The Acceptability of Iris-based Authentication for Public Domain: An Instrumental Design

被引:0
|
作者
Jimoh, R. G. [1 ]
Shiratuddin, Norshuhada [1 ]
机构
[1] Univ Utara Malaysia, Coll Arts & Sci, Appl Sci Off, Grad Dept Informat Technol, Sintok 06010, Kedah, Malaysia
关键词
Automated; ubiquitous; iris-base; biometric; authentication; INFORMATION-TECHNOLOGY; USER ACCEPTANCE; MODEL; USAGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Innovations in terms of technology have always been a continuous process since change is constant. The invention of information technology has made all services to be rendered in an automated manner. Doing this, the prominent aim is to make all services ubiquitous i.e removing all barriers in terms of time and location, a good example of this is the Automated Teller Machine (ATM) service where banking-related services is rendered in public places for universal access. The beauty of such opportunity is not without its associated security problems with the conventional Personal Identification Number (PIN) entry system. This led to the suggestion of iris-based biometric authentication to guarantee maximum authentication security in all domains. This paper discusses the development of the quantitative instrument (questionnaire) for measuring user's behavioural intention to use iris-based authentication in public places using Unified Theory of Acceptance and Use of Technology (UTAUT) as the underpinning theory. The reliability of the constructs is also discussed.
引用
收藏
页码:669 / 673
页数:5
相关论文
共 50 条
  • [1] Adoption of Iris-Based Authentication
    Mohammadi, S.
    Kaldi, A.
    [J]. IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 1582 - 1586
  • [2] Accurate iris boundary detection in iris-based biometric authentication process
    Dey, Somnath
    Samanta, Debasis
    [J]. PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2007, 4815 : 600 - 607
  • [3] An Iris-Based Authentication Framework to Prevent Presentation Attacks
    Shahriar, Hossain
    Haddad, Hisham
    Islam, Mahbubul
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 504 - 509
  • [4] Iris-based authentication system with template protection and renewability
    Ercole, Chiara
    Campisi, Patrizio
    Neri, Alessandro
    [J]. OPTICS AND PHOTONICS FOR COUNTERTERRORISM AND CRIME FIGHTING III, 2007, 6741
  • [5] Attacks and Mitigation Techniques for Iris-based Authentication Systems
    Etienne, Laeticia
    Shahriar, Hossain
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1101 - 1102
  • [6] Iris-based continuous authentication in mobile ad hoc network
    Ramkumar, D.
    Annadurai, C.
    Nelson, I
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (08):
  • [7] Design of an Iris-Based Medical Diagnosis System
    Lodin, Adrian
    Demea, Sorina
    [J]. ISSCS 2009: INTERNATIONAL SYMPOSIUM ON SIGNALS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS,, 2009, : 129 - +
  • [8] Iris-based personal authentication using a normalized directional energy feature
    Park, CH
    Lee, JJ
    Smith, MJT
    Park, KH
    [J]. AUDIO-AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 2688 : 224 - 232
  • [9] Iris-based remote user authentication scheme using smart cards
    Sun, Hong-Wei
    Lam, Kwok-Yan
    Gu, Ming
    Sun, Jia-Guang
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 476 - +
  • [10] Fusion of biometric systems using Boolean combination: an application to iris-based authentication
    Granger, Eric
    Khreich, Wael
    Sabourin, Robert
    Gorodnichy, Dmitry O.
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2012, 4 (03) : 291 - 315