Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Systematic Review Article

Performance Analysis of Authentication System: A Systematic Literature Review

Author(s): Divya Singla* and Neetu Verma

Volume 17, Issue 7, 2024

Published on: 12 December, 2023

Article ID: e121223224363 Pages: 21

DOI: 10.2174/0126662558246531231121115514

Price: $65

Abstract

Background: Data authentication is vital nowadays, as the development of the internet and its applications allow users to have all-time data availability, attracting attention towards security and privacy and leading to authenticating legitimate users.

Methods: We have diversified means to gain access to our accounts, like passwords, biometrics, and smartcards, even by merging two or more techniques or various factors of authentication. This paper presents a systematic literature review of papers published from 2010 to 2022 and gives an overview of all authentication techniques available in the market.

Results: Our study provides a comprehensive overview of all three authentication techniques with all performance metrics (Accuracy, Equal Error Rate (EER), False Acceptance Rate (FAR)), security, privacy, memory requirements, and usability (Acceptability by user)) that will help one choose a perfect authentication technique for an application.

Conclusion: In addition, the study also explores the performance of multimodal and multifactor authentication and the application areas of authentication.

Graphical Abstract

[1]
S. Sugrim, C. Liu, M. McLean, and J. Lindqvist, "Robust performance metrics for authentication systems", In 26th Annual Network and Distributed System Security Symposium, NDSS 2019.
2019 San Diego, USA. [http://dx.doi.org/10.14722/ndss.2019.23351]
[2]
S. Walton, "Image authentication for a slippery new age", Dr. Dobb’s J., vol. 20, no. 4, pp. 18-26, 1995.
[3]
Y. Atwady, and M. Hammoudeh, "A Survey on Authentication Techniques for the Internet of Things", In ICFNDS ’17: International Conference on Future Networks and Distributed Systems. 2017Cambridge, United Kingdom
[http://dx.doi.org/10.1145/3102304.3102312]
[4]
Ö. Kasim, "Secure medical image encryption with Walsh-Hadamard transform and lightweight cryptography algorithm", Med. Biol. Eng. Comput., vol. 60, no. 6, pp. 1585-1594, 2022.
[http://dx.doi.org/10.1007/s11517-022-02565-5]
[5]
S.S. Vladimirov, R. Pirmagomedov, R. Kirichek, and A. Koucheryavy, "Unique degradation of flash memory as an identifier of ICT device", IEEE Access, vol. 7, pp. 107626-107634, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2932804]
[6]
P.B. Kruchten, "The 4+ 1 view model of architecture", IEEE Softw., vol. 12, no. 6, pp. 42-50, 1995.
[http://dx.doi.org/10.1109/52.469759]
[7]
T. Górski, "The 1+ 5 architectural views model in designing blockchain and IT system integration solutions", Symmetry (Basel), vol. 13, no. 11, p. 2000, 2021.
[http://dx.doi.org/10.3390/sym13112000]
[8]
I. Velásquez, A. Caro, and A. Rodríguez, "Authentication schemes and methods: A systematic literature review", Inf. Softw. Technol., vol. 94, pp. 30-37, 2018.
[http://dx.doi.org/10.1016/j.infsof.2017.09.012]
[9]
""How do authentication process work"", Available From: https://indiancybersecuritysolutions.com/how-do-authentication-process-work/
[10]
ISO, "Information security, cybersecurity and privacy protection — Biometric information protection. Available From: https://www.iso.org/standard/75302.html
[11]
Y. Li, H. Wang, and K. Sun, "A study of personal information in human-chosen passwords and its security implications", In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, 2016.
2016 San Francisco, CA, USA. [http://dx.doi.org/10.1109/INFOCOM.2016.7524583]
[12]
D. Wang, Z. Zhang, P. Wang, J. Yan, and X. Huang, "Targeted online password guessing", In CCS’16: 2016 ACM SIGSAC Conference on Computer and Communications Security2016 Vienna, Austria
[http://dx.doi.org/10.1145/2976749.2978339]
[13]
J.G. Kaka, O.O. Ishaq, and J.O. Ojeniyi, "Recognition-based graphical password algorithms: A Survey", In 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA)., Abuja, Nigeria, 2021.
[http://dx.doi.org/10.1109/CYBERNIGERIA51635.2021.9428801]
[14]
S. Haggenmüller, E. Krieghoff-Henning, T. Jutzi, N. Trapp, L. Kiehl, J.S. Utikal, S. Fabian, and T.J. Brinker, "Digital natives’ preferences on mobile artificial intelligence apps for skin cancer diagnostics: survey study", JMIR Mhealth Uhealth, vol. 27, no. 9, p. e22909, 2021.
[http://dx.doi.org/10.2196/22909]
[15]
Z. Ju, H. Zhang, X. Li, X. Chen, J. Han, and M. Yang, "A survey on attack detection and resilience for connected and automated vehicles: from vehicle dynamics and control perspective", IEEE Transactions on Intelligent Vehicles, 2022.
