scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
30 Dec 2010
TL;DR: The paper gives a clear outline of how peers form groups, select group leaders, and the distribution and management of keys among the peers.
Abstract: The ease of shopping and comparing products and prices online has made it an attractive option for many shoppers. When it comes to time to enter personal information or complete a business transaction on the Internet, most people hesitate, and understandably so. They've read about credit card fraud, identity theft, spoofing, hacking, phishing and other abuses. These business transactions take place among peer to peer systems at the edge of the internet. In peer-to-peer environments, a peer needs to interact with unknown entities. In the method proposed, the peers form groups in order to ensure security. Each group is based on interest among the peers and has its own way of operation. The paper gives a clear outline of how peers form groups, select group leaders. Peers can belong to more than one group to a maximum of n groups hence exempt a similarity behavior. This paper also addresses the distribution and management of keys among the peers.

3 citations

Posted Content
TL;DR: It is concluded that an accurate detection of fake movements has more to do with how users write, rather than what they write, and this work has implications for computerized systems that need to authenticate or verify legitimate human users, and provides an additional layer of security to keep attackers at bay.
Abstract: Online fraud often involves identity theft. Since most security measures are weak or can be spoofed, we investigate a more nuanced and less explored avenue: behavioral biometrics via handwriting movements. This kind of data can be used to verify whether a user is operating a device or a computer application, so it is important to distinguish between human and machine-generated movements reliably. For this purpose, we study handwritten symbols (isolated characters, digits, gestures, and signatures) produced by humans and machines, and compare and contrast several deep learning models. We find that if symbols are presented as static images, they can fool state-of-the-art classifiers (near 75% accuracy in the best case) but can be distinguished with remarkable accuracy if they are presented as temporal sequences (95% accuracy in the average case). We conclude that an accurate detection of fake movements has more to do with how users write, rather than what they write. Our work has implications for computerized systems that need to authenticate or verify legitimate human users, and provides an additional layer of security to keep attackers at bay.

3 citations

Patent
29 Oct 2012
TL;DR: In this paper, the authors proposed a method and system for providing information using a consent procedure executed by means of near-field communication, which involves transmitting a request for consent to provide information to a mobile device when the mobile device is requested to consent to providing information.
Abstract: The present invention relates to a method and system for providing information using a consent procedure executed by means of near-field communication. The method for providing information involves transmitting a request for consent to provide information to a mobile device capable of near-field communication when the mobile device is requested to consent to providing information. Since consent to provide information is requested/confirmed using the near-field communication functions of mobile devices, information leaks/exposures due to identity theft or the use of a disguise are prevented in advance. In particular, since users need to be face-to-face, this process can improve security.

3 citations

Proceedings ArticleDOI
TL;DR: It is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft.
Abstract: This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

3 citations

23 Dec 2017
TL;DR: This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies with a focus on the fuzzy vault construct, which secures both the secret key and the biometric template by binding them within a cryptographic framework.
Abstract: As the information age matures, a biometric identification technology will be at the heart of computer interaction with humans and the biosphere in which they reside. Hence, the reliable information security mechanisms are needed to combat the rising magnitude of identity theft. While cryptography is a powerful tool to achieve information security, one of the main challenges in cryptosystems is to maintain the secrecy of the cryptographic keys. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometric systems against attacks such as identity theft and cross matching. A critical issue in biometric systems is to protect the template of a user which is typically stored in a database or a smart card. The fuzzy vault construct is a challenging biometric cryptosystem that secures both the secret key and the biometric template by binding them within a cryptographic framework. The helper data itself do not leak any information about the biometric template, yet contain sufficient information to align the template and query biometric accurately. This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies.

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112