System Security by Measuring and Analyzing Biological Data Authentication Modalities
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 8
Abstract
Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.
Authors and Affiliations
Divya Rathi*
ACCELEROMETER BASED DIGITAL PEN FOR HANDWRITTEN DIGIT AND GESTURE RECOGNITION
In the today’s world of fast changing technology, there is also rapid development of computer technology. Human computer interaction commonly known as HCI, technique is one of that which becomes an indispensable c...
Study of Wear Characteristics of AISI D2 Steel
In sheet metal forming, the wear of deforming dies continues to be a great concern to the automotive industry as a result of increasing die maintenance cost and scrap rate. The demand to reduce the use of lubrican...
Secret Sharing Using Visual Cryptography Based on Reversed Images
Visual Cryptography is a new cryptographic technique which allows Visual information (e.g. printed text, picture) to be encrypted in such a way that their decryption can be performed by the human visual system, wi...
RISK ASSESSMENT OF LEAD IN TILAPIA NILOTICA FISH FROM DIFFERENT ENVIRONMENTS OF EGYPT
Lead is among the heavy metals and it is one of the highly toxic metals, which is recognized in most countries. Lead accumulates in fish. The present investigation provides information about the concentrations of...
AN EFFICIENT LEVEL SET METHOD FOR IMAGE SEGMENTATION
Overhere we introduced diffusion term into level set equation for stability of level set function and iteratively solve equation in two steps for quick and better implementation and get required red results. Hence...