System Security by Measuring and Analyzing Biological Data Authentication Modalities

Abstract

 Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.

Authors and Affiliations

Divya Rathi*

Keywords

Related Articles

 A STUDY ON BRAIN–MACHINE INTERFACE (BMI)

 A brain–machine interface (BMI), sometimes called a mind-machine interface (MMI), or sometimes called a direct neural interface (DNI), synthetic telepathy interface (STI) or a brain–machine interface (BMI), is a d...

 Simulation of Technical Systems on the basis of Vector Optimization (2. with a Criterion Priority)

 The new methodology of modeling of the technical system (TS) which model is presented by the vector problem of mathematical programming (VPMP) is presented. The technique of an assessment and choice of necessary...

 Achieving Efficient Security and less Energy Consumption using Node Energy in WSN

 Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status Designing cost-efficient, secure network protocols for Wireles...

 EMOTIONAL MANIPULATION WITH THE HELP OF EMOTIONAL RECOGNITION-A SURVEY

 It is a rule written by government that robots can kill others to save their kinds. So, a robot should know how to decide who is its enemy and who is its friend. It should feel the emotion of love or hate. We...

Download PDF file
  • EP ID EP143052
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

Divya Rathi* (30).  System Security by Measuring and Analyzing Biological Data Authentication Modalities. International Journal of Engineering Sciences & Research Technology, 3(8), 527-534. https://europub.co.uk/articles/-A-143052