2017
DOI: 10.1109/tifs.2016.2604213
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive-Biometric Recognition From Language Usage: A Feasibility Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…If a service provider responds to requests indiscriminately, it may be exploited for crime, so it should be limited to the authorized person, and the required technology is authentication. Authentication methods of security-dependent services, such as access to private clouds and payments using smartphone banking, are moving toward applying convenient biometrics [ 1 , 2 , 3 , 4 , 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…If a service provider responds to requests indiscriminately, it may be exploited for crime, so it should be limited to the authorized person, and the required technology is authentication. Authentication methods of security-dependent services, such as access to private clouds and payments using smartphone banking, are moving toward applying convenient biometrics [ 1 , 2 , 3 , 4 , 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…Considering the security requirements of any company/organization, biometrics automatically permit access only to those whose identities have been verified. It also allows the automatic authorization of cash settlements or remittances even on online platforms [1][2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Individual identification is a technique that is used to identify a user using behavioral or physical characteristics that are the sole characteristics of an individual. Currently, the range of services, such as security, banking, access control, medical care, and entertainment, is expanding, and so individual identification methods are studied using diverse characteristics [1][2][3][4][5][6]. Such individual identification using the face, fingerprint, and so forth has vulnerability to falsification and disguise, and it must be moved to a special place where a system is installed for individual identification [7].…”
Section: Introductionmentioning
confidence: 99%