Cargando…
A broad review on non-intrusive active user authentication in biometrics
Authentication is the process of keeping the user’s personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice recognition, and so on. Tradit...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8177270/ https://www.ncbi.nlm.nih.gov/pubmed/34109006 http://dx.doi.org/10.1007/s12652-021-03301-x |
_version_ | 1783703368839987200 |
---|---|
author | Thomas, Princy Ann Preetha Mathew, K. |
author_facet | Thomas, Princy Ann Preetha Mathew, K. |
author_sort | Thomas, Princy Ann |
collection | PubMed |
description | Authentication is the process of keeping the user’s personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice recognition, and so on. Traditionally, a one-time login based credential verification method was utilized for user authentication. Recently, several new approaches were proposed to enhance the user authentication framework but those approaches have been found inconsistent during the authentication execution process. Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics. These authentication models are evaluated in a continuous non-user authentication environment and their results have been presented in way of tabular and graphical representation. Also, the common merits and demerits of the discussed authentication systems are broadly explained discussion section. Henceforth, this study will help the researchers to adopt the best suitable method at each stage to build an authentication framework for non-intrusive active authentication. |
format | Online Article Text |
id | pubmed-8177270 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-81772702021-06-05 A broad review on non-intrusive active user authentication in biometrics Thomas, Princy Ann Preetha Mathew, K. J Ambient Intell Humaniz Comput Original Research Authentication is the process of keeping the user’s personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice recognition, and so on. Traditionally, a one-time login based credential verification method was utilized for user authentication. Recently, several new approaches were proposed to enhance the user authentication framework but those approaches have been found inconsistent during the authentication execution process. Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics. These authentication models are evaluated in a continuous non-user authentication environment and their results have been presented in way of tabular and graphical representation. Also, the common merits and demerits of the discussed authentication systems are broadly explained discussion section. Henceforth, this study will help the researchers to adopt the best suitable method at each stage to build an authentication framework for non-intrusive active authentication. Springer Berlin Heidelberg 2021-06-04 2023 /pmc/articles/PMC8177270/ /pubmed/34109006 http://dx.doi.org/10.1007/s12652-021-03301-x Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Original Research Thomas, Princy Ann Preetha Mathew, K. A broad review on non-intrusive active user authentication in biometrics |
title | A broad review on non-intrusive active user authentication in biometrics |
title_full | A broad review on non-intrusive active user authentication in biometrics |
title_fullStr | A broad review on non-intrusive active user authentication in biometrics |
title_full_unstemmed | A broad review on non-intrusive active user authentication in biometrics |
title_short | A broad review on non-intrusive active user authentication in biometrics |
title_sort | broad review on non-intrusive active user authentication in biometrics |
topic | Original Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8177270/ https://www.ncbi.nlm.nih.gov/pubmed/34109006 http://dx.doi.org/10.1007/s12652-021-03301-x |
work_keys_str_mv | AT thomasprincyann abroadreviewonnonintrusiveactiveuserauthenticationinbiometrics AT preethamathewk abroadreviewonnonintrusiveactiveuserauthenticationinbiometrics AT thomasprincyann broadreviewonnonintrusiveactiveuserauthenticationinbiometrics AT preethamathewk broadreviewonnonintrusiveactiveuserauthenticationinbiometrics |