IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 10 - Issue 1, January 2021 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Study On Most Popular Behavioral Biometrics, Advantages, Disadvantages And Recent Applications : A Review

[Full Text]

 

AUTHOR(S)

Israa Majeed Alsaadi

 

KEYWORDS

Biometrics, Authentication Systems, Behavioral Authentication Technologies, Voice Recognition System, Gait Recognition, Keystroke Dynamics Recognition, Signature Recognition System

 

ABSTRACT

Reducing the growing risks of an unauthorized access to various sensitive systems is a critical issue nowadays. Examples of such sensitive systems are bank accounts, secure buildings, personal computers, mobile devices and etc. This has increased the need for deploying a reliable and powerful security technology that relies on the automated recognition of individuals. The lack of high-security systems in identifying or verifying people's identities has contributed to a growing risk of infiltration of security-related systems. This work is aimed to summarize the existing behavioral biometrics schemes and explore the key advantages and disadvantages of the most popular behavioral biometrics technologies. The study is conducted within different intervals.

 

REFERENCES

[1] J. V. Monaco, J. C. Stewart, S.-H. Cha, and C. C. Tappert, “Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works,” 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Sep. 2013. doi:10.1109/btas.2013.6712743
[2] R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, and A. W. Senior, “Authentication and Biometrics,” Guide to Biometrics, pp. 17–30, 2004. doi:10.1007/978-1-4757-4036-3_2
[3] K. P Tripathi, “A Comparative Study of Biometric Technologies with Reference to Human Interface,” International Journal of Computer Applications, vol. 14, no. 5, pp. 10–15, Jan. 2011. doi:10.5120/1842-2493
[4] Jain AK, Ross A, Prabhakar S. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology [Internet]. Institute of Electrical and Electronics Engineers (IEEE); 2004 Jan;14(1):4–20. Available from: http://dx.doi.org/10.1109/tcsvt.2003.818349
[5] Yampolskiy RV, Govindaraju V. Behavioural biometrics: a survey and classification. International Journal of Biometrics [Internet]. Inderscience Publishers; 2008;1(1):81. Available from: http://dx.doi.org/10.1504/ijbm.2008.018665
[6] Hanzo L, Somerville FCA, Woodward JP. Voice Compression and Communications. IEEE; 2001; Available from: http://dx.doi.org/10.1109/9780470546871
[7] Rashid RA, Mahalin NH, Sarijari MA, Abdul Aziz AA. Security system using biometric technology: Design and implementation of Voice Recognition System (VRS). 2008 International Conference on Computer and Communication Engineering [Internet]. IEEE; 2008 May; Available from: http://dx.doi.org/10.1109/iccce.2008.4580735
[8] Chovancova E, Dudlakova Z, Fortotira O, Radusovsky J. Multicore processor focused on voice biometrics. 2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA) [Internet]. IEEE; 2014 Dec; Available from: http://dx.doi.org/10.1109/iceta.2014.7107551
[9] Haq AU, Li JP, Memon MH, khan J, Malik A, Ahmad T, et al. Feature Selection Based on L1-Norm Support Vector Machine and Effective Recognition System for Parkinson’s Disease Using Voice Recordings. IEEE Access [Internet]. Institute of Electrical and Electronics Engineers (IEEE); 2019;7:37718–34. Available from: http://dx.doi.org/10.1109/access.2019.2906350
[10] Tao Y. An Intelligent Voice Interaction Model Based on Mobile Teaching Environment. 2019 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS) [Internet]. IEEE; 2019 Jan; Available from: http://dx.doi.org/10.1109/icitbs.2019.00099
[11] Yamazaki Y, Tamaki M, Premachandra C, Perera CJ, Sumathipala S, Sudantha BH. Victim Detection Using UAV with On-board Voice Recognition System. 2019 Third IEEE International Conference on Robotic Computing (IRC) [Internet]. IEEE; 2019 Feb; Available from: http://dx.doi.org/10.1109/irc.2019.00114
