System Security by Measuring and Analyzing Biological Data Authentication Modalities
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 8
Abstract
Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.
Authors and Affiliations
Divya Rathi*
IMAGE COMPRESSION USING MODIFIED FAST HAAR WAVELET TRANSFORM (MFHWT)
Image compression plays an important role in multimedia applications. It reduces memory requirements for storage of images. The most distinctive feature of Haar Transform lies in the fact that it lends itself...
NI BASED SUPERALLOY: CASTING TECHNOLOGY, METALLURGY, DEVELOPMENT, PROPERTIES AND APPLICATIONS
A superalloy, or high-performance alloy, is an alloy able to withstand extreme temperatures that would destroy conventional metals like steel and aluminum. Nickel based superalloys are selected for use in certain...
A Novel Method of Optimizing Lifetime and Reduction in Power Consumption in Wireless Sensor Network
Optimal power flow (OPF) problem has already been attempted as a static, optimization problem by adopting gradient based methods and more recently, no conventional ones, such as evolutionary algorithms. However,...
OFFLINE SIGNATURE VERIFICATION METHOD OF PARALLEL PROCESSING USING ANGLE FEATURE, PIXEL DENSITY FEATURE , CHAIN CODE AND MIXED FEATURE
Signature recognition by computer processing has been approached as soon as the computer technology gave sufficient power for the implementation of image processing techniques. The research work developed can be...
STUDY THE EFFECT OF TENSILE STRENGTH IN SINGLE SIDED FRICTION STIR WELDING ON AA6063 ALUMINIUM ALLOY
Friction stir welding is a technique in which the work pieces are joined by profits of frictional heating and plastic deformation indeed a temperature below the melting point of the material to be joint. AA6063 is...