[http://dx.doi.org/10.1109/TIV.2022.3186897]
[16]
"Password strength calculator", Available From: http://ww25.passwordstrengthcalculator.org/
[17]
D. İşler, A. Küpçü, and A. Coskun, "User perceptions of security and usability of mobile-based single password authentication and two-factor authentication",
Data Privacy Management, Cryptocurrencies and Blockchain Technology, New York, pp. 99-117, 2019.Springer [http://dx.doi.org/10.1007/978-3-030-31500-9_7]
[18]
D. Wang, and P. Wang, Offline dictionary attack on password authentication schemes using smart cards. Available From: https://eprint.iacr.org/2014/208
[19]
R. Heartfield, and G. Loukas, "A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks", In Future of Information and Communications Conference (FICC 2020)., San Fransisco, CA., 2016.
[http://dx.doi.org/10.1145/2835375]
[20]
J. Song, D. Wang, Z. Yun, and X. Han, "Alphapwd: A password generation strategy based on mnemonic shape", IEEE Access, vol. 7, p. 20192016, .
[http://dx.doi.org/10.1109/ACCESS.2019.2937030]
[21]
Y. Guo, Z. Zhang, and Y. Guo, "Optiwords: A new password policy for creating memorable and strong passwords", Comput. & Secur., vol. 85, pp. 423-435, 2019.
[http://dx.doi.org/10.1016/j.cose.2019.05.015]
[22]
S. Lyu, Q. Yao, and J. Song, "AvoidPwd: A mnemonic password generation strategy based on keyboard transformation", China Communications, vol. 19, no. 10, pp. 92-101, 2022.
[http://dx.doi.org/10.23919/JCC.2022.00.027]
[23]
S. Wiedenbeck, J. Waters, J-C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords", In SOUPS ’05: Proceedings of the 2005 symposium on Usable privacy and security, Pittsburgh, PA, 2005.
[http://dx.doi.org/10.1145/1073001.1073002]
[24]
V. Ndako Adama, I. Oyebisi Oyefolahan, and J. Ndunagu, "Pure recall-based graphical user authentication schemes: perspectives from a closer look", In AfriCHI 2021: 3rd African Human-Computer Interaction Conference, NY, USA, 2021.
[http://dx.doi.org/10.1145/3448696.3448721]
[25]
S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P.C. Van Oorschot, Persuasive cued click-points: design, implementation, and evaluation of a knowledge-based authentication mechanism., IEEE Transactions on Dependable and Secure Computing., Vol. 9, 2012.
[http://dx.doi.org/10.1109/TDSC.2011.55]
[26]
N.J. Carter, "Graphical passwords for older computer users", In Doctoral Symposium at User Interface Software and Technology Symposium (ACM UIST)., 2015.
[http://dx.doi.org/10.1145/2815585.2815593]
[27]
T-Y. Chang, C-J. Tsai, and J-H. Lin, "A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices.>A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices", J. Syst. Softw., vol. 85, no. 5, pp. 1157-1165, 2012.
[http://dx.doi.org/10.1016/j.jss.2011.12.044]
[28]
H-M. Sun, Y-H. Chen, C-C. Fang, and S-Y. Chang, "PassMap: A map based graphical-password authentication system", In ASIACCS ’12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012.
[http://dx.doi.org/10.1145/2414456.2414513]
[29]
S. Azad, M. Rahman, M.S.A.N. Ranak, B.M.F.K. Ruhee, N.N. Nisa, N. Kabir, A. Rahman, and J. Mohamad Zain, "VAP code: A secure graphical password for smart devices", Comput. Electr. Eng., vol. 59, pp. 99-109, 2017.
[http://dx.doi.org/10.1016/j.compeleceng.2016.12.007]
[30]
A. Shah, P. Ved, A. Deora, A. Jaiswal, and M. D’silva, "Shoulder-surfing resistant graphical password system", Procedia Comput. Sci., vol. 45, pp. 477-484, 2015.
[http://dx.doi.org/10.1016/j.procs.2015.03.084]
[31]
M.D. Amruth, and K. Praveen, "Android Smudge Attack Prevention Techniques", Intelligent Systems Technologies and Applications., vol. 2016, pp. 23-31, 2015.
[http://dx.doi.org/10.1007/978-3-319-23258-4_3]
[32]
T. Kwon, S. Shin, and S. Na, "Covert attentional shoulder surfing: human adversaries are more powerful than expected", In: IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44. 2014no. 6, .
[http://dx.doi.org/10.1109/TSMC.2013.2270227]
[33]
A. Greenberg, Google glass snoopers can steal your passcode with a glance. Available From: https://www.wired.com/2014/06/google-glass-snoopers-can-steal-your-passcode-with-a-glance/
[34]
H-M. Sun, S-T. Chen, J-H. Yeh, and C-Y. Cheng, "A shoulder surfing resistant graphical authentication system", In: IEEE Transactions on Dependable and Secure Computing, vol. 15. 2018no. 2, .
