System Security by Measuring and Analyzing Biological Data Authentication Modalities

Abstract

 Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.

Authors and Affiliations

Divya Rathi*

Keywords

Related Articles

 A Review of Experimental Study of Spring Back Effect of Aluminum Sheet Metal

 To predict the exact shape, the geometry based punch contact program must be used. The shape changes once the punch is withdrawn, because of the materials elasticity. Prediction of such a spring back effect is a m...

 A Systematic Study of Segmentation Methods

 This paper provides a Systematic study of segmentation methods for detection of kidney tumor using Computed Tomography images. There are large numbers of CT image segmentation algorithms are available, CT image s...

 AN INVESTIGATION OF FACTORS AFFECTING STUDENTS' ACADEMIC ACHIEVEMENT IN THE LIGHT OF THE MULTINOMIAL LOGISTIC MODEL – A CASE STUDY OF THE FACULTY OF SCIENCE AND HUMANITIES AT THADIQ, SHAQRAA UNIVERSITY, KSA

 This paper aimed at studying the factors that affect the academic achievement of students at the Faculty of Sciences and Humanities, Thadiq, Shaqraa University-KSA. Multinomial Logistic Regression (M. Lo.R.) was...

 USING CONTINUOUS SEARCH, SORT AND PAGINATION ANGULAR JAVASCRIPT IN WORDPRESS TO CREATE MEDITIONAL PLANTS DATABASE

 Lot of meditional plant researchers wishes to see details of a variety of species on a single online portal containing most of the required botanical details of that plant at a glance. There are many such exis...

 Cylindrically Symmetric Bulk Viscous Fluid in Bimetric Relativity

 In this paper, cylindrically symmetric space-time is studied with bulk viscous fluid in the context of Rosen’s Bimetric Theory of Relativity. Here it is shown that only vacuum model can be constructed.

Download PDF file
  • EP ID EP143052
  • DOI -
  • Views 56
  • Downloads 0

How To Cite

Divya Rathi* (30).  System Security by Measuring and Analyzing Biological Data Authentication Modalities. International Journal of Engineering Sciences & Research Technology, 3(8), 527-534. https://europub.co.uk/articles/-A-143052