System Security by Measuring and Analyzing Biological Data Authentication Modalities
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : Divya Rathi; Anu Rathi; Aditya Kumar;
Page : 527-534
Keywords : Authentication; biometric; usability; gesture.;
Abstract
Most biometric verification systems are done based on knowledge base and token based identification these fingerprint, facial features , iris of the eye, voice print and so on- that cannot be readily imitated or forged by others We examine three biometric authentication modalities ? voice, face and gesture as well as password entry, on a system, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.
Other Latest Articles
- SERVICE QUALITY AND CONSUMER SATISFACTION: THE COMMONALITY AND DISTINCTION OF CONCEPTS
- Subsurface Structural Mapping for Groundwater Resource Development of a Part of Tudun-Fulani North- Central Nigeria Using Radial Vertical Electrical Sounding Technique
- THE APPLICATION OF FOREIGN PRACTICES OF TAX CONTROL
- Implementation of Command Transfer Protocol for Cluster in Networking
- Multi bit Error Detection and Correction Architecture for Motion Estimation in Viedo Coding Systmes
Last modified: 2014-09-03 17:14:01