[http://dx.doi.org/10.1109/TDSC.2016.2539942]
[35]
K. Patra, B. Nemade, D.P. Mishra, and P.P. Satapathy, "Cued-click point graphical password using circular tolerance to increase password space and persuasive features", Procedia Comput. Sci., vol. 79, pp. 561-568, 2016.
[http://dx.doi.org/10.1016/j.procs.2016.03.071]
[36]
P.A. Sosa Valles, J.G. Villalobos-Serrano, R. Martinez Pelaez, V. Garcia, J.R. Parra Michel, P. Velarde Alvarado, and L. Mena, "My personal images as my graphical password", IEEE Latin America Transactions, vol. 16, no. 5, 2018.
[http://dx.doi.org/10.1109/TLA.2018.8408449]
[37]
S.Z. Nizamani, S.R. Hassan, R.A. Shaikh, E.A. Abozinadah, and R. Mehmood, "A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability", IEEE Access, vol. 9, pp. 51294-51312, 2018.
[http://dx.doi.org/10.1109/ACCESS.2021.3069164]
[38]
"Google plans to bring password-free logins to Android apps by year-end"", Available From: https://techcrunch.com/2016/05/23/google-plans-to-bring-password-free-logins-to-android-apps-by-year-end/
[39]
S. Marcel, M.S. Nixon, J. Fierrez, and N. Evans, Advances in computer vision and pattern recognition.In: Handbook of Biometric Anti-Spoofing., Springer International Publishing: New York, 2019.
[http://dx.doi.org/10.1007/978-3-319-92627-8]
[40]
A.I. Awad, and A.E. Hassanien, "impact of some biometric modalities on forensic science", In: Studies in Computational Intelligence., Springer International Publishing: New York, 2014, pp. 47-62.
[http://dx.doi.org/10.1007/978-3-319-05885-6_3]
[41]
S.F. Ali, M.A. Khan, and A.S. Aslam, "Fingerprint matching, spoof and liveness detection: classification and literature review", In: Front. Comput. Sci., vol. 15. 2020, p. 151310.
[http://dx.doi.org/10.1007/s11704-020-9236-4]
[42]
X. Fu, and J. Feng, "Minutia Tensor Matrix: A New Strategy for Fingerprint Matching", Plus One, vol. 10, no. 3, 2015.e0118910
[http://dx.doi.org/10.1371/journal.pone.0118910]
[43]
R. de Macedo Rodrigues, M.G.F. Costa, and C.F.F. Costa Filho, "Fingerprint verification using characteristic vectors based on planar graphics", Signal, Image and Video Process., vol. 9, pp. 1121-1135, 2015.
[http://dx.doi.org/10.1007/s11760-013-0548-9]
[44]
P. Das, K. Karthik, and B. Chandra Garai, "A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs", Pattern Recogn., vol. 45, no. 9, pp. 3373-3388, 2012.
[http://dx.doi.org/10.1016/j.patcog.2012.02.022]
[45]
P.D. Gutierrez, M. Lastra, F. Herrera, and J.M. Benitez, "A high performance fingerprint matching system for large databases based on GPU", In: IEEE Transactions on Information Forensics and Security, vol. 9. 2014no. 1, .
[http://dx.doi.org/10.1109/TIFS.2013.2291220]
[46]
A.K. Jain, and J. Feng, "Latent fingerprint matching: fusion of manually marked and derived minutiae", In 2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images, Gramado, Brazil, 2011.
[http://dx.doi.org/10.1109/TPAMI.2010.59]
[47]
H. Choi, K. Choi, and J. Kim, "Fingerprint matching incorporating ridge features with minutiae", In: IEEE Transactions on Information Forensics and Security, vol. 6. 2011no. 2, .
[http://dx.doi.org/10.1109/TIFS.2010.2103940]
[48]
Q.N. Tran, B.P. Turnbull, M. Wang, and J. Hu, "A privacy-preserving biometric authentication system with binary classification in a zero knowledge proof protocol", IEEE Open Journal of the Computer Society, vol. 3, 2011.
[http://dx.doi.org/10.1109/OJCS.2021.3138332]
[49]
A. Ali, V.S. Baghel, and S. Prakash, "A novel technique for fingerprint template security in biometric authentication systems", In: IEEE Transactions on Emerging Topics in Computing., vol. 10. 2022no. 4, .
[http://dx.doi.org/10.1007/s00371-022-02726-5]
[50]
The Guardian, "iPhone 5S Fingerprint Sensor Hacked by Germany’s Chaos Computer Club. Available From: http://www.theguardian.com/technology/2013/sep/22/apple-iphone-ngerprintscanner-hacked
[51]
W. Yang, J. Hu, C. Fernandes, V. Sivaraman, and Q. Wu, "Vulnerability analysis of iPhone 6", In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016 Auckland, New Zealand., 2016.
