Comparison of Dynamic Biometric Security Characteristics against other Biometrics

被引:0
作者
Ducray, Benoit [1 ]
Cobourne, Sheila [1 ]
Mayes, Keith [1 ]
Markantonakis, Konstantinos [1 ]
机构
[1] Royal Holloway Univ London, SCC, ISG, Egham TW20 0EX, Surrey, England
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2017年
关键词
RECOGNITION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Biometric data can be used as "something you are" in authentication systems, but if a biometric is compromised by a malicious entity, the genuine user can no longer use it because it cannot be easily changed. Dynamic biometrics may offer a practical alternative, as they capture both an inherence factor along with a changeable knowledge factor in a single step. This paper investigates dynamic biometrics and whether they offer useful security authentication properties compared to conventional biometrics. In particular the paper focuses on one type of dynamic biometry, authentication based on Gesture Recognition, and presents a proof of concept experiment. Security characteristics of examples from three classes of dynamic biometrics are compared to a selection of common physiological ("fixed") biometrics, leading to the conclusion that in addition to providing one-step, two factor authentication, dynamic biometry may provide privacy benefits in some circumstances.
引用
收藏
页数:7
相关论文
共 28 条
  • [1] Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication
    Alshanketi, Faisal
    Traore, Issa
    Awad, Ahmed E. A.
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 66 - 73
  • [2] [Anonymous], 2005, Proceedings of the 2005 Workshop on New Security Paradigms (NSPW '05) (New York, NY, USA), ACM, DOI DOI 10.1145/1146269.1146282
  • [3] [Anonymous], SECURITY COMMUNICATI
  • [4] [Anonymous], P 2014 ACM INT JOINT
  • [5] Aslan I., 2014, P 16 INT C MULTIMODA, P311
  • [6] AirAuth: Evaluating In-Air Hand Gestures for Authentication
    Aumi, Md Tanvir Islam
    Kratz, Sven
    [J]. PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES (MOBILEHCI'14), 2014, : 309 - 318
  • [7] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 553 - 567
  • [8] Chuang J., ONE STEP 2 FACTOR AU
  • [9] Chuang J, 2013, LECT NOTES COMPUT SC, V7862, P1, DOI 10.1007/978-3-642-41320-9_1
  • [10] Cofta P., 2008, UNDERSTANDING PUBLIC