ABSTRACT
Recently, information security has attracted more interest from researchers. Personal authentication has become more important than ever, because authentication vulnerability is regarded as a problem. In cases where such high confidentiality is required, multi-factor authentication which combines multiple authentication factors is often used. In this study, we focus on score fusion method which merge authentication score of each factor in multi-factor authentication. In conventional score fusion methods, the weighting of factors is fixed. Therefore, they are not suitable when the tendency for factors of high accuracy is different between users. We propose a user dependent weighting score fusion method using neural network. Our proposed method is evaluated in comparison with conventional score fusion methods. The result shows that the accuracy of our proposed method is higher than conventional methods.
- J. Aravinth and S. Valarmathy. 2016. "Multi classifier-based score level fusion of multi-modal biometric recognition and its application to remote biometrics authentication". The Imaging Science Journal 64, 1 (2016), 1--14. https://doi.org/10. 1080/13682199.2015.1104067 arXiv:https://doi.org/10.1080/13682199.2015.1104067Google ScholarCross Ref
- Christopher Bishop. 2006. "Pattern Recognition and Machine Learning".Google Scholar
- Francois Chollet. 2017. "Deep Learning with Python 1st Edition".Google Scholar
- Flynn P.J. Connaughton R., Bowyer K.W. 2013. "Fusion of Face and Iris Biometrics". Advances in Computer Vision and Pattern Recognition (2013). https://doi.org/10. 1007/978--1--4471--4402--1_12 arXiv:978--1--4471--4401--4 (Accessed on 08/11/2019).Google Scholar
- N. Damer, A. Opel, and A. Nouak. 2014. "CMC curve properties and biometric source weighting in multi-biometric score-level fusion". In 17th International Conference on Information Fusion (FUSION). 1--6.Google Scholar
- Geoffrey Hinton. [n.d.]. "Lecture 6e rmsprop: Divide the gradient by a running average of its recent magnitude", COURSERA: Neural Networks for Machine Learning. https://www.cs.toronto.edu/~{}tijmen/csc321/slides/lecture_slides_lec6. pdf. (Accessed on 08/21/2019).Google Scholar
- S. Ibrokhimov, K. L. Hui, A. Abdulhakim Al-Absi, h. j. lee, and M. Sain. 2019. "Multi-Factor Authentication in Cyber Physical System: A State of Art Survey". In 2019 21st International Conference on Advanced Communication Technology (ICACT). 279--284. https://doi.org/10.23919/ICACT.2019.8701960Google ScholarCross Ref
- W. Kabir, M. O. Ahmad, and M. N. S. Swamy. 2019. "A Multi-Biometric System Based on Feature and Score Level Fusions". IEEE Access 7 (2019), 59437--59450. https://doi.org/10.1109/ACCESS.2019.2914992Google ScholarCross Ref
- M. S. Madane and S. D. Thepade. 2016. "Score level fusion based Multimodal biometric identification using Thepade's Sorted Ternary Block Truncation coding with variod proportion of Iris, Palmprint, Left Fingerprint Right Fingerprint with asorted similarity measures different Colorspaces". In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). 824--828. https://doi.org/10.1109/ICACDOT.2016.7877702Google Scholar
- D. M. Shila, K. Srivastava, P. O'Neill, K. Reddy, and V. Sritapan. 2016. "A multifaceted approach to user authentication for mobile devices - Using human movement, usage, and location patterns". In 2016 IEEE Symposium on Technologies for Homeland Security (HST). 1--6. https://doi.org/10.1109/THS.2016.7568944Google ScholarCross Ref
- Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. "Dropout: A Simple Way to Prevent Neural Networks from Overfitting". J. Mach. Learn. Res. 15, 1 (Jan. 2014), 1929--1958. http://dl.acm.org/ citation.cfm?id=2627435.2670313Google ScholarDigital Library
- X. Yan, F. Deng, and W. Kang. 2014. "Palm Vein Recognition Based on Multialgorithm and Score-Level Fusion". In 2014 Seventh International Symposium on Computational Intelligence and Design, Vol. 1. 441--444. https://doi.org/10.1109/ ISCID.2014.93Google Scholar
Index Terms
- A Score Fusion Method by Neural Network in Multi-Factor Authentication
Recommendations
Security analysis and enhancements of a multi-factor biometric authentication scheme
The security of authentication scheme, especially multi-factor biometric authentication scheme based on password, smart card, and biometric in wireless communication is an important and significant issue that researchers have been focusing on lately. ...
A Sophisticated RFID Application on Multi-Factor Authentication
ITNG '11: Proceedings of the 2011 Eighth International Conference on Information Technology: New GenerationsAuthentication is the process of verifying a user's credentials when they are requesting services from any secure system. The most commonly form of authentication is the single-factor authentication, which only requires one factor for the user to log ...
Understanding security failures of multi-factor authentication schemes for multi-server environments
Highlights- We demonstrate concrete attacks on five foremost multi-factor authentication schemes.
AbstractRevealing the security flaws of existing cryptographic protocols is the key to understanding how to achieve better security. Dozens of multi-factor authentication schemes for multi-server environments were successively proposed, yet ...
Comments