[http://dx.doi.org/10.1109/PST.2016.7907000]
[52]
"The iPhone 5s fingerprint reader: what you need to know", Available From: https://www.macworld.com/article/221849/the-iphone-5s-fingerprint-reader-what-you-need-to-know.html
[53]
"Bayometric", Available From: https://www.bayometric.com/
[54]
Z. Rui, and Z. Yan, A survey on biometric authentication: toward secure and privacy-preserving identification., vol. 7, IEEE Access, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2889996]
[55]
H.B. Kekre, S.D. Thepade, J. Jain, and N. Agrawal, "Iris recognition using texture features extracted from Walshlet pyramid", In Proceedings of the International Conference & Workshop on Emerging Trends in Technology, 2016.
[http://dx.doi.org/10.1145/1980022.1980038]
[56]
S. Shah, and A. Ross, "Iris segmentation using geodesic active contours", In: IEEE Transactions on Information Forensics and Security., vol. 4. 2009no. 4, .
[http://dx.doi.org/10.1109/TIFS.2009.2033225]
[57]
N. Reddy, A. Rattani, and R. Derakhshani, "A robust scheme for iris segmentation in mobile environment", In 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 2016.
[http://dx.doi.org/10.1109/THS.2016.7568948]
[58]
C-W. Tan, and A. Kumar, "Towards online iris and periocular recognition under relaxed imaging constraints", In: IEEE Transactions on Image Processing, vol. 22. 2013no. 10, .
[http://dx.doi.org/10.1109/TIP.2013.2260165]
[59]
C-W. Tan, and A. Kumar, "Unified framework for automated iris segmentation using distantly acquired face images", IEEE Trans. Image Process., vol. 21, no. 9, pp. 4068-4079, 2012.
[http://dx.doi.org/10.1109/TIP.2012.2199125]
[60]
A.Z. Khoirunnisaa, L. Hakim, and A.D. Wibawa, "The biometrics system based on iris image processing: a review", In 2019 2nd International Conference of Computer and Informatics Engineering (IC2IE)., Banyuwangi, Indonesia., 2019.
[http://dx.doi.org/10.1109/IC2IE47452.2019.8940832]
[61]
S.H. Moi, H. Asmuni, R. Hassan, and R.M. Othman, "A unified approach for unconstrained off-angle iris recognition", In 2014 International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, Malaysia, 2014.
[http://dx.doi.org/10.1109/ISBAST.2014.7013091]
[62]
G. Singh, R.K. Singh, R. Saha, and N. Agarwal, "IWT based iris recognition for image authentication", Procedia Comput. Sci., vol. 171, no. 9, pp. 1868-71876, 2020.
[http://dx.doi.org/10.1016/j.procs.2020.04.200]
[63]
J. Daugman, "Probing the uniqueness and randomness of iriscodes: results from 200 billion iris pair comparisons", Proc. of the IEEE, vol. 94, pp. 1927-1935, 2006.
[http://dx.doi.org/10.1109/JPROC.2006.884092]
[64]
M. Trokielewicz, and E. Bartuzi, " Cross-spectral iris recognition for mobile applications using high-quality color images", arXiv:1807.04061, 2018.
[http://dx.doi.org/10.48550/ARXIV.1807.04061]
[65]
ArsTECHNICA, Breaking the iris scanner locking Samsung’s galaxy S8 is laughable easy. Available From: https://arstechnica.com/information-technology/2017/05/breaking-the-iris-scanner-lockingsamsungs-galaxy-s8-is-laughably-easy/
[66]
S.W. Shah, and S.S. Kanhere, Recent trends in user authentication – a survey., vol. 7. IEEE Access, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2932400]
[67]
S. Venugopalan, and M. Savvides, "How to generate spoofed irises from an iris code template", IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, 2011.
[http://dx.doi.org/10.1109/TIFS.2011.2108288]
[68]
C. Rathgeb, and C. Busch, "On the feasibility of creating morphed iris-codes", In 2017 IEEE International Joint Conference on Biometrics (IJCB), Denver, CO, USA, 2017.
[http://dx.doi.org/10.1109/BTAS.2017.8272693]
[69]
V. Srivastava, B.K. Tripathi, and V.K. Pathak, "Biometric recognition by hybridization of evolutionary fuzzy clustering with functional neural networks", J Ambi. Intell. Humanized Comput., vol. 5, no. 525, p. 537, 2014.
[http://dx.doi.org/10.1007/s12652-012-0161-8]
[70]
F. Kausar, "Iris based cancelable biometric cryptosystem for secure healthcare smart card", Egyptian Inform J, vol. 22, no. 4, pp. 447-453, 2021.
[http://dx.doi.org/10.1016/j.eij.2021.01.004]
[71]
L. Sigal, S. Sclaroff, and V. Athitsos, "Skin color-based video segmentation under time-varying illumination", In: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 26. 2004no. 7, .
[http://dx.doi.org/10.1109/TPAMI.2004.35]
[72]
N.R. Borkar, and S. Kuwelkar, "Real-time implementation of face recognition system", In 2017 International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2017.
