Behavioural Authentication Using Computer Games
نویسندگان
چکیده
Biometric mechanisms of authentication are becoming a popular approach to securing computer systems, networks and other critical resources. This paper proposes a behavioural authentication system based on user interaction with computer games. Literature about current physical and behavioural biometric methods is reviewed and game based authentication design and implementation issues are discussed. Some common biometric data analysis measures are introduced and reviewed. KeywordsBehavioural Authentication; Biometric Authentication; Identification; Access Control.
منابع مشابه
The Relationship Between Tendency to Computer Games and the Mental Health of Junior High School Students of Shahr-e Kord, Iran
Background and aims: Given that computer games have positive and negative functions and mayaffect the mental health of individuals, the present research aimed to study the relationship betweenthe tendency to playing computer games and the mental health of junior high school students inShahr-e Kord.Methods: The current cross-sectional descriptive-analytical study was cond...
متن کاملComparing the Social Skills of Students Addicted to Computer Games with Normal Students
Background: This study aimed to investigate and compare the social skills of students addicted to computer games with normal students. The dependent variable in the present study is the social skills. Methods: The study population included all the students in the second grade of public secondary school in the city of Isfahan at the educational year of 2009-2010. The sample size included 564 stu...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملAssessment of Children’s Experiences of Playing Computer Games: A Phenomenological Approach
Introduction: Due to the Attraction and enormous diversity of computer games, children and adolescents allocate a notable part of their time and energy to play these games. This necessitates the study of their Advantages and disadvantages. Therefore, the aim of this study was to represent the outcomes of playing computer games in the fourth grade students. Method: This is a qualitative and phe...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کامل