System Security by Measuring and Analyzing Biological Data Authentication Modalities

Abstract

 Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.

Authors and Affiliations

Divya Rathi*

Keywords

Related Articles

 A Competitive Assessment on Fly-Ash Bricks and Clay Bricks in Central Gujarat Region of India Using Chi-Square Test(χ2) through SPSS Software

 Fly-ash bricks are well known bricks. Fly-ash bricks are slow but surely replacing conventional clay bricks for wall constructions. It is green and environmentally friendly material. Fly ash brick is a really good...

 MEASUREMENT OF INTERNAL CONVERSION COEFFICIENT Of 280kev γ – RAYS IN 203Hg

 The measurement of the internal conversion coefficient of 280keV γ – ray in 203HG have been investigated by means of calibrated 2ʺ x 2ʺ NaI(Tl)(scintillation detector which is sodium iodide activated with smal...

 Electing the Query Directory Using PSO in DCIM

 In MANET environments, data caching is essential because it increases the ability of mobile devices to access desired data, and to improve overall system performance. We propose a distributed cache invalidation m...

 DOMAIN SPECIFIC APPROACH FOR WEBLOG MINING

 Web mining is the application of data mining, chart technology, artificial intelligence and so on to the web data and identifies user’s visiting behaviors and extracts their interests using patterns. It extract th...

 Vibration Analysis of Laminated Composite Plates with Holes

 Fiber reinforced composite materials are widely used in variety of engineering applications due to its superior properties than the conventional materials. In this investigation free vibration analysis of four lay...

Download PDF file
  • EP ID EP143052
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

Divya Rathi* (30).  System Security by Measuring and Analyzing Biological Data Authentication Modalities. International Journal of Engineering Sciences & Research Technology, 3(8), 527-534. https://europub.co.uk/articles/-A-143052