[http://dx.doi.org/10.1109/ICCMC.2017.8282685]
[73]
N. Kumar, A. Berg, P.N. Belhumeur, and S. Nayar, "Describable visual attributes for face verification and image search", In: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33. 2011no. 10, .
[http://dx.doi.org/10.1109/TPAMI.2011.48]
[74]
Z. Lei, M. Pietikainen, and S.Z. Li, "Learning discriminant face descriptor", IEEE Trans. Pattern Anal. Mach. Intell., vol. 36, no. 2, pp. 289-302, 2014.
[http://dx.doi.org/10.1109/TPAMI.2013.112]
[75]
Z. Lei, S. Liao, M. Pietikäinen, and S.Z. Li, "Face recognition by exploring information jointly in space, scale and orientation", In: IEEE Transactions on Image Processing, vol. 20. 2011no. 1, .
[http://dx.doi.org/10.1109/TIP.2010.2060207]
[76]
P. Li, Y. Fu, U. Mohammed, J.H. Elder, and S.J.D. Prince, "Probabilistic models for inference about identity", In: IEEE Transactions on Pattern Analysis and Machine Intelligence., vol. 34. 2012no. 1, .
[http://dx.doi.org/10.1109/TPAMI.2011.104]
[77]
S. Sharma, M. Bhatt, and P. Sharma, "Face recognition system using machine learning algorithm", In 2020 5th International Conference on Communication and Electronics Systems (ICCES)., Coimbatore, India., 2020.
[http://dx.doi.org/10.1109/ICCES48766.2020.9137850]
[78]
G. Mai, K. Cao, P.C. Yuen, and A.K. Jain, "On the reconstruction of face images from deep face templates", In: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41. 2019no. 5, .
Coimbatore, India. [http://dx.doi.org/10.1109/TPAMI.2018.2827389]
[79]
D. Wen, "Face spoof detection with image distortion analysis", IEEE Trans. on Inf. Forensics and Security, vol. 10, no. 4, 2015.
[http://dx.doi.org/10.1109/TIFS.2015.2400395]
[80]
N. Kose, and J-L. Dugelay, "On the vulnerability of face recognition systems to spoofing mask attacks", In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada, 2013.
[http://dx.doi.org/10.1109/ICASSP.2013.6638076]
[81]
J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J. Ortega-Garcia, "On the vulnerability of face verification systems to hill-climbing attacks", Pattern Recogn., vol. 43, no. 3, pp. 1027-1038, 2010.
[http://dx.doi.org/10.1016/j.patcog.2009.08.022]
[82]
U. Scherhag, R. Raghavendra, K.B. Raja, M. Gomez-Barrero, C. Rathgeb, and C. Busch, "On the vulnerability of face recognition systems towards morphed face attacks", In 2017 5th International Workshop on Biometrics and Forensics (IWBF)., Coventry, UK., 2017.
[http://dx.doi.org/10.1109/IWBF.2017.7935088]
[83]
S. Yadav, and V.P. Vishwakarma, Extended interval type-II and kernel based sparse representation method for face recognition.Expert Systems with Applications., vol., vol. 116. Elsevier: Amsterdam, 2019, pp. 265-274.
[http://dx.doi.org/10.1016/j.eswa.2018.09.032]
[84]
Y. Xie, P. Li, N. Nedjah, B.B. Gupta, D. Taniar, and J. Zhang, Privacy protection framework for face recognition in edge-based Internet of Things. Cluster Computing., Springer Science and Business Media LLC: Germany, 2022.
[http://dx.doi.org/10.1007/s10586-022-03808-8]
[85]
M. Watanabe, T. Endoh, M. Shiohara, and S. Sasaki, "Palm vein authentication technology and its applications", In Proceedings of the biometric consortium conference, VA, USA, 2005, pp. 19-21
[86]
S. Elnasir, and S.M. Shamsuddin, "Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier", In 2014 International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, Malaysia, 2014.
[http://dx.doi.org/10.1109/ISBAST.2014.7013096]
[87]
J-C. Lee, "A novel biometric system based on palm vein image", Pattern Recogn. Lett., vol. 433, no. 12, pp. 1520-1528, 2012.
[http://dx.doi.org/10.1016/j.patrec.2012.04.007]
[88]
P.E. Yunanto, H. Nugroho, and W.T. Agung Budi, "Automatic features reduction procedures in palm vein recognition", In 2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS), Malang, Indonesia, 2016.
[http://dx.doi.org/10.1109/ICACSIS.2016.7872738]
[89]
M.H. Abed, A.H. Alsaeedi, A.D. Alfoudi, A.M. Otebolaku, and Y.S. Razooqi, "Palm Vein Identification based on hybrid features selection model", arXiv:2007.16195, 2020.
[http://dx.doi.org/10.48550/ARXIV.2007.16195]
[90]
O. Toygar, F.O. Babalola, and Y. Bitirim, "FYO: A novel multimodal vein database with palmar, dorsal and wrist biometrics", IEEE Access, vol. 8, no. 1, pp. 82461-82470, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2991475]
[91]
L. Zhang, Z. Cheng, Y. Shen, and D. Wang, "Palmprint and palmvein recognition based on DCNN and A new large-scale contactless palmvein dataset", Symmetry, vol. 10, no. 4, p. 78, 2018.