[12] Aktar N, Jaharr I, Lala B. Voice Recognition based intelligent Wheelchair and GPS Tracking System. 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE) [Internet]. IEEE; 2019 Feb; Available from: http://dx.doi.org/10.1109/ecace.2019.8679163
[13] Babaee M, Li L, Rigoll G. Gait Recognition from Incomplete Gait Cycle. 2018 25th IEEE International Conference on Image Processing (ICIP) [Internet]. IEEE; 2018 Oct; Available from: http://dx.doi.org/10.1109/icip.2018.8451785
[14] Bhargavas WG, Harshavardhan K, Mohan GC, Sharma AN, Prathap C. Human identification using gait recognition. 2017 International Conference on Communication and Signal Processing (ICCSP) [Internet]. IEEE; 2017 Apr; Available from: http://dx.doi.org/10.1109/iccsp.2017.8286638
[15] Singh JP, Jain S, Arora S, Singh UP. Vision-Based Gait Recognition: A Survey. IEEE Access [Internet]. Institute of Electrical and Electronics Engineers (IEEE); 2018;6:70497–527. Available from: http://dx.doi.org/10.1109/access.2018.2879896
[16] Gandhe ST, Jawale TK. Human identilication using fusion of iris, signature and gait recognition. 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC) [Internet]. IEEE; 2016 Dec; Available from: http://dx.doi.org/10.1109/icgtspicc.2016.7955312
[17] Popplewell K, Roy K, Ahmad F, Shelton J. Multispectral iris recognition utilizing hough transform and modified LBP. 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) [Internet]. IEEE; 2014 Oct; Available from: http://dx.doi.org/10.1109/smc.2014.6974110
[18] Morocho D, Hernandez-Ortega J, Morales A, Fierrez J, Ortega-Garcia J. On the evaluation of human ratings for signature recognition. 2016 IEEE International Carnahan Conference on Security Technology (ICCST) [Internet]. IEEE; 2016 Oct; Available from: http://dx.doi.org/10.1109/ccst.2016.7815681
[19] Galbally J, Gomez-Barrero M, Ross A. Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy. 2017 IEEE International Joint Conference on Biometrics (IJCB) [Internet]. IEEE; 2017 Oct; Available from: http://dx.doi.org/10.1109/btas.2017.8272711
[20] Impedovo D, Pirlo G. Automatic Signature Verification: The State of the Art. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) [Internet]. Institute of Electrical and Electronics Engineers (IEEE); 2008 Sep;38(5):609–35. Available from: http://dx.doi.org/10.1109/tsmcc.2008.923866
[21] Bours P, Komanpally V. Performance of keystroke dynamics when allowing typing corrections. 2nd International Workshop on Biometrics and Forensics [Internet]. IEEE; 2014 Mar; Available from: http://dx.doi.org/10.1109/iwbf.2014.6914257
[22] Meszaros A, Banko Z, Czuni L. Strengthening Passwords by Keystroke Dynamics. 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications [Internet]. IEEE; 2007 Sep; Available from: http://dx.doi.org/10.1109/idaacs.2007.4488486
[23] Monrose F, Rubin AD. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems [Internet]. Elsevier BV; 2000 Feb;16(4):351–9. Available from: http://dx.doi.org/10.1016/s0167-739x(99)00059-x
[24] Ali ABA, Ponnusamy V, Sangodiah A. Correction to: User Behaviour-Based Mobile Authentication System. Advances in Computer Communication and Computational Sciences [Internet]. Springer Singapore; 2019;C1–C1. Available from: http://dx.doi.org/10.1007/978-981-13-6861-5_64
[25] Sultana M, Paul PP, Gavrilova M. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends. 2014 International Conference on Cyberworlds [Internet]. IEEE; 2014 Oct; Available from: http://dx.doi.org/10.1109/cw.2014.44
[26] Maghsoudi J, Tappert CC. A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones. 2016 European Intelligence and Security Informatics Conference (EISIC) [Internet]. IEEE; 2016 Aug; Available from: http://dx.doi.org/10.1109/eisic.2016.047
[27] Sokolova A, Konushin A. Human identification by gait from event-based camera. 2019 16th International Conference on Machine Vision Applications (MVA) [Internet]. IEEE; 2019 May; Available from: http://dx.doi.org/10.23919/mva.2019.8758019
