Abstract
In the progressive world of Internet, online banking or any other transaction is not secure because of methods such as brute force technique, dictionary attacks, and spoofing. It is because traditional methods of authentication require either password or pin which is not secure because it can be cracked easily using the methods mentioned above. Therefore, biometric authentication can be a viable option which can be used for identification of a genuine user. In this paper, we propose a model for identifying the user’s position that plays a vital role in identifying the genuinity of any user. This paper revolves around the effects on verification of genuine user if the data collected from user is done in both controlled and uncontrolled environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burger, M.P.: Biometric authentication system. Google Patents, vol. 17 (2001)
Mizrah, L.L.: Method of one time authentication response to a session-specific challenge indicating a random subset of password or pin character positions, Mar. 16, 2010, uS Patent 7,681,228
Karawash, A.: Brute force attack
Deo, V., Seidensticker, R.B., Simon, D.R.: Authentication system and method for smart card transactions, Feb. 24, 1998, uS Patent 5,721,781
Berislav Kucan, Z.Z., Mirko Zorz: Biometric preference (1998)
Das, R.: An introduction to biometrics. Mil. Technol. 29(7), 20–27 (2005)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer Science & Business Media (2009)
Daugman, J.: How iris recognition works. In The Essential Guide to Image Processing, pp. 715–739. Elsevier, Amsterdam (2009)
Saeed, K., Werdoni, M.: A new approach for hand-palm recognition. Enhanced Methods in Computer Security. Biometric and Artificial Intelligence Systems, pp. 185–194. Springer, Berlin (2005)
Zhao, W., Krishnaswamy, A., Chellappa, R., Swets, D. L., Weng, J.: Discriminant analysis of principal components for face recognition. In Face Recognition. Springer, pp. 73–85 (1998)
Monrose, F., Rubin, D.A.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11(2), 1565–1573 (2011)
Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Tech. Rep, Rand Corp Santa Monica CA (1980)
Garcia, J.D.: Personal identification apparatus, Nov. 4, 1986, uS Patent 4,621,334
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)
Young, R.J., Hammon, W.R.: Method and apparatus for verifying an individual’s identity. Google Patents vol. 14 (1989)
Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man. Cybern. Part B (Cybernetics) 20(2), 261–269 (1997)
Revett, K.: A bioinformatics based approach to behavioural biometrics. In 2007 Frontiers in the Convergence of Bioscience and Information Technologies, pp. 665–670 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tirkey, B.B., Saini, B.S. (2020). Proposing Model for Recognizing User Position. In: Luhach, A., Kosa, J., Poonia, R., Gao, XZ., Singh, D. (eds) First International Conference on Sustainable Technologies for Computational Intelligence. Advances in Intelligent Systems and Computing, vol 1045. Springer, Singapore. https://doi.org/10.1007/978-981-15-0029-9_12
Download citation
DOI: https://doi.org/10.1007/978-981-15-0029-9_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0028-2
Online ISBN: 978-981-15-0029-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)