Biometric multi?factor authentication: On the usability of the <scp>FingerPIN</scp> scheme
نویسندگان
چکیده
Fingerprint-based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password-based authentication. Despite the usability accuracy this technology, some significant concerns still exist, which can potentially hinder further adoption. For instance, fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric-based To mitigate concern, we previously designed multi-factor approach that integrates Type-1 Type-3 factors into fingerprint-based personal identification number (PIN). authenticate, subject required present sequence fingerprints corresponding digits PIN, based on predefined secret mapping between fingers. We conducted preliminary vulnerability analysis demonstrated robust compromise one or more subject's fingerprints. The objective work presented paper identify any issues for FingerPIN scheme, collect qualitative quantitative data through user study, determine participants' satisfaction mechanism. carried out systematic tests, suitable performance metrics assessing initial cohort 100 individuals, performed comparative scheme against sequential schemes.
منابع مشابه
Multifactor Biometric Sketch Authentication
In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content, which is negotiated between the biometric authentication system and the user during enrollment. The used sketch recognition algorithm is based on the active shape structural model (ASSM) for analyzing the structural varia...
متن کاملMultifactor Biometric Sketch Authentication (@ GI BIOSIG 2003)
In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content, which is negotiated between the biometric authentication system and the user during enrollment. The used sketch recognition algorithm is based on the active shape structural model (ASSM) for analyzing the structural varia...
متن کاملsurvey on the rule of the due & hindering relying on the sheikh ansaris ideas
قاعده مقتضی و مانع در متون فقهی کم و بیش مستند احکام قرار گرفته و مورد مناقشه فقهاء و اصولیین می باشد و مشهور معتقند مقتضی و مانع، قاعده نیست بلکه یکی از مسائل ذیل استصحاب است لذا نگارنده بر آن شد تا پیرامون این قاعده پژوهش جامعی انجام دهد. به عقیده ما مقتضی دارای حیثیت مستقلی است و هر گاه می گوییم مقتضی احراز شد یعنی با ماهیت مستقل خودش محرز گشته و قطعا اقتضاء خود را خواهد داشت مانند نکاح که ...
15 صفحه اولBiometric authentication - security and usability
We would like to outline our opinions about the usability of biometric authentication systems. We outline the position of biometrics in the current field of computer security in the first section of our paper. The second chapter introduces a more systematic view of the process of biometric authentication – a layer model (of the biometric authentication process). The third section discusses the ...
متن کاملthe impact of morphological awareness on the vocabulary development of the iranian efl students
this study investigated the impact of explicit instruction of morphemic analysis and synthesis on the vocabulary development of the students. the participants were 90 junior high school students divided into two experimental groups and one control group. morphological awareness techniques (analysis/synthesis) and conventional techniques were used to teach vocabulary in the experimental groups a...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and privacy
سال: 2022
ISSN: ['2475-6725']
DOI: https://doi.org/10.1002/spy2.261