Toward reliable user authentication through biometrics

被引:39
|
作者
Matyáš Jr., Václav [1 ,2 ]
Říha, Zdeněk [1 ]
机构
[1] Masaryk University, Brno
[2] Faculty of Informatics, Masaryk University, Brno, Czech Republic
来源
IEEE Security and Privacy | 2003年 / 1卷 / 03期
关键词
Algorithms - Computer systems - Computer workstations - Data acquisition - Database systems - DNA - Network protocols - Physiology - Problem solving - Public policy - Security of data - Sensors - User interfaces;
D O I
10.1109/MSECP.2003.1203221
中图分类号
学科分类号
摘要
Various aspects of biometric authentication are discussed. Biometrics are automated method of authentication based on measurable human physiological and behavioural characteristics such as a fingerprint, iris pattern or voice sample. Biometric systems can function in two modes which include identity verification and identification. Biometric characteristics are essentially permanent and unchangeable, thus users can not pass them to other users as easily as they do cards of passwords.
引用
收藏
页码:45 / 49
相关论文
共 50 条
  • [31] Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems
    Riley, Chris
    Johnson, Graham
    McCracken, Heather
    Al-Saffar, Ahmed
    HUMAN-COMPUTER INTERACTION - INTERACT 2009, PT II, PROCEEDINGS, 2009, 5727 : 293 - 305
  • [32] Research on User Safety Authentication Based on Biometrics in Cloud Manufacturing
    Xie, Xiaolan
    Zhou, Xiao
    Liu, Yarong
    ADVANCED HYBRID INFORMATION PROCESSING, 2018, 219 : 50 - 55
  • [33] Continuous user authentication on smartphone via behavioral biometrics: a survey
    Praveen Kumar Rayani
    Suvamoy Changder
    Multimedia Tools and Applications, 2023, 82 : 1633 - 1667
  • [34] Behavioral biometrics & continuous user authentication on mobile devices: A survey
    Stylios, Ioannis
    Kokolakis, Spyros
    Thanou, Olga
    Chatzis, Sotirios
    INFORMATION FUSION, 2021, 66 : 76 - 99
  • [35] Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication
    Lohr, Dillon
    Komogortsev, Oleg, V
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3151 - 3164
  • [36] EDITH : ECG Biometrics Aided by Deep Learning for Reliable Individual Authentication
    Ibtehaz, Nabil
    Chowdhury, Muhammad E. H.
    Khandakar, Amith
    Kiranyaz, Serkan
    Rahman, M. Sohel
    Tahir, Anas
    Qiblawey, Yazan
    Rahman, Tawsifur
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (04): : 928 - 940
  • [37] Remote User Authentication Scheme A comparative analysis and improved behavioral biometrics based authentication scheme
    Kumar, Pramod
    Rauthan, Manmohan Singh
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 311 - 313
  • [38] A broad review on non-intrusive active user authentication in biometrics
    Thomas, Princy Ann
    Preetha Mathew, K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (1) : 339 - 360
  • [39] A secure framework for enhancing user authentication in cloud environment using Biometrics
    Kathrine, G. Jaspher Willsie
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 283 - 287
  • [40] SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics
    Riaz, Rabia
    Gillani, Noor-ul-Ain
    Rizvi, SanamShahla
    Shokat, Sana
    Kwon, Se Jin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019