Multi-Factor Authentication Using Spectral Biometrics
نویسندگان
چکیده
منابع مشابه
Continuous user authentication using multi-modal biometrics
As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security e particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This p...
متن کاملMulti-Model Biometrics Authentication System
Multi-model Biometrics authentication system have mainly two authentication process, face identification and signature verification. Facial expressions are a valuable source of information that accompanies facial biometrics. Early detection of physiological and psycho-emotional data from facial expressions is linked to the situational awareness module of any advanced biometric system for person...
متن کاملUser identification and authentication using multi-modal behavioral biometrics
Biometric computer authentication has an advantage over password and access card authentication in that it is based on something you are, which is not easily copied or stolen. One way of performing biometric computer authentication is to use behavioral tendencies associated with how a user interacts with the computer. However, behavioral biometric authentication accuracy rates are worse than mo...
متن کاملThree-Factor User Authentication Method Using Biometrics Challenge Response
We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...
متن کاملSecure Remote Authentication Using Biometrics
Biometrics offer a potential source of high-entropy, secret information. Before such datacan be used in cryptographic protocols, however, two issues must be addressed: biometric data(1) are not uniformly distributed, and (2) are not exactly reproducible. Recent work, mostnotably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcomeusing public informati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
سال: 2007
ISSN: 1881-7203,1347-7986
DOI: 10.3156/jsoft.19.256