Behavioural biometrics authentication tested using EyeWriter technology

被引:0
|
作者
Tait, Bobby L. [1 ]
机构
[1] Univ South Africa UNISA, Dept Comp Sci, Sch Comp, Pretoria, South Africa
关键词
Behavioural Biometrics; Eye tracking; Eye based Authentication; Access control; Eye writer; SECURITY; RECOGNITION; ALGORITHM;
D O I
10.1109/icgs3.2019.8688257
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometric technology progressed over the past number of years from an esoteric technology to technology found in various devices such as smart phones, ATMs, pay points, physical access control mechanisms to name only a few. Behavioural biometrics is in many cases applied to strengthen authentication mechanisms such as passwords or voice recognition. In voice recognition the characteristics from the voice such as the pitch, dynamic range and the harmonics can be used for biometric authentication, but to strengthen the authentication decision, the way the person speaks (intonation) will also be applied to confirm authenticity. In this paper the research findings are presented where 25 candidates used the EyeWriter eye tracking technology to test if the behavioural movement of an individual's eye is unique enough to be used for secure biometric authentication. From the various tests performed during the experimental phase of this re-search, and scrutinized in this paper, the following was found: The behavioural aspect of a person's eye movement can indeed be used for behavioural biometric authentication, specifically if a one-to-one biometric authentication approach is followed. A one to many approach showed a lot of potential for future research, but considering the sample size tested, the results cannot easily be extrapolated to the population.
引用
收藏
页码:105 / 113
页数:9
相关论文
共 50 条
  • [1] Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter
    Tait, Bobby L.
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 348 - 359
  • [2] Context Independent Continuous Authentication using Behavioural Biometrics
    Mondal, Soumik
    Bours, Patrick
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY AND BEHAVIOR ANALYSIS (ISBA), 2015,
  • [3] A Novel Architecture for Continuous Authentication using Behavioural Biometrics
    Oak, Rajvardhan
    Khare, Mrunmayec
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 767 - 771
  • [4] Continuous Authentication Using Behavioural Biometrics: A Step Towards Enhancing Authentication for Distance Learning in Jamaica
    Rodney, Kenique
    Ricketts, Shaneekea
    Mitchell, Leighton
    Thorpe, Sean
    [J]. 2021 7TH INTERNATIONAL CONFERENCE ON ENGINEERING AND EMERGING TECHNOLOGIES (ICEET 2021), 2021, : 810 - 815
  • [5] CyberSignature: A user authentication tool based on behavioural biometrics
    Nnamoko, Nonso
    Korkontzelos, Ioannis
    Barrowclough, Joseph
    Liptrott, Mark
    [J]. SOFTWARE IMPACTS, 2022, 14
  • [6] Behavioural Biometrics for Authentication and Stress Detection - A Case Study with Children
    Azevedo, Ana I.
    Santos, Henrique D.
    Sa, Vitor J.
    Lopes, Nuno V.
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: THE SECURITY CHALLENGES OF THE CONNECTED WORLD, ICGS3 2017, 2016, 630 : 266 - 280
  • [7] Using Gaze for Behavioural Biometrics
    D'Amelio, Alessandro
    Patania, Sabrina
    Bursic, Sathya
    Cuculo, Vittorio
    Boccignone, Giuseppe
    [J]. SENSORS, 2023, 23 (03)
  • [8] Password Authentication using Keystroke Biometrics
    D'Lima, Nathan
    Mittal, Jayashri
    [J]. 2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015,
  • [9] Continuous Authentication Using Behavioral Biometrics
    Deutschmann, Ingo
    Nordstrom, Peder
    Nilsson, Linus
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 12 - 15
  • [10] Seamless Personal Authentication using Biometrics
    Ayeswarya, S.
    Norman, Jasmine
    [J]. 2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,