Soft Biometric Traits for Continuous User Authentication
نویسندگان
چکیده
منابع مشابه
A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources with the initial access permission. To address this security flaw, Continuous authentication of the user is necessary, to continuously monitors and authenti...
متن کاملIntegrating Faces, Fingerprints, and Soft Biometric Traits for User Recognition
Soft biometric traits like gender, age, height, weight, ethnicity, and eye color cannot provide reliable user recognition because they are not distinctive and permanent. However, such ancillary information can complement the identity information provided by the primary biometric traits (face, fingerprint, hand-geometry, iris, etc.). This paper describes a hybrid biometric system that uses face ...
متن کاملBiometric Systems for User Authentication
Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method ...
متن کاملSecure continuous biometric-enhanced authentication
Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication...
متن کاملKeystroke Biometric Systems for User Authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control, although they are gaining popularity. In recent years, keystroke biometric authentication has been an active area of research due to its low cost and ease of integration with existing security systems. Various researchers have used different methods and algorithms for data collection, feature representat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2010
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2010.2075927