Abstract

Due to upsurge use of internet and technology which has simplified our lives to a greater extent has also exposed the various hidden threats is a matter for huge concern. Spawning of these threats occurs due to negligence or concealed vulnerabilities. To safeguard the system and distinguish between genuine and imposter an infallible system needs to be implemented. It is a testing zone of security and practice. User name and password have certain drawbacks and by using different permutations and combinations they can be decoded. Biometrics is used as one of the most convenient modes of user authentication. The two methods that are widely used in the field of biometrics are physiological and behavioral biometrics. Physiological biometrics takes into account the biological aspects such as fingerprints, DNA fingerprinting or handprint. But these are many user authentication methods that are widely used but they are rife with holes and flaws. For better authentication behavioral biometrics [1] methods have been introduced in which an insight into the behavioral aspects such as keystroke dynamics, speech, gait, and lip movement. As these methods do not require any external hardware they are more convenient to use. By calculating dwell time that is the time when the key is pressed and flight time when the key is released various parameters are taken into account. Based on this problem statement in this research work we will compare the different solutions to solve the aforementioned problems using keystroke dynamics like face recognition, fingerprint, iris recognition, keystroke, etc on smartphones and touch mobile devices, as an authentication approach, and compare them with the traditional approach.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.