Behavioural biometrics authentication tested using EyeWriter technology

被引:0
|
作者
Tait, Bobby L. [1 ]
机构
[1] Univ South Africa UNISA, Dept Comp Sci, Sch Comp, Pretoria, South Africa
关键词
Behavioural Biometrics; Eye tracking; Eye based Authentication; Access control; Eye writer; SECURITY; RECOGNITION; ALGORITHM;
D O I
10.1109/icgs3.2019.8688257
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometric technology progressed over the past number of years from an esoteric technology to technology found in various devices such as smart phones, ATMs, pay points, physical access control mechanisms to name only a few. Behavioural biometrics is in many cases applied to strengthen authentication mechanisms such as passwords or voice recognition. In voice recognition the characteristics from the voice such as the pitch, dynamic range and the harmonics can be used for biometric authentication, but to strengthen the authentication decision, the way the person speaks (intonation) will also be applied to confirm authenticity. In this paper the research findings are presented where 25 candidates used the EyeWriter eye tracking technology to test if the behavioural movement of an individual's eye is unique enough to be used for secure biometric authentication. From the various tests performed during the experimental phase of this re-search, and scrutinized in this paper, the following was found: The behavioural aspect of a person's eye movement can indeed be used for behavioural biometric authentication, specifically if a one-to-one biometric authentication approach is followed. A one to many approach showed a lot of potential for future research, but considering the sample size tested, the results cannot easily be extrapolated to the population.
引用
收藏
页码:105 / 113
页数:9
相关论文
共 50 条
  • [21] Authentication Using Pulse-Response Biometrics
    Rasmussen, Kasper B.
    Roeschlin, Marc
    Martinovic, Ivan
    Tsudik, Gene
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [22] A Robust Authentication System Using Multiple Biometrics
    Monwar, Md. Maruf
    Gavrilova, Marina
    [J]. COMPUTER AND INFORMATION SCIENCE, 2008, 131 : 189 - 201
  • [23] Continuous authentication using biometrics: An advanced review
    Dahia, Gabriel
    Jesus, Leone
    Pamplona Segundo, Mauricio
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 10 (04)
  • [24] Authentication of Smartphone Users Using Behavioral Biometrics
    Alzubaidi, Abdulaziz
    Kalita, Jugal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1998 - 2026
  • [25] Behavioural biometrics using electricity load profiles
    Bicego, M.
    Recchia, F.
    Farinelli, A.
    Ramchurn, S. D.
    Grosso, E.
    [J]. 2014 22ND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2014, : 1764 - 1769
  • [26] An Approach for Secure Identification and Authentication for Biometrics using Iris
    Patil, Chandrashekar M.
    Gowda, Sushmitha
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 421 - 424
  • [27] Behavioural biometrics in action
    Bhattacharya N.
    [J]. Biometric Technology Today, 2020, 2020 (10) : 8 - 11
  • [28] Online Student Authentication and Proctoring System Based on Multimodal Biometrics Technology
    Labayen, Mikel
    Vea, Ricardo
    Florez, Julian
    Aginako, Naiara
    Sierra, Basilio
    [J]. IEEE ACCESS, 2021, 9 : 72398 - 72411
  • [29] Behavioral Biometrics Authentication Using Gesture-Based
    Alariki, Ala Abdulhakim
    Manaf, Azizah Abdul
    [J]. ADVANCED SCIENCE LETTERS, 2014, 20 (02) : 492 - 495
  • [30] Authentication of Facial Images with Masks Using Periocular Biometrics
    Han, Na Yeon
    Seong, Si Won
    Ryu, Jihye
    Hwang, Hyeonsang
    Joung, Jinoo
    Lee, Jeeghang
    Lee, Eui Chul
    [J]. INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2020, PT II, 2021, 12616 : 326 - 334