System Security by Measuring and Analyzing Biological Data Authentication Modalities

Abstract

 Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteristicsfingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities – voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.

Authors and Affiliations

Divya Rathi*

Keywords

Related Articles

 A Review - Various Segmentation Techniques for Brain Tumor Detection

 In the analysis of medical images for computer-aided diagnosis and treatment, segmentation is required as a primary stage. Medical image segmentation is a complex and challenging task due to the intrinsic nature o...

STEGANOGRAPHY IMAGE IN COLOR IMAGE USING WAVELET TRANSFORM

The Discrete Wavelet Transform is a relatively recent and computationally efficient technique in computer. The w avelet analysis is advantageous as it performs loca l analysis and multi - resolution analysis s...

 Trajectory Anonymity for Privacy in Location

 The rapid development of location based services i.e. Navigation has enabled tracking of user more ever before and the tracking has increased. These technologies provide the services based on the geographical loc...

 OFFLINE SIGNATURE VERIFICATION METHOD OF PARALLEL PROCESSING USING ANGLE FEATURE, PIXEL DENSITY FEATURE , CHAIN CODE AND MIXED FEATURE

 Signature recognition by computer processing has been approached as soon as the computer technology gave sufficient power for the implementation of image processing techniques. The research work developed can be...

 EXPERIMENTAL STUDY ON THE FLEXURAL BEHAVIOR OF E-WASTE PLASTICS IN CONCRETE

 In this experimental work, the behaviour of shredded waste plastic (Bakelite) in concrete as partial replacement for aggregates is investigated. The percentage of replacement carried out in this work were 2%, 4%,...

Download PDF file
  • EP ID EP143052
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

Divya Rathi* (30).  System Security by Measuring and Analyzing Biological Data Authentication Modalities. International Journal of Engineering Sciences & Research Technology, 3(8), 527-534. https://europub.co.uk./articles/-A-143052