Behavioral Fingerprint Authentication
- 14 May 2017
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 9th International Conference on Computer and Automation Engineering - ICCAE '17
Abstract
In any commercial applications, users need a secure model to protect their transactions. The behavioral biometric such as voice and signature is dynamic, naturally involves cognitive experience and controlled by human beings. This could be seen when user changes their signature or voice given different situations. As a result, users would be more convinced to use behavioral biometric for authentication against fingerprint, which is physiological and static. Fingerprint biometric stemmed from a number of predicaments with prove of stolen, artificial and cut-off finger cases. The dilemma to use either behavioral or physiological biometric delves in as the accuracy of behavioral biometric is not as reliable as physiological biometric. The physiological biometric such as fingerprint and iris recognition are unique and cannot be mimicked by others easily. In addressing this gap, an authentication framework combines a unique physiological fingerprint and permutated sequence, known as behavioral fingerprint is proposed in this paper. Behavioral fingerprint authentication serves as a firewall to block or delay unauthorized access to a security system if user's fingerprint was lost or compromised.Keywords
This publication has 17 references indexed in Scilit:
- Minutiae-based Triangular Acreage Fingerprint Match MethodInternational Journal of Security and Its Applications, 2015
- Behavioural Biometrics and Cognitive Security Authentication Comparison StudyAdvanced Computing: An International Journal, 2013
- Tackling the Password Problem: Image- and Gesture-Based Alternatives to Alphanumeric PasswordsInformation Security Journal: A Global Perspective, 2013
- Human Identity Verification by Using Physiological and Behavioural Biometric TraitsInternational Journal of Bioscience, Biochemistry and Bioinformatics, 2011
- A Survey of Face Recognition TechniquesJournal of Information Processing Systems, 2009
- MUSCLE: multiple sequence alignment with high accuracy and high throughputNucleic Acids Research, 2004
- Comparing passwords, tokens, and biometrics for user authenticationProceedings of the IEEE, 2003
- Integrating faces and fingerprints for personal identificationIEEE Transactions on Pattern Analysis and Machine Intelligence, 1998
- High confidence visual recognition of persons by a test of statistical independenceIEEE Transactions on Pattern Analysis and Machine Intelligence, 1993
- On interpreting the effects of repetition: Solving a problem versus remembering a solutionJournal of Verbal Learning and Verbal Behavior, 1978