Continuous biometric authentication : can it be more practical?


Autoria(s): Alsolami, Eesa; Boyd, Colin; Clark, Andrew; Khandoker, Asadul Islam
Data(s)

01/09/2010

Resumo

Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in real world applications and continuous authentication scenarios. One of the main issues is that the presented CBAS are based on several samples of training data either of both intruder and valid users or only the valid users' profile. This means that historical profiles for either the legitimate users or possible attackers should be available or collected before prediction time. However, in some cases it is impractical to gain the biometric data of the user in advance (before detection time). Another issue is the variability of the behaviour of the user between the registered profile obtained during enrollment, and the profile from the testing phase. The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications. Also, the paper discusses a new application for CBAS not requiring any training data either from intruders or from valid users.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/38362/

Relação

http://eprints.qut.edu.au/38362/1/c38362.pdf

DOI:10.1109/HPCC.2010.65

Alsolami, Eesa, Boyd, Colin, Clark, Andrew, & Khandoker, Asadul Islam (2010) Continuous biometric authentication : can it be more practical? In 12th IEEE International Conference on High Performance Computing and Communications, 1-3 September 2010, Melbourne.

Direitos

Copyright 2010 IEEE

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080109 Pattern Recognition and Data Mining #continuous authentication #continuous biometric authentication system #intruder #impostor
Tipo

Conference Paper