System Security by Measuring and Analyzing Biological Data Authentication Modalities

Abstract

 Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.

Authors and Affiliations

Divya Rathi*

Keywords

Related Articles

 OPTICAL TIME-DOMAIN REFLECTOMETER SCHEDULING IN OPTICS

 With increase in usage of optical fiber for digital data communication which is replacing copper cables. Optical fiber cuts or bends identification with emerging technology is also important, as we cannot dig and...

 DIOXIN - A SUPER TOXIC CHEMICALS SERIOUS, EFFECT ON HUMAN HEALTH

 The name given to the most toxic dioxin family of chemicals with large formed from a proverb Manufacturing, casting or burning plastics containing chlorine and organic chemicals. Shows to get a little more serious...

 Cluster, Non cluster and Full Text Indexing Techniques for Efficient Database

 Data warehouse is the central management system having pool of datasets. The traditional data warehouse was designed in such a manner that it can efficiently manage transactional data which is highly dominated by...

 STUDY OF EFFICIENT MALL BILLING SYSTEM USING TECHNOLOGIES LIKE NEAR FIELD COMMUNICATION & ELECTRONIC DATA CAPTURE

 This research draws upon the pattern of using technologies like Bar Code Reader, Near Field Communication (NFC) Tags, LED’s and Electronic Data Capture (EDC) to reduce the Time Complexities which are being faced b...

GREWIA TILIAEFOLIA BARK EXTRACT AS GREEN INHIBITOR OF MILD STEEL C ORROSION IN SULPHURIC ACID MEDIUM

This paper presents the inhibitory properties of Grewia tiliaefolia bark extract on the corrosion of mild steel in sulphuric acid medium. The corrosion rates and inhibition efficiencies were evaluated by weight lo...

Download PDF file
  • EP ID EP143052
  • DOI -
  • Views 59
  • Downloads 0

How To Cite

Divya Rathi* (30).  System Security by Measuring and Analyzing Biological Data Authentication Modalities. International Journal of Engineering Sciences & Research Technology, 3(8), 527-534. https://europub.co.uk/articles/-A-143052