Skip to main content

Office Employees Authentication Based on E-exam Techniques

  • Conference paper
Book cover Neural Information Processing (ICONIP 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7666))

Included in the following conference series:

  • 4171 Accesses

Abstract

The paper presents a method for protection office door to open only for authentic employees. Firstly, the employee enter his ID into remote computer through keypad fixed out door, then the computer automatically reply by asking the employee a few questions appear on the keypad screen. To open the door, the employee must answer all of questions within certain and short period of the time. The questions are been selected randomly using e-exam technique from a bank of questions which have been designed based on invariant private information related with employee. The paper is aimed to use a simple and accurate method for employee authentication comparing with traditional office security techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.peterindia.net/BiometricsView.html

  2. Andrijchuk, V.A., Kuritnyk, I.P., Kasyanchuk, M.M., Karpinski, M.P.: Modern Algorithms and Methods of the Person Biometric Identification. IEEE Intelligent Data Acquisition and Advanced Computing Systems, Technology and Applications, 403–406 (2005) ISBN: 0780394453

    Google Scholar 

  3. Zhang, J.H., Liu, X.J., Chen, B.: The Design and Implementation of ID Authentication System Based On Fingerprint Identification. In: Fourth International Conference on Intelligent Computation Technology and Automation, vol. 2, pp. 1217–1220 (2011)

    Google Scholar 

  4. Wang, F.L., Zhang, Y.Y.: Study and Design oh Intelligent Authentication System Based on Fingerprint Identification. In: Second International Symposium on Knowledge Acquisition and Modeling, vol. 3, pp. 170–173 (2009)

    Google Scholar 

  5. Miroslav, B., Petra, K., Tomislav, F.: Basic On-line Handwriting Signature features for Person Biometric authentication. In: Proceedings of the 34th International Convention MIPRO, pp. 1458–1463 (2011)

    Google Scholar 

  6. Eshwarappa, M.N., Latte, M.V.: Multimode Biometric Person Authentication using Speech, Signature and Handwriting Features. International Journal of Advanced Computer Sciences and Applications Special +Issue, Artificial +Intelligent, 77–86 (2011)

    Google Scholar 

  7. Chibelushi, C.C., Mason, J.S.D., Deravi, N.: Integrated Person Identification Using Voice and Facial Features. IEE Colloquium on Image Processing for Security Applications (Digest No.: 1997/074), 4/1–4/5 (1997)

    Google Scholar 

  8. Qu, Z.Y., Wang, T., Zheng, R.D., Liu, Y.M.: An Identity Authentication System Based on Face Biometrics and Eye Location. In: International Conference on Measuring Technology and Mechatronics Automation, vol. 1, pp. 479–483 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Morad, A.H. (2012). Office Employees Authentication Based on E-exam Techniques. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds) Neural Information Processing. ICONIP 2012. Lecture Notes in Computer Science, vol 7666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34478-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34478-7_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34477-0

  • Online ISBN: 978-3-642-34478-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics