Abstract
Fallback authentication based on voice recognition provides several benefits to users. Since it is a biometric method, there are no passwords that have to be remembered. Additionally, the technique can be used remotely without the user having to be physically present. We performed stakeholder interviews and we iteratively designed and evaluated different voice authentication user interfaces with a focus on ease-of-use. The main goal was to keep embarrassment low and to provide an interaction as natural as possible. Our results show that small changes in the interface can significantly influence the users’ opinions about the system.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Adams, A., Sasse, M.A.: Users Are Not the Enemy. Communications of the ACM 42(12), 40–46 (1999)
Delogu, C., Di Carlo, A., Rotundi, P., Sartori, D.: Usability Evaluation of IVR Systems with DTMF and ASR. In: Proc. of ICSLP 1998 (1998)
Dugelay, J.L., Junqua, J.C., Kotropoulos, C., Kuhn, R., Perronnin, F., Pitas, I.: Recent Advances in Biometric Person Authentication. In: IEEE Transactions ICASSP 2002, vol. 4, pp. 4060–4063 (2002)
Forrester Consulting. Enhancing Authentication to Secure the Open Enterprise. Whitepaper commissioned by VerySign (Symantec) (2010)
Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14(1) (2004)
Lerer, A., Ward, M., Amarasinghe, S.: Evaluation of IVR Data Collection UIs for Untrained Rural Users. In: Proc. of DEV 2010, pp. 2:1–2:8 (2010)
Mannan, M., Barrera, D., Brown, C., Lie, D., van Oorschot, P.: Mercury: Recovering Forgotten Passwords Using Personal Devices. In: Financial Cryptography and Data Security, pp. 315–330 (2012)
Pons, A.P., Polak, P.: Understanding User Perspectives on Biometric Technology. Communications of the ACM 51(9), 115–118 (2008)
Rabkin, A.: Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook. In: Proc. of SOUPS 2008, pp. 13–23 (2008)
Wood, H.M.: The Use of Passwords for Controlling Access to Remote Computer Systems and Services. In: Proc. of AFIP 1977, pp. 27–33 (1977)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hang, A. et al. (2013). Travel Routes or Geography Facts? An Evaluation of Voice Authentication User Interfaces. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds) Human-Computer Interaction – INTERACT 2013. INTERACT 2013. Lecture Notes in Computer Science, vol 8119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40477-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-40477-1_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40476-4
Online ISBN: 978-3-642-40477-1
eBook Packages: Computer ScienceComputer Science (R0)