[PDF][PDF] Toward reliable user authentication through biometrics

V Matyas, Z Riha - IEEE Security & Privacy, 2003 - Citeseer
Acquiring samples. During a user's first contact with the biometric system, the system collects
a biometric sample using an input device. The quality of the first sample is crucial …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Understanding user perspective in a university setting to improve biometric authentication adoption

A Patrick, A Burris, S Das, N Noah - Proceedings of the 9th Mexican …, 2022 - dl.acm.org
Personal devices have become equipped with more sophisticated security methods through
biometric authentication, which does not require users to memorize passwords and is …

Biometrics hit the mainstream: an analysis of security and privacy implications

V Bjorn - Proceedings of the 12th ACM conference on Computer …, 2005 - dl.acm.org
Biometric-based user authentication is no longer just the domain of James Bond movies or
government installations. Fingerprint sensors, in particular, are now showing up standard on …

BIOMETRICS FROM THE USER POINT OF VIEW: DERIVING DESIGN PRINCIPLES FROM USER PERCEPTIONS AND CONCERNS ABOUT BIOMETRIC SYSTEMS.

P Piccolotto, P Maller - Intel Technology Journal, 2014 - search.ebscohost.com
The user experience of biometric authentication relies heavily on perceptions and
judgments of users about the different factors in use. Even biometric factors in use and …

Unraveling juxtaposed effects of biometric characteristics on user security behaviors: A controversial information technology perspective

J Zhang, Z Liu, X Luo - Decision Support Systems, 2024 - Elsevier
Biometric authentication has become ubiquitous and profoundly impacts decision-making
for both individuals and firms. Despite its extensive implementation, there is a discernible …

Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems

A Sundararajan, AI Sarwat, A Pons - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for
user authentication and identification. However, prior to engaging in WBS research, how …

Picking the right path to mobile biometric authentication

T Thiemann - Biometric Technology Today, 2016 - Elsevier
Many online and mobile apps are used to manage highly valuable data, such as financial
transactions, personally identifiable information (PII) or intellectual property. It is vital …

[PDF][PDF] Biometrics Person Authentication: From Theory to Practice

F Perronnin, JC Junqua, JL Dugelay - EURASIP Journal on applied …, 2005 - eurecom.fr
Biometrics, which refers to identifying an individual based on his/her physical or behavior
characteristics, is an emerging topic in the field of signal processing. Nevertheless, biometric …