Multi-Layered Multimodal Biometric Authentication for Smartphone Devices
نویسندگان
چکیده
منابع مشابه
Biometric Authentication for Mobile Devices
Mobile devices have found an important place in modern society, with hundreds of millions currently in use. The majority of these use inherently weak authentication mechanisms, based upon passwords and PINs, which can potentially be compromised and thereby allow attackers access to the device and its stored data. A need for stronger authentication is identified and the discussion considers the ...
متن کاملMulti-modal Behavioural Biometric Authentication for Mobile Devices
The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. Thi...
متن کاملAuthentication Using Multimodal Biometric Features
Multimodal biometric systems is the consolidated multiple biometric sources, which enable the recognition performance better than the single biometric modality systems. The information fusion in a multimodal system can be performed at various levels like data level fusion, feature level fusion, match score level fusion and decision level fusion. In this paper, we have studied the performance of...
متن کاملMultimodal Biometric for Person Authentication by Fusion
A biometric System which relies only on a single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Identification based on multiple biometrics represents an emerging trend. We introduce a multimodal biometric system, which integrates face, ear and fingerprint recognition in making a personal identification. This system takes...
متن کاملMultimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication
Conventional access control solutions rely on a single authentication to verify a user’s identity but do nothing to ensure the authenticated user is indeed the same person using the system afterwards. Without continuous monitoring, unauthorized individuals have an opportunity to “hijack” or “tailgate” the original user’s session. Continuous authentication attempts to remedy this security loopho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Interactive Mobile Technologies (iJIM)
سال: 2020
ISSN: 1865-7923
DOI: 10.3991/ijim.v14i15.15825