biometric based authentication
Recently Published Documents


TOTAL DOCUMENTS

70
(FIVE YEARS 18)

H-INDEX

11
(FIVE YEARS 2)

Author(s):  
S. Sujana ◽  
V. S. K. Reddy

The biometric-based authentication system occupies maximal space in the field of security administration. Biometric applications are swiftly accelerating in day-to-day life such as computer login, smart homes, online banking, hospitals, border areas, industries, forensics, e-voting attendance system and investigation of crime. A reliable and accurate recognition body can be achieved with multimodal biometric methodologies. In this paper, we discuss starting with an introduction to biometric systems followed by their classification, and advantages as well as disadvantages. In today’s world, most of the systems are unimodal biometrics having a lot of limitations to overcome those multimodal biometrics comes in to picture. In this paper we have discussed comprehensive representation on the system of multimodal biometric, various modes of undertakings, the significance of information fusion, a different section is allotted on the various possible levels of fusion involving sensor-level, feature-level, score-level, and decision -level as well as different rules of fusion.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2799
Author(s):  
Koushik Roy ◽  
Md. Hasan ◽  
Labiba Rupty ◽  
Md. Sourave Hossain ◽  
Shirshajit Sengupta ◽  
...  

The emergence of biometric-based authentication using modern sensors on electronic devices has led to an escalated use of face recognition technologies. While these technologies may seem intriguing, they are accompanied by numerous implicit drawbacks. In this paper, we look into the problem of face anti-spoofing (FAS) on a frame level in an attempt to ameliorate the risks of face-spoofed attacks in biometric authentication processes. We employed a bi-directional feature pyramid network (BiFPN) that is used for convolutional multi-scaled feature extraction on the EfficientDet detection architecture, which is novel to the task of FAS. We further use these convolutional multi-scaled features in order to perform deep pixel-wise supervision. For all of our experiments, we performed evaluations across all major datasets and attained competitive results for the majority of the cases. Additionally, we showed that introducing an auxiliary self-supervision branch tasked with reconstructing the inputs in the frequency domain demonstrates an average classification error rate (ACER) of 2.92% on Protocol IV of the OULU-NPU dataset, which is significantly better than the currently available published works on pixel-wise face anti-spoofing. Moreover, following the procedures of prior works, we performed inter-dataset testing, which further consolidated the generalizability of the proposed models, as they showed optimum results across various sensors without any fine-tuning procedures.


Author(s):  
Zi Wang ◽  
Sheng Tan ◽  
Linghan Zhang ◽  
Yili Ren ◽  
Zhi Wang ◽  
...  

Biometric-based authentication is gaining increasing attention for wearables and mobile applications. Meanwhile, the growing adoption of sensors in wearables also provides opportunities to capture novel wearable biometrics. In this work, we propose EarDynamic, an ear canal deformation based user authentication using in-ear wearables. EarDynamic provides continuous and passive user authentication and is transparent to users. It leverages ear canal deformation that combines the unique static geometry and dynamic motions of the ear canal when the user is speaking for authentication. It utilizes an acoustic sensing approach to capture the ear canal deformation with the built-in microphone and speaker of the in-ear wearable. Specifically, it first emits well-designed inaudible beep signals and records the reflected signals from the ear canal. It then analyzes the reflected signals and extracts fine-grained acoustic features that correspond to the ear canal deformation for user authentication. Our extensive experimental evaluation shows that EarDynamic can achieve a recall of 97.38% and an F1 score of 96.84%. Results also show that our system works well under different noisy environments with various daily activities.


Author(s):  
Senthil Kumar A. V. ◽  
Rathi M.

Online learning has entirely transformed the way of learning by the students. Online tests and quizzes play an important role in online learning, which provides accurate results to the instructor. But, the learners use different methods to cheat during online exams such as opening a browser to search for the answer or a document in the local drive, etc. They are not authenticated once they login and progress to attend the online exams. Different techniques are used in authenticating the students taking up the online exams such as audio or video surveillance systems, fingerprint, or iris recognition, etc. Keystroke dynamics-based authentication (KDA) method, a behavioral biometric-based authentication model has gained focus in authenticating the users. This chapter proposes the usage of KDA as a solution to user authentication in online exams and presents a detailed review on the processes of KDA, the factors that affect the performance of KDA, their applications in different domains, and a few keystroke dynamics-based datasets to authenticate the users during online exams.


Author(s):  
Swati K. Choudhary ◽  
Ameya K. Naik

This paper proposes a multimodal biometric based authentication (verification and identification) with secured templates. Multimodal biometric systems provide improved authentication rate over unimodal systems at the cost of increased concern for memory requirement and template security. The proposed framework performs person authentication using face and fingerprint. Biometric templates are protected by hiding fingerprint into face at secret locations, through blind and key-based watermarking. Face features are extracted from approximation sub-band of Discrete Wavelet Transform, which reduces the overall working plane. The proposed method also shows high robustness of biometric templates against common channel attacks. Verification and identification performances are evaluated using two chimeric and one real multimodal dataset. The same systems, working with compressed templates provides considerable reduction in overall memory requirement with negligible loss of authentication accuracies. Thus, the proposed framework offers positive balance between authentication performance, template robustness and memory resource utilization.


2020 ◽  
Vol 10 (23) ◽  
pp. 8547
Author(s):  
Fei Wang ◽  
Lu Leng ◽  
Andrew Beng Jin Teoh ◽  
Jun Chu

Biometric-based authentication is widely deployed on multimedia systems currently; however, biometric systems are vulnerable to image-level attacks for impersonation. Reconstruction attack (RA) and presentation attack (PA) are two typical instances for image-level attacks. In RA, the reconstructed images often have insufficient naturalness due to the presence of remarkable counterfeit appearance, thus their forgeries can be easily detected by machine or human. The PA requires genuine users’ original images, which are difficult to acquire in practice and to counterfeit fake biometric images on spoofing carriers. In this paper, we develop false acceptance attack (FAA) for a palmprint biometric, which overcomes the aforementioned problems of RA and PA. FAA does not require genuine users’ images, and it can be launched simply with the synthetic images with high naturalness, which are generated by the generative adversarial networks. As a case study, we demonstrate the feasibility of FAA against coding-based palmprint biometric systems. To further improve the efficiency of FAA, we employ a clustering method to select diverse fake images in order to enhance the diversity of the fake images used, so the number of attack times is reduced. Our experimental results show the success rate and effectiveness of the FAA.


2020 ◽  
Vol 14 ◽  
Author(s):  
Ambika Annavarapu ◽  
Surekha Borra ◽  
Rohit Thanki

: The security of information is the major problem faced in today’s digital environment. Biometric Systems helps in achieving high–end security at precise performance requirements for various applications. This paper surveys the present multimodal and unimodal biometric based authentication systems which are in use, and their future possibilities. The authentication techniques that can identify the individual using unique features of the human such as face, fingerprint, DNA, speech and iris are discussed. Different recognition systems for new biometric traits such as voice, gait, and lip moment are also focused. This paper also focuses on information security of biometric systems and their performance requirements.


Sign in / Sign up

Export Citation Format

Share Document