Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
نویسندگان
چکیده
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in diverse fields. It ensures actual presence of biometric entity of a person in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem. Also in the previous work they use face and dress color as hard and soft biometric traits. The major drawback of the existing continuous authentication system is, it is able to successfully authenticate the user continuously with high tolerance to the user posture. So, to overcome this drawback and improve the systems robustness against illumination changes and cluttered background, in this paper we use additional biometric traits which are mole, ornament details and face dimensions in addition to the dress color and face color. Also, we extend it to the online exam application. That is, continuously monitoring of a person in an online exam is proposed employing hard biometric like facial recognition and soft biometrics. Modified PCA (Principal Component Analysis) is employed here for the facial recognition part. Both the hard biometric (face) and soft biometrics is fused with the help of optimization algorithm based similarity technique. Finally the authentication is performed and evaluated using standard evaluation metrics. The technique is implemented in MATLAB and will be compared to prominent existing techniques.
منابع مشابه
Towards a Framework of Biometric Exam Authentication in E-Learning Environments
In the past fifteen years the use of Internet technologies has been substantially growing for delivery of educational content. E-learning environments have been incorporated in many universities for the delivery of e-learning courses. However, opponents of e-learning claim that a central disadvantage of such teaching medium is the growing unethical conduct in such environments. In particular, o...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملSecurity Analysis of Password Hardened Multimodal Biometric Fuzzy Vault
Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...
متن کاملProposed Multi-Modal Palm Veins-Face Biometric Authentication
Biometric authentication technology identifies people by their unique biological information. An account holder’s body characteristics or behaviors are registered in a database and then compared with others who may try to access that account to see if the attempt is legitimate. Since veins are internal to the human body, its information is hard to duplicate. Compared with a finger or the back o...
متن کاملPassword Hardened Multimodal Biometric Fuzzy Vault with Feature Points Extracted from Retina and Iris
Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016