[http://dx.doi.org/10.3390/sym10040078]
[92]
P. Cancian, G.W. Di Donato, V. Rana, and M.D. Santambrogio, "An embedded Gabor-based palm vein recognition system", In: IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), 2017.
Orlando, FL, USA [http://dx.doi.org/10.1109/BHI.2017.7897291]
[93]
T.A.B. Wirayuda, "Palm vein recognition based-on minutiae feature and feature matching", In International Conference on Electrical Engineering and Informatics (ICEEI), Denpasar, Indonesia, 2015.
[http://dx.doi.org/10.1109/ICEEI.2015.7352525]
[94]
A. Uhl, C. Busch, S. Marcel, and R. Veldhuis, Advances in computer vision and pattern recognition. Handbook of Vascular Biometrics., Springer International Publishing: New York, 2020.
[http://dx.doi.org/10.1007/978-3-030-27731-4]
[95]
M. Sayed, "Palm vein authentication based on the coset decomposition method", J Inform. Secur, vol. 6, no. 3, 2015.
[http://dx.doi.org/10.4236/jis.2015.63020]
[96]
W. Kang, and Q. Wu, "Contactless Palm Vein Recognition Using a Mutual Foreground-Based Local Binary Pattern", IEEE Transactions on Information Forensics and Security., vol. 9, no. 11, 2014.
[http://dx.doi.org/10.1109/TIFS.2014.2361020]
[97]
X. Yan, F. Deng, and W. Kang, "Palm Vein Recognition Based on Multi-algorithm and Score-Level Fusion", In Seventh International Symposium on Computational Intelligence and Design, Hangzhou, China, 2014.
[http://dx.doi.org/10.1109/ISCID.2014.93]
[98]
J. Wang, and G. Wang, "Quality-specific hand vein recognition system", IEEE Trans. on Inf. on Forensics and Security, 2017.
[http://dx.doi.org/10.1109/TIFS.2017.2713340]
[99]
X. Yan, W. Kang, F. Deng, and Q. Wu, "Palm vein recognition based on multi-sampling and feature-level fusion", Neurocomputing, vol. 151, pp. 798-807, 2015.
[http://dx.doi.org/10.1016/j.neucom.2014.10.019]
[100]
F. Ahmad, L-M. Cheng, and A. Khan, "Lightweight and privacy-preserving template generation for palm-vein-based human recognition", IEEE Trans. on Inf. on Forensics and Security, 2019.
[http://dx.doi.org/10.1109/TIFS.2019.2917156]
[101]
K. Nandakumar, and A.K. Jain, "Biometric Template Protection: Bridging the performance gap between theory and practice", IEEE Signal Processing Magazine., vol. 32, no. 5, 2015.
[http://dx.doi.org/10.1109/MSP.2015.2427849]
[102]
J. Bringer, H. Chabanne, and A. Patey, "Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends", IEEE Signal Processing Magazine., vol. 30, no. 2, 2013.
[http://dx.doi.org/10.1109/MSP.2012.2230218]
[103]
R.L. Lagendijk, and M. Barni, "Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation", IEEE Signal Processing Magazine., vol. 30, no. 1, 2013.
[http://dx.doi.org/10.1109/MSP.2012.2219653]
[104]
Y. Zhou, and A. Kumar, "Human identification using palm-vein images", IEEE Transactions on Information Forensics and Security., vol. 6, no. 4, 2011.
[http://dx.doi.org/10.1109/TIFS.2011.2158423]
[105]
R. Ramachandra, K.B. Raja, S.K. Venkatesh, and C. Busch, "Design and development of low-cost sensor to capture ventral and dorsal finger vein for biometric authentication", IEEE Sensors Journal, vol. 19, no. 15, pp. 6102-6111, 2019.
[http://dx.doi.org/10.1109/JSEN.2019.2906691]
[106]
J-G. Wang, W-Y. Yau, A. Suwandy, and E. Sung, "Person recognition by fusing palmprint and palm vein images based on “Laplacianpalm” representation", Pattern Recognit., vol. 41, no. 5, pp. 1514-1527, 2008.
[http://dx.doi.org/10.1016/j.patcog.2007.10.021]
[107]
K-S. Wu, J-C. Lee, T-M. Lo, K-C. Chang, and C-P. Chang, "A secure palm vein recognition system", J. Syst. Softw., vol. 83, no. 11, pp. 2870-2876, 2013.
[http://dx.doi.org/10.1016/j.jss.2013.06.065]
[108]
W-Y. Han, and J-C. Lee, "Palm vein recognition using adaptive Gabor filter", Expert Syst. Appl., vol. 39, no. 18, pp. 13225-13234, 2012.
