Multi-Factor Authentication Using Spectral Biometrics

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Continuous user authentication using multi-modal biometrics

As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security e particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This p...

متن کامل

Multi-Model Biometrics Authentication System

Multi-model Biometrics authentication system have mainly two authentication process, face identification and signature verification. Facial expressions are a valuable source of information that accompanies facial biometrics. Early detection of physiological and psycho-emotional data from facial expressions is linked to the situational awareness module of any advanced biometric system for person...

متن کامل

User identification and authentication using multi-modal behavioral biometrics

Biometric computer authentication has an advantage over password and access card authentication in that it is based on something you are, which is not easily copied or stolen. One way of performing biometric computer authentication is to use behavioral tendencies associated with how a user interacts with the computer. However, behavioral biometric authentication accuracy rates are worse than mo...

متن کامل

Three-Factor User Authentication Method Using Biometrics Challenge Response

We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...

متن کامل

Secure Remote Authentication Using Biometrics

Biometrics offer a potential source of high-entropy, secret information. Before such datacan be used in cryptographic protocols, however, two issues must be addressed: biometric data(1) are not uniformly distributed, and (2) are not exactly reproducible. Recent work, mostnotably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcomeusing public informati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Japan Society for Fuzzy Theory and Intelligent Informatics

سال: 2007

ISSN: 1881-7203,1347-7986

DOI: 10.3156/jsoft.19.256