Behavioural biometrics authentication tested using EyeWriter technology

被引:0
|
作者
Tait, Bobby L. [1 ]
机构
[1] Univ South Africa UNISA, Dept Comp Sci, Sch Comp, Pretoria, South Africa
关键词
Behavioural Biometrics; Eye tracking; Eye based Authentication; Access control; Eye writer; SECURITY; RECOGNITION; ALGORITHM;
D O I
10.1109/icgs3.2019.8688257
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometric technology progressed over the past number of years from an esoteric technology to technology found in various devices such as smart phones, ATMs, pay points, physical access control mechanisms to name only a few. Behavioural biometrics is in many cases applied to strengthen authentication mechanisms such as passwords or voice recognition. In voice recognition the characteristics from the voice such as the pitch, dynamic range and the harmonics can be used for biometric authentication, but to strengthen the authentication decision, the way the person speaks (intonation) will also be applied to confirm authenticity. In this paper the research findings are presented where 25 candidates used the EyeWriter eye tracking technology to test if the behavioural movement of an individual's eye is unique enough to be used for secure biometric authentication. From the various tests performed during the experimental phase of this re-search, and scrutinized in this paper, the following was found: The behavioural aspect of a person's eye movement can indeed be used for behavioural biometric authentication, specifically if a one-to-one biometric authentication approach is followed. A one to many approach showed a lot of potential for future research, but considering the sample size tested, the results cannot easily be extrapolated to the population.
引用
收藏
页码:105 / 113
页数:9
相关论文
共 50 条
  • [31] Continuous authentication on mobile devices using behavioral biometrics
    Dybczak, Jakub
    Nawrocki, Piotr
    [J]. 2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 1028 - 1035
  • [32] An Improved Authentication System Using Hybrid of Biometrics and Cryptography
    Oluwadamilola, Oyetola K.
    Ayodeji, Okubanjo A.
    Martins, Osifeko O.
    Olufunmi, Sanusi, I
    Rapheal, Abolade O.
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), 2017, : 457 - 463
  • [33] Geometric based remote password authentication using biometrics
    Om, Hari
    Reddy, M. Ramakrishna
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 207 - 220
  • [34] FKP Biometrics for Human Authentication Using Gabor Wavelets
    Hegde, Chetana
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. 2011 IEEE REGION 10 CONFERENCE TENCON 2011, 2011, : 1149 - 1153
  • [35] AUTHENTICATION OF FINGERPRINT BIOMETRICS ACQUIRED USING A CELLPHONE CAMERA: A REVIEW
    Khalil, Mohammed S.
    Kurniawan, Fajri
    Saleem, Kashif
    [J]. INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2013, 11 (05)
  • [36] Cell phones personal authentication systems using multimodal biometrics
    Rokita, Joanna
    Ak, Adam Krzy
    Suen, C. Y.
    [J]. IMAGE ANALYSIS AND RECOGNITION, PROCEEDINGS, 2008, 5112 : 1013 - 1022
  • [37] A study on continuous authentication using a combination of keystroke and mouse biometrics
    Mondal, Soumik
    Bours, Patrick
    [J]. NEUROCOMPUTING, 2017, 230 : 1 - 22
  • [38] Authentication gets personal with biometrics
    Ortega-Garcia, J
    Bigun, J
    Reynolds, D
    Gonzalez-Rodriguez, J
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2004, 21 (02) : 50 - 62
  • [39] Behavioral Biometrics for Continuous Authentication
    Handa, Jigyasa
    Singh, Arjeeta
    Goyal, Aditya
    Aggarwal, Parth
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 284 - 289
  • [40] Heartbeat biometrics for human authentication
    Hegde, Chetana
    Prabhu, H. Rahul
    Sagar, D. S.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2011, 5 (04) : 485 - 493