[http://dx.doi.org/10.1016/j.eswa.2012.05.079]
[109]
Y. Aberni, L. Boubchir, and B. Daachi, "Palm vein recognition based on competitive coding scheme using multi-scale local binary pattern with ant colony optimization", Pattern Recogn. Lett., vol. 136, pp. 101-110, 2020.
[http://dx.doi.org/10.1016/j.patrec.2020.05.030]
[110]
E. Huseynov, and J-M. Seigneur, Context-aware multifactor authentication survey. Computer and Information Security Handbook., 3rd Edi., Elsevier: Amsterdam, 2017.
[http://dx.doi.org/10.1016/B978-0-12-803843-7.00050-8]
[111]
D. Hanny, M.A. Pachano, L.G. Thompson, and J. Banks, RFID Applied., Wiley: United Kingdom, 2007.
[112]
"The best Tech products and services", Available From: https://www.pcmag.com/picks/the-best-tech-products
[113]
"Multifactor authentication", Available from: https://duo.com/
[114]
J. Zhang, X. Tan, X. Wang, A. Yan, and Z. Qin, "T2FA: Transparent two-factor authentication", IEEE Access, vol. 6, pp. 32677-32686, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2844548]
[115]
A.A.S. AlQahtani, H. Alamleh, and J. Gourd, "0EISUA: zero effort indoor secure user authentication", EEE Access, vol. 8, pp. 79069-79078, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2990604]
[116]
F. Zhang, A. Kondoro, and S. Muftic, "Location-based authentication and authorization using smart phones", In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications., 2012.
Liverpool, UK. [http://dx.doi.org/10.1109/TrustCom.2012.198]
[117]
S.W. Shah, and S.S. Kanhere, "Wi-Auth: WiFi based second factor user authentication", In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017.
[http://dx.doi.org/10.1145/3144457.3144468]
[118]
E. Erdem, and M.T. Sandikkaya, "OTPaaS—one time password as a service", IEEE Transactions on Information Forensics and Security., vol. 14, no. 3, pp. 743-756, 2019.
[http://dx.doi.org/10.1109/TIFS.2018.2866025]
[119]
S.H. Khan, M. Ali Akbar, F. Shahzad, M. Farooq, and Z. Khan, "Secure biometric template generation for multi-factor authentication", Pattern Recognit., vol. 48, no. 2, pp. 458-472, 2015.
[http://dx.doi.org/10.1016/j.patcog.2014.08.024]
[120]
D. Wang, and P. Wang, "Two birds with one stone: two-factor authentication with security beyond conventional bound", IEEE Trans. on Dependable and Secure Computing, vol. 99, pp. 1-22, 2016.
[http://dx.doi.org/10.1109/TDSC.2016.2605087]
[121]
S. Fatahpour, "Token based privacy preserving and authentication technique for wireless mobile networks", In 2018 4th International Conference on Web Research (ICWR)., 2018.
Tehran, Iran. [http://dx.doi.org/10.1109/ICWR.2018.8387253]
[122]
T. Limbasiya, M. Soni, and S.K. Mishra, "Advanced formal authentication protocol using smart cards for network applicants", Comput. Electr. Eng., vol. 66, pp. 50-63, 2018.
[http://dx.doi.org/10.1016/j.compeleceng.2017.12.045]
[123]
M.A. Hassan, and Z. Shukur, "A secure multi factor user authentication framework for electronic payment system", In 2021 3rd International Cyber Resilience Conference (CRC)., 2021.
Langkawi Island, Malaysia. [http://dx.doi.org/10.1109/CRC50527.2021.9392564]
[124]
H. Khalid, S.J. Hashim, S.M.S. Ahmad, F. Hashim, and M.A. Chaudhary, "SELAMAT: A new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT Systems", Sensors, vol. 21, no. 4, p. 1428, 2021.
[http://dx.doi.org/10.3390/s21041428]
[125]
A. Sinha, G. Shrivastava, and P. Kumar, "A pattern-based multi-factor authentication system", Scalable Computing: Practice and Experience, vol. 20, no. 1, 2019.
[http://dx.doi.org/10.12694/scpe.v20i1.1460]
[126]
M. Sajjad, S. Khan, T. Hussain, K. Muhammad, A.K. Sangaiah, A. Castiglione, C. Esposito, and S.W. Baik, "CNN-based anti-spoofing two-tier multi-factor authentication system", Pattern Recognit. Lett., vol. 126, pp. 123-131, 2019.
[http://dx.doi.org/10.1016/j.patrec.2018.02.015]
[127]
W. Liu, X. Wang, and W. Peng, "Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing internet of things", IEEE Access, vol. 8, pp. 8754-8767, 2020.
[http://dx.doi.org/10.1109/ACCESS.2019.2962912]
[128]
J. Kim, and N. Park, "Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing", Pers. and Ubiquitous Comput., vol. 26, pp. 345-353, 2022.
[http://dx.doi.org/10.1007/s00779-019-01299-w]
[129]
L. Wu, J. Yang, M. Zhou, Y. Chen, and Q. Wang, "LVID: A multimodal biometrics authentication system on smartphones", IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1572-1585, 2022.
