rationale behind working with the airport is to provide aviation technology information about the benefits of biometrics in their environment. Currently, a flight simulator has been…

Keystroke dynamics is used to address the inherent weakness of knowledge-based passwords. Current keystroke dynamics solutions work with static passwords. This concept adds a layer of security to password protection, but the user is still obligated to remember their password. Researchers from the BSPA Lab have investigated methods which do not require users to remember…

The objective of this research was to perform an analysis of quality of the image, minutiae count, and overall performance of fingerprint images based on the Henry system of fingerprint classification and the finger’s relative location on the presenting hand. To do this, 50 users submitted 3 images from four fingers (index, middle, ring, and…

Biometrics and cryptography have long been seen as competing technologies. Researchers and from the BSPA Lab and CERIAS are actively involved in creating security mechanisms which sees both technologies are symbiotic rather than competitive. This work is researching methodologies to fuse biometrics with cryptography while keeping in mind the following criteria: Practicality and ease of…

Electronic authentication (E-Authentication) is the process of establishing confidence in user identities electronically presented to an information system. E-Authentication presents a technical challenge, especially when this process involves the remote authentication of individuals over an open network. The objective of this ongoing initiative is to determine how biometrics can be used for remote e-authentication over…

This research focuses on the data collection of “extreme populations”, that may not be available to all researchers. Two examples are the elderly and those that have illnesses that can affect a biometric trait either through the illness or treatment. The reason for this research is simple: for biometrics to become pervasive in society, we…

ICBR
Copyright © 2014 ICBR
All rights reserved

  Young Hall Room 310, West Lafayette, IN, 47906, Tel: (765)494-2910   View contact page