Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - arXiv preprint arXiv:2311.13416, 2023 - arxiv.org
This paper conducts an extensive review of biometric user authentication literature,
addressing three primary research questions:(1) commonly used biometric traits and their …

Who's Who? Challenges in Biometric Authentication

AK Jain - Joint Pattern Recognition Symposium, 2003 - Springer
A wide variety of systems require reliable personal recognition schemes to either confirm or
determine the identity of an individual requesting their services. The purpose of such …

Biometric-based cybersecurity techniques

PH Griffin - Advances in Human Factors in Cybersecurity …, 2016 - Springer
This paper describes biometric-based methods for achieving strong, low cost mutual and
multi-factor authentication on the Internet of Things (IoT). These methods can leverage …

Behavioral biometrics for mobile user authentication: benefits and limitations

M Papaioannou, G Mantas… - 2023 IFIP …, 2023 - ieeexplore.ieee.org
User authentication serves as the primary defense, also referred to as first line of defense, by
verifying the identity of a mobile user, often as a requirement for accessing resources on a …

How do we talk ourselves into these things? Challenges with adoption of biometric authentication for expert and non-expert users

F Wolf, R Kuber, AJ Aviv - UMBC Student Collection, 2018 - mdsoar.org
Biometric authentication offers promise for mobile security, but its adoption can be
controversial, both from a usability and security perspective. We describe a preliminary …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Biometric technologies: functionality, emerging trends, and vulnerabilities

JV Di Nardo - Journal of Applied Security Research, 2008 - Taylor & Francis
Biometric identification methods are quickly becoming commonplace in security and access
control applications. This article presents a general overview of various biometric …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

[PDF][PDF] A study of biometric security technology acceptance and primary authentication

J Fletcher, P Howard, D Mody, A Vyas… - Proceedings of student …, 2017 - academia.edu
Advances in biometrics present the possibility of providing robust security and authentication
methods compared to traditional password-oriented security measures. Biometric security …