[http://dx.doi.org/10.1109/TIFS.2019.2944058]
[130]
X. Zhang, D. Cheng, P. Jia, Y. Dai, and X. Xu, "An efficient android-based multimodal biometric authentication system with face and voice", IEEE Access, vol. 8, .
IEEE, pp. 102757-102772. [http://dx.doi.org/10.1109/ACCESS.2020.2999115]
[131]
P. Gupta, and P. Gupta, "Multibiometric authentication system using slap fingerprints, palm dorsal vein, and hand geometry", IEEE Transactions on Industrial Electronics, vol. 65, no. 12, pp. 9777-9784, 2018.
[http://dx.doi.org/10.1109/TIE.2018.2823686]
[132]
A. Othman, and A. Ross, "Fingerprint + Iris = IrisPrint", SPIE Defense + Security, 2015.
Baltimore, MD, United States. [http://dx.doi.org/10.1117/12.2181075]
[133]
M. Wazid, A.K. Das, R. Hussain, G. Succi, and J.J.P.C. Rodrigues, "Authentication in cloud-driven IoT-based big data environment: Survey and outlook", Journal of Systems Architecture, vol. 97, pp. 185-196, 2019.
[http://dx.doi.org/10.1016/j.sysarc.2018.12.005]
[134]
R. Pirmagomedov, and Y. Koucheryavy, "IoT technologies for Augmented Human: A survey", Internet of Things, vol. 14, 2021.100120
[http://dx.doi.org/10.1016/j.iot.2019.100120]
[135]
S. Vhaduri, and C. Poellabauer, "Multi-modal biometric-based implicit authentication of wearable device users", IEEE Trans. Inf. Forensics Security, vol. 14, no. 12, pp. 3116-3125, 2019.
[http://dx.doi.org/10.1109/TIFS.2019.2911170]
[136]
L. Zhang, Y. Zhu, W. Ren, Y. Zhang, and K.K.R. Choo, "Privacy-preserving fast three-factor authentication and key agreement for IoT-based E-health systems", IEEE Trans. Serv. Comput., vol. 16, no. 2, pp. 1324-1333, 2023.
[http://dx.doi.org/10.1109/TSC.2022.3149940]
[137]
S. Vhaduri, S.V. Dibbo, and W. Cheung, "HIAuth: A hierarchical implicit authentication system for IoT wearables using multiple biometrics", IEEE Access, vol. 9, pp. 116395-116406, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3105481]
[138]
X. Dong, M.K. Khan, L. Leng, and A.B.J. Teoh, "Co-learning to hash palm biometrics for flexible IoT deployment", IEEE Internet Things J., vol. 9, no. 23, pp. 23786-23794, 2022.
[http://dx.doi.org/10.1109/JIOT.2022.3190020]
[139]
T. Alladi, S. Chakravarty, V. Chamola, and M. Guizani, "A lightweight authentication and attestation scheme for in-transit vehicles in IoV scenario", IEEE Trans. Vehicular Technol., vol. 69, no. 12, pp. 14188-14197, 2020.
[http://dx.doi.org/10.1109/TVT.2020.3038834]
[140]
Q. Jiang, N. Zhang, J. Ni, J. Ma, X. Ma, and K.K.R. Choo, "Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles", IEEE Trans. Vehicular Technol., vol. 69, no. 9, pp. 9390-9401, 2020.
[http://dx.doi.org/10.1109/TVT.2020.2971254]
[141]
A. Hassan, A. George, L. Varghese, M. Antony, and K.K. Sherly, "The biometric cardless transaction with shuffling keypad using proximity sensor", In 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), 2020, pp. 505-508
Coimbatore, India. [http://dx.doi.org/10.1109/ICIRCA48905.2020.9183314]
[142]
M. Stokkenes, R. Ramachandra, and C. Busch, "Biometric transaction authentication using smartphones", In 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), 2018, pp. 1-5
Darmstadt, Germany. [http://dx.doi.org/10.23919/BIOSIG.2018.8553577]
[143]
C-H. Liu, and Y-F. Chung, "Secure user authentication scheme for wireless healthcare sensor networks", Comput. Electr. Eng., vol. 59, pp. 250-261, 2017.
[http://dx.doi.org/10.1016/j.compeleceng.2016.01.002]
[144]
R. Amin, S.H. Islam, G.P. Biswas, M.K. Khan, and N. Kumar, "A robust and anonymous patient monitoring system using wireless medical sensor networks", Future Gener. Comput. Syst., vol. 80, pp. 483-495, 2018.
[http://dx.doi.org/10.1016/j.future.2016.05.032]
[145]
R.A.A. Helmi, M.N.B. Hishamuddin, A. Jamal, M.G.M. Johar, and L.F. Sim, "Quantum application: a smart cashier-less shopping application with biometric payment authentication", In 2021 IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2021.
Penang, Malaysia. [http://dx.doi.org/10.1109/ISCAIE51753.2021.9431840]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy