skip to main content
10.1145/3093293.3093296acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbbtConference Proceedingsconference-collections
research-article

Behavioral Fingerprint Authentication: The Next Future

Published:14 May 2017Publication History

ABSTRACT

In any commercial applications, users need a secure model to protect their transactions. The behavioral biometric such as voice and signature is dynamic, naturally involves cognitive experience and controlled by human beings. This could be seen when user changes their signature or voice given different situations. As a result, users would be more convinced to use behavioral biometric for authentication against fingerprint, which is physiological and static. Fingerprint biometric stemmed from a number of predicaments with prove of stolen, artificial and cut-off finger cases. The dilemma to use either behavioral or physiological biometric delves in as the accuracy of behavioral biometric is not as reliable as physiological biometric. The physiological biometric such as fingerprint and iris recognition are unique and cannot be mimicked by others easily. In addressing this gap, an authentication framework combines a unique physiological fingerprint and permutated sequence, known as behavioral fingerprint is proposed in this paper. Behavioral fingerprint authentication serves as a firewall to block or delay unauthorized access to a security system if user's fingerprint was lost or compromised.

References

  1. Ali, M. L., Monaco, J. V., Tappert, C. C. and Qiu, M. 2016. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems. 86, 2 (Mar. 2016), 175--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Wang, G., Zhao, D. and Sun, X. 2015. Minutiae-based Triangular Acreage Fingerprint Match Method. International Journal of Security and Its Applications. 9, 6(June 2015), 71--78.Google ScholarGoogle Scholar
  3. Costigan, N. 2015. Behavioral biometrics: The password you can't forget. DOI= https://www.helpnetsecurity.com/2015/03/26/behavioral-biometrics-the-password-you-cant-forget/.Google ScholarGoogle Scholar
  4. Uz, T., Bebis, G., Erol, A. and Prabhakar, S. 2007. Minutiae-Based Template Synthesis and Matching Using Hierarchical Delaunay Triangulations. International Conference on Biometrics: Theory, Applications and Systems. (Sept. 2007).Google ScholarGoogle Scholar
  5. Teoh, A. B. J., Goh, A. and Ngo, D. C. L. 2006. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28, 12(Oct. 2006), 1892--1901. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Peterson, A. 2015. OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought. DOI= https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/?utm_term=.9f0343804b40.Google ScholarGoogle Scholar
  7. McGoogan, C., and Demetriou, D. 2017. Peace sign selfies could let hackers copy your fingerprints. DOI= http://www.telegraph.co.uk/technology/2017/01/12/peace-sign-selfies-could-let-hackers-copy-fingerprints/.Google ScholarGoogle Scholar
  8. Feng, J., Jain, A. and Ross, A. 2009. Fingerprint Alteration. MSU Technical Report, MSU-CSE-09-30, (Dec 2009) DOI= http://www.cse.msu.edu/~rossarun/pubs/FengJainRoss_AlteredFingerprint_TechReport09.pdfGoogle ScholarGoogle Scholar
  9. Kent, J. 2005. Malaysia car thieves steal finger. DOI= http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm.Google ScholarGoogle Scholar
  10. Kaplan, E. I. 2013. Tackling the Password Problem: Image-and Gesture-Based Alternatives to Alphanumeric Passwords. Journal Information Security Journal: A Global Perspective archive. 22, 4(Nov. 2013), 180--186, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lawrence O. G. 2003. Comparing Passwords, Tokens, and Biometrics for User Authentication. In Proceedings of the IEEE, 91, 12(Dec. 2003), 2019--2040.Google ScholarGoogle Scholar
