2017
DOI: 10.5815/ijeme.2017.04.04
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Voice & Ear Biometrics Authentication System

Abstract: The core aim of biometrics authentication methods and technologies is to solve issues and concerns existing in traditional authentication methods like passwords, PIN numbers or identity cards. The Most important concern for business sectors and organizations is to authenticate individuals who interact with them and their services. By considering more than one biometric technology, the authentication process is expected to be more reliable and secure. The Ear and Voice Multimodal Biometrics System is evaluated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Various two-factor authentication methods using Smart cards, Cryptographic tokens, and Biometrics that are available today [34].Multi modal biometric authentication system also used for the justification of false rejection and false acceptance [36].There are two factor authentication schemes which were developed to overcome phishing attacks which proved to be an expensive to implement in real time applications [37].Other than Smart Card based schemes, most of the Biometric or Cryptographic Token-based schemes require a verifier table at the server to validate the user. This verifier table requirement may lead to a stolen verifier attack wherein the attacker, if gets the database access, may steal the verifier table and perform offline guessing to figure out the user's password.…”
Section: Introductionmentioning
confidence: 99%
“…Various two-factor authentication methods using Smart cards, Cryptographic tokens, and Biometrics that are available today [34].Multi modal biometric authentication system also used for the justification of false rejection and false acceptance [36].There are two factor authentication schemes which were developed to overcome phishing attacks which proved to be an expensive to implement in real time applications [37].Other than Smart Card based schemes, most of the Biometric or Cryptographic Token-based schemes require a verifier table at the server to validate the user. This verifier table requirement may lead to a stolen verifier attack wherein the attacker, if gets the database access, may steal the verifier table and perform offline guessing to figure out the user's password.…”
Section: Introductionmentioning
confidence: 99%