Abstract
User authentication is necessary for proving and verifying the claimed identity of users in a distributed environment. Three factors such as user’s knowledge, belongings, and biometric traits are usually considered for the purpose. A sort of multi-factor authentication may combine those factors in the way that a user provides the requested multi-factors separately, for improving the accuracy and security of authentication. However, such a combination of distinct factors should require each different human-computer interfaces. In this short paper, rather we introduce our on-going work to associate knowledge-based authentication with biometrics for requiring less interfaces and examine the benefits expected from it in a conceptual level.
This study was supported in part by the grant of the Seoul R&BD Program.
Chapter PDF
References
von Ahn, L., Blum, M., Hopper, N., Langford, J.: The CAPTCHA Web Page (2000), http://www.captcha.net
von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using Hard AI Problems For Security. In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)
Baird, H., Popat, K.: Human Interactive Proofs and Document Image Analysis. In: Lopresti, D.P., Hu, J., Kashi, R.S. (eds.) DAS 2002. LNCS, vol. 2423, Springer, Heidelberg (2002)
Bign, J., Duc, B., Smeraldi, F., Fischer, S., Makarov, A.: Multi-modal person authentication. In: Proc. of Face Recognition: From Theory to Applications (NATO-ASI Workshop) (1997)
Hopper, N., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)
IEEE P1363-2: Standard specifications for password-based public key cryptographic techniques (December 2002), available from http://grouper.ieee.org/groups/1363
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: One-page abstract appeared in the Proceedings of IEEE Internation Symposium on Information Theory, p. 408. IEEE Press, Lausanne, Switzerland (2002), also available at http://www.rsasecurity.com/rsalabs/staff/
Koreman, J., Morris, A.C., Jassim, S., Sellahewa, H., Chollet, G., Aversano, G., Salicetti, S., Allano, L.: Multi-modal biometric authentication on the SecurePhone PDA. In: Proc. of MMUA workshop on Mult-Modal User Authentication (May 2006)
Kwon, T., Moon, H.: Multi-modal Biometrics with PKI technologies for border control applications. In: Berthold, M.R., Glen, R.C., Diederichs, K., Kohlbacher, O., Fischer, I. (eds.) CompLife 2005. LNCS (LNBI), vol. 3695, p. 99114. Springer, Heidelberg (2005)
Thian, N., Bengio, S.: Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? IDIAP research report. In: Proceeding of 2004 Internation Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2004) vol. 5, pp. 893–896 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, T., Moon, H. (2007). Knowledge-Based User Authentication Associated with Biometrics. In: Stephanidis, C. (eds) Universal Acess in Human Computer Interaction. Coping with Diversity. UAHCI 2007. Lecture Notes in Computer Science, vol 4554. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73279-2_46
Download citation
DOI: https://doi.org/10.1007/978-3-540-73279-2_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73278-5
Online ISBN: 978-3-540-73279-2
eBook Packages: Computer ScienceComputer Science (R0)