  12. Shanmugapriya, D., and Padmavathi, G. 2009. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges. International Journal of Computer Science and Information Security. 5, 1 (Sept. 2009), 115--119. DOI=https://arxiv.org/abs/0910.0817Google ScholarGoogle Scholar
  13. Y. Wu. 2014. Research on E-commerce Security based on Risk Management Perspective. International Journal on Security and its Application, 8, 3 (May 2014), 152--162.Google ScholarGoogle Scholar
  14. Idrus, S. Z. S., Cherrier, E., Rosenberger, C. and Schwartzmann, J. A. 2013. Review on Authentication Methods. Australian Journal of Basic and Applied Sciences, 7, 5(June 2013), pp. 95--107. DOI= https://hal.archives-ouvertes.fr/hal-00912435.Google ScholarGoogle Scholar
  15. Sarode, N. S., Patil, A. M. 2014. Review of Iris Recognition: An evolving Biometrics Identification Technology. International Journal of Innovative Science and Modern Engineering. 2, 10(Sept. 2014), 34--40. DOI= http://www.batman.edu.tr/Files/Scientific/f39d093b-e5f0-42e2-9599-3402f7ffeaab.pdfGoogle ScholarGoogle Scholar
  16. Jafri, R and Arabnia, H. R. 2009. A Survey of Face Recognition Techniques. Journal of Information Processing Systems, 5, 2(June 2009), 41--67.Google ScholarGoogle ScholarCross RefCross Ref
  17. Daugman, J. 1993. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15, 11(Nov 1993), 1148--1161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ma, Li., Tan. T., Wang, Y. L. and Zhang, D. 2004. I Personal Identification Based on Iris Texture Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 12(Jan. 2004), 1519--1533. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hong, L. and Jain, A. K. 1998. Integrating Faces and Fingerprints. IEEE Trans. Pattern Anal. Machine Intelligence. 20, 12(Dec. 1998), 1295--1307. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hossain, S. M. E. and Chetty, G. 2011. Human Identity Verification by Using Physiological and Behavioural Biometric Traits. International Journal of Bioscience, Biochemistry and Bioinformatics, 1, 3(Jan. 2011), 199--205.Google ScholarGoogle Scholar
  21. Khare, K., Rautji, S. and Gaur, D. 2013. Behavioural Biometrics and Cognitive Security Authentication Comparison Study. Advanced Computing An International Journal (ACIJ). 4, 6 (Nov. 2013), 15--24. DOI= http://airccse.org/journal/acij/papers/4613acij02.pdfGoogle ScholarGoogle Scholar
  22. Neal, T. J. and Woodard, D. L. 2016. Surveying Biometric Authentication for Mobile Device Security. Journal of Pattern Recognition Research 1, 74--110. DOI= http://jprr.org/index.php/jprr/article/view/764/246Google ScholarGoogle ScholarCross RefCross Ref
  23. Yu, Z., Liang, H., Fleming, C. and Man, K. L. 2016. An Exploration of Usable Authentication Mechanism for Virtual Reality System. 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 458--460.Google ScholarGoogle Scholar
  24. Paul A. G., James L. F, Elaine M. N., Ray A. P., Andrew R. R., William E. B., Justin P. R.2017. DRAFT NIST Special Publication 800-63B Digital Identity Guidelines. National Institute of Standards and Technology Special Publication 800-63B, DOI= https://pages.nist.gov/800-63-3/sp800-63b.htmlGoogle ScholarGoogle Scholar
  25. Edgar, R. C. 2004. MUSCLE: multiple sequence alignment with high accuracy and high throughput. Nucleic Acids Research, 32, 5 (Mar. 2004), 1792--1797.Google ScholarGoogle ScholarCross RefCross Ref
  26. Larry, L. J. 1978. On Interpreting the Effects of Repetition: Solving a Problem Versus Remembering a Solution. Journal of Verbal Learning and Verbal Behavior I7, 649--667.Google ScholarGoogle Scholar

Index Terms

  1. Behavioral Fingerprint Authentication: The Next Future

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBBT '17: Proceedings of the 9th International Conference on Bioinformatics and Biomedical Technology
      May 2017
      123 pages
      ISBN:9781450348799
      DOI:10.1145/3093293

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 May 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader