Smartphones Verification and Identification by the Use of Fingerprint

The use of fingerprints as a form of identification is authentic, accurate and reliable in smart phones. Due to privacy, and people feel safe that their information is secured by using locks on their android phones and can be accessed through fingerprints and other methods. An application was developed in this paper named ‘closet’ that will collect finger prints from different individuals that you want to give access to the device but will make one of the fingerprints the main which will give full access to all the applications, documents, pictures, videos, phone call logs and messages but when the other fingerprint is identified on the android phone it automatically hides the information that want to be kept private making others not access what you want to be kept hidden. This application will only be accessed and utilized by android users. Due to the wide use of fingerprint to unlock mobile devices and the authenticity, this application will be proven to secure all the users information.

[1]  Shah Faisal Darwaish,et al.  Biometric Identification on Android Smartphones , 2014, KES.

[2]  Sanjay Misra,et al.  A Home Automation System Based on Bluetooth Technology Using an Android Smartphone , 2021 .

[3]  Mun-Kyu Lee,et al.  Vulnerability Analysis on Smartphone Fingerprint Templates , 2016 .

[4]  Şenay Kocakoyun Developing of Android Mobile Application Using Java and Eclipse: An Application , 2017 .

[5]  John F. Canny,et al.  FingerSense: augmenting expressiveness to physical pushing button by fingertip identification , 2004, CHI EA '04.

[6]  Jen-Chun Lee,et al.  A novel biometric system based on palm vein image , 2012, Pattern Recognit. Lett..

[7]  Hojae Lee,et al.  Fingerprint template management for higher accuracy in user authentication , 2018, 2018 International Conference on Electronics, Information, and Communication (ICEIC).

[8]  Vasile Daniel Pavaloaia Methodology Approaches Regarding Classic versus Mobile Enterprise Application Development , 2013 .

[9]  Donovan Gentles,et al.  Application of Biometrics in Mobile Voting , 2012 .

[10]  P. A. Assibong,et al.  The Utilization of the Biometric Technology in the 2013 Manyu Division Legislative and Municipal Elections in Cameroon: An Appraisal , 2020 .

[11]  Blase Ur,et al.  Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .

[12]  Yuji Watanabe,et al.  Long-term influence of user identification based on touch operation on smart phone , 2017, KES.

[13]  Zhenhua Guo,et al.  Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..

[14]  Ben Zhang,et al.  Scattering Removal for Finger-Vein Image Restoration , 2012, Sensors.

[15]  A measurement study of google play , 2014, SIGMETRICS.

[16]  Dharmeshkumar Mistry,et al.  Secure Smartphone Unlocking Using NFC , 2015 .

[17]  Mun-Kyu Lee,et al.  Security Analysis and Improvement of Fingerprint Authentication for Smartphones , 2016, Mob. Inf. Syst..

[18]  Stephen J. Elliott,et al.  The Human–Biometric-Sensor Interaction Evaluation Method: Biometric Performance and Usability Measurements , 2010, IEEE Transactions on Instrumentation and Measurement.

[19]  Rytis Maskeliūnas,et al.  Developing a Calorie Counter Fitness App for Smartphones , 2017, ICIT 2017.

[20]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..