[28] Alvarez-Aparicio C, Guerrero-Higueras AM, Rodriguez-Lera FJ, Calvo Olivera MC, Matellan Olivera V, Gines Clavero J, et al. LIDAR-based people detection and tracking for @home Competitions. 2019 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC) [Internet]. IEEE; 2019 Apr; Available from: http://dx.doi.org/10.1109/icarsc.2019.8733624 Kala N, Bhatia T, Aggarwal N. Person Identification and Characterization from Gait Using Smartphone. 2019 11th International Conference on Communication Systems & Networks (COMSNETS) [Internet]. IEEE; 2019 Jan; Available from: http://dx.doi.org/10.1109/comsnets.2019.8711131
[29] Andrews N, Jacob S, Thomas SM, Sukumar S, Cherian RK. Low-Cost Robotic Arm for differently abled using Voice Recognition. 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) [Internet]. IEEE; 2019 Apr; Available from: http://dx.doi.org/10.1109/icoei.2019.8862757
[30] Xie Y, Shi C, Li Z, Liu J, Chen Y, Yuan B. Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems. ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) [Internet]. IEEE; 2020 May; Available from: http://dx.doi.org/10.1109/icassp40776.2020.9053747
[32] Bastaki MM, Sobuh AA, Suhaiban NF, Almajali ER. Design and implementation of a Vision Stick with Outdoor/Indoor Guiding Systems and Smart Detection and Emergency Features. 2020 Advances in Science and Engineering Technology International Conferences (ASET) [Internet]. IEEE; 2020 Feb; Available from: http://dx.doi.org/10.1109/aset48392.2020.9118187
[33] Mao J, Zhu S, Dai X, Lin Q, Liu J. Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems. IEEE Internet of Things Journal [Internet]. Institute of Electrical and Electronics Engineers (IEEE); 2020 Sep;7(9):8025–35. Available from: http://dx.doi.org/10.1109/jiot.2020.2997779
[34] Limcharoen P, Khamsemanan N, Nattee C. Gait Recognition using Double-Window and CNN Classification on Freestyle Walks. 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS) [Internet]. IEEE; 2018 Dec; Available from: http://dx.doi.org/10.1109/scis-isis.2018.00194
[35] Wang Y, Sun J, Li J, Zhao D. Gait recognition based on 3D skeleton joints captured by kinect. 2016 IEEE International Conference on Image Processing (ICIP) [Internet]. IEEE; 2016 Sep; Available from: http://dx.doi.org/10.1109/icip.2016.7532940
[36] Zou W, Kamata S. Frontal Gait Recognition from Incomplete RGB-D Streams Using Gait Cycle Analysis. 2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR) [Internet]. IEEE; 2018 Jun; Available from: http://dx.doi.org/10.1109/iciev.2018.8640960
[37] Luo C, Xu W, Zhu C. Robust gait recognition based on partitioning and canonical correlation analysis. 2015 IEEE International Conference on Imaging Systems and Techniques (IST) [Internet]. IEEE; 2015 Sep; Available from: http://dx.doi.org/10.1109/ist.2015.7294548
[38] Mitchell C, Shing C-C. Discussing Alternative Login Methods and Their Advantages and Disadvantages. 2018 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) [Internet]. IEEE; 2018 Jul; Available from: http://dx.doi.org/10.1109/fskd.2018.8687163
[39] Tandel NH, Prajapati HB, Dabhi VK. Voice Recognition and Voice Comparison using Machine Learning Techniques: A Survey. 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) [Internet]. IEEE; 2020 Mar; Available from: http://dx.doi.org/10.1109/icaccs48705.2020.9074184
[40] Darabseh A, Pal D. Performance Analysis of Keystroke Dynamics Using Classification Algorithms. 2020 3rd International Conference on Information and Computer Technologies (ICICT) [Internet]. IEEE; 2020 Mar; Available from: http://dx.doi.org/10.1109/icict50521.2020.00027
[41] Martinho-Corbishley D, Nixon MS, Carter JN. Analysing comparative soft biometrics from crowdsourced annotations. IET Biometrics [Internet]. Institution of Engineering and Technology (IET); 2016 Dec 1;5(4):276–83. Available from: http://dx.doi.org/10.1049/iet-bmt.2015.0118