ABSTRACT
In any commercial applications, users need a secure model to protect their transactions. The behavioral biometric such as voice and signature is dynamic, naturally involves cognitive experience and controlled by human beings. This could be seen when user changes their signature or voice given different situations. As a result, users would be more convinced to use behavioral biometric for authentication against fingerprint, which is physiological and static. Fingerprint biometric stemmed from a number of predicaments with prove of stolen, artificial and cut-off finger cases. The dilemma to use either behavioral or physiological biometric delves in as the accuracy of behavioral biometric is not as reliable as physiological biometric. The physiological biometric such as fingerprint and iris recognition are unique and cannot be mimicked by others easily. In addressing this gap, an authentication framework combines a unique physiological fingerprint and permutated sequence, known as behavioral fingerprint is proposed in this paper. Behavioral fingerprint authentication serves as a firewall to block or delay unauthorized access to a security system if user's fingerprint was lost or compromised.
- Ali, M. L., Monaco, J. V., Tappert, C. C. and Qiu, M. 2016. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems. 86, 2 (Mar. 2016), 175--190. Google ScholarDigital Library
- Wang, G., Zhao, D. and Sun, X. 2015. Minutiae-based Triangular Acreage Fingerprint Match Method. International Journal of Security and Its Applications. 9, 6(June 2015), 71--78.Google Scholar
- Costigan, N. 2015. Behavioral biometrics: The password you can't forget. DOI= https://www.helpnetsecurity.com/2015/03/26/behavioral-biometrics-the-password-you-cant-forget/.Google Scholar
- Uz, T., Bebis, G., Erol, A. and Prabhakar, S. 2007. Minutiae-Based Template Synthesis and Matching Using Hierarchical Delaunay Triangulations. International Conference on Biometrics: Theory, Applications and Systems. (Sept. 2007).Google Scholar
- Teoh, A. B. J., Goh, A. and Ngo, D. C. L. 2006. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28, 12(Oct. 2006), 1892--1901. Google ScholarDigital Library
- Peterson, A. 2015. OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought. DOI= https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/?utm_term=.9f0343804b40.Google Scholar
- McGoogan, C., and Demetriou, D. 2017. Peace sign selfies could let hackers copy your fingerprints. DOI= http://www.telegraph.co.uk/technology/2017/01/12/peace-sign-selfies-could-let-hackers-copy-fingerprints/.Google Scholar
- Feng, J., Jain, A. and Ross, A. 2009. Fingerprint Alteration. MSU Technical Report, MSU-CSE-09-30, (Dec 2009) DOI= http://www.cse.msu.edu/~rossarun/pubs/FengJainRoss_AlteredFingerprint_TechReport09.pdfGoogle Scholar
- Kent, J. 2005. Malaysia car thieves steal finger. DOI= http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm.Google Scholar
- Kaplan, E. I. 2013. Tackling the Password Problem: Image-and Gesture-Based Alternatives to Alphanumeric Passwords. Journal Information Security Journal: A Global Perspective archive. 22, 4(Nov. 2013), 180--186, 2013. Google ScholarDigital Library
- Lawrence O. G. 2003. Comparing Passwords, Tokens, and Biometrics for User Authentication. In Proceedings of the IEEE, 91, 12(Dec. 2003), 2019--2040.Google Scholar
- Shanmugapriya, D., and Padmavathi, G. 2009. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges. International Journal of Computer Science and Information Security. 5, 1 (Sept. 2009), 115--119. DOI=https://arxiv.org/abs/0910.0817Google Scholar
- Y. Wu. 2014. Research on E-commerce Security based on Risk Management Perspective. International Journal on Security and its Application, 8, 3 (May 2014), 152--162.Google Scholar
- Idrus, S. Z. S., Cherrier, E., Rosenberger, C. and Schwartzmann, J. A. 2013. Review on Authentication Methods. Australian Journal of Basic and Applied Sciences, 7, 5(June 2013), pp. 95--107. DOI= https://hal.archives-ouvertes.fr/hal-00912435.Google Scholar
- Sarode, N. S., Patil, A. M. 2014. Review of Iris Recognition: An evolving Biometrics Identification Technology. International Journal of Innovative Science and Modern Engineering. 2, 10(Sept. 2014), 34--40. DOI= http://www.batman.edu.tr/Files/Scientific/f39d093b-e5f0-42e2-9599-3402f7ffeaab.pdfGoogle Scholar
- Jafri, R and Arabnia, H. R. 2009. A Survey of Face Recognition Techniques. Journal of Information Processing Systems, 5, 2(June 2009), 41--67.Google ScholarCross Ref
- Daugman, J. 1993. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15, 11(Nov 1993), 1148--1161. Google ScholarDigital Library
- Ma, Li., Tan. T., Wang, Y. L. and Zhang, D. 2004. I Personal Identification Based on Iris Texture Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 12(Jan. 2004), 1519--1533. Google ScholarDigital Library
- Hong, L. and Jain, A. K. 1998. Integrating Faces and Fingerprints. IEEE Trans. Pattern Anal. Machine Intelligence. 20, 12(Dec. 1998), 1295--1307. Google ScholarDigital Library
- Hossain, S. M. E. and Chetty, G. 2011. Human Identity Verification by Using Physiological and Behavioural Biometric Traits. International Journal of Bioscience, Biochemistry and Bioinformatics, 1, 3(Jan. 2011), 199--205.Google Scholar
- Khare, K., Rautji, S. and Gaur, D. 2013. Behavioural Biometrics and Cognitive Security Authentication Comparison Study. Advanced Computing An International Journal (ACIJ). 4, 6 (Nov. 2013), 15--24. DOI= http://airccse.org/journal/acij/papers/4613acij02.pdfGoogle Scholar
- Neal, T. J. and Woodard, D. L. 2016. Surveying Biometric Authentication for Mobile Device Security. Journal of Pattern Recognition Research 1, 74--110. DOI= http://jprr.org/index.php/jprr/article/view/764/246Google ScholarCross Ref
- Yu, Z., Liang, H., Fleming, C. and Man, K. L. 2016. An Exploration of Usable Authentication Mechanism for Virtual Reality System. 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 458--460.Google Scholar
- Paul A. G., James L. F, Elaine M. N., Ray A. P., Andrew R. R., William E. B., Justin P. R.2017. DRAFT NIST Special Publication 800-63B Digital Identity Guidelines. National Institute of Standards and Technology Special Publication 800-63B, DOI= https://pages.nist.gov/800-63-3/sp800-63b.htmlGoogle Scholar
- Edgar, R. C. 2004. MUSCLE: multiple sequence alignment with high accuracy and high throughput. Nucleic Acids Research, 32, 5 (Mar. 2004), 1792--1797.Google ScholarCross Ref
- Larry, L. J. 1978. On Interpreting the Effects of Repetition: Solving a Problem Versus Remembering a Solution. Journal of Verbal Learning and Verbal Behavior I7, 649--667.Google Scholar
Index Terms
- Behavioral Fingerprint Authentication: The Next Future
Recommendations
A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint
Despite emerging as a prominent choice to serve the security concerns of person authentication applications, unimodal biometric systems are vulnerable to spoof attacks. Multimodal biometric systems can effectively minimize spoof attacks while improving ...
A Hybrid Template Protection Technique for Fingerprint Biometric Authentication System
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsAs there is an enormous development and escalation in the field of computing technologies for the biometric based systems. Hence, they have become more convenient to be embedded to a variety of devices and also they are affordable to a very less cost ...
PalmHashing: a novel approach for dual-factor authentication
Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password ...
Comments