System Security by Measuring and Analyzing Biological Data Authentication Modalities
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 8
Abstract
Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.
Authors and Affiliations
Divya Rathi*
A Competitive Assessment on Fly-Ash Bricks and Clay Bricks in Central Gujarat Region of India Using Chi-Square Test(χ2) through SPSS Software
Fly-ash bricks are well known bricks. Fly-ash bricks are slow but surely replacing conventional clay bricks for wall constructions. It is green and environmentally friendly material. Fly ash brick is a really good...
MEASUREMENT OF INTERNAL CONVERSION COEFFICIENT Of 280kev γ – RAYS IN 203Hg
The measurement of the internal conversion coefficient of 280keV γ – ray in 203HG have been investigated by means of calibrated 2ʺ x 2ʺ NaI(Tl)(scintillation detector which is sodium iodide activated with smal...
Electing the Query Directory Using PSO in DCIM
In MANET environments, data caching is essential because it increases the ability of mobile devices to access desired data, and to improve overall system performance. We propose a distributed cache invalidation m...
DOMAIN SPECIFIC APPROACH FOR WEBLOG MINING
Web mining is the application of data mining, chart technology, artificial intelligence and so on to the web data and identifies user’s visiting behaviors and extracts their interests using patterns. It extract th...
Vibration Analysis of Laminated Composite Plates with Holes
Fiber reinforced composite materials are widely used in variety of engineering applications due to its superior properties than the conventional materials. In this investigation free vibration analysis of four lay...