CFP last date
20 January 2025
Reseach Article

Integration of Biometric based Authentication Mechanisms to Prevent ‘Shoulder Surfing’

by Hardik Garg, Shibu Dubey, Shabnam Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 31
Year of Publication: 2018
Authors: Hardik Garg, Shibu Dubey, Shabnam Sharma
10.5120/ijca2018918284

Hardik Garg, Shibu Dubey, Shabnam Sharma . Integration of Biometric based Authentication Mechanisms to Prevent ‘Shoulder Surfing’. International Journal of Computer Applications. 182, 31 ( Dec 2018), 29-32. DOI=10.5120/ijca2018918284

@article{ 10.5120/ijca2018918284,
author = { Hardik Garg, Shibu Dubey, Shabnam Sharma },
title = { Integration of Biometric based Authentication Mechanisms to Prevent ‘Shoulder Surfing’ },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2018 },
volume = { 182 },
number = { 31 },
month = { Dec },
year = { 2018 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number31/30227-2018918284/ },
doi = { 10.5120/ijca2018918284 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:00.586283+05:30
%A Hardik Garg
%A Shibu Dubey
%A Shabnam Sharma
%T Integration of Biometric based Authentication Mechanisms to Prevent ‘Shoulder Surfing’
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 31
%P 29-32
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays the world has migrated to a social media platform where a social platform is prerequisite for data sharing which is done through texts, multimedia and electronic data over Whatsapp, Instagram, Messenger and many more common platforms where one may be talking about business plans, while some may be talking about their personal lives or they might be sharing any type of confidential information. But what if there are possibilities that someone else can access your confidential data or one can crack your passwords through performing social engineering attacks or many more patches if found and misuse your data or modify it, thus your data is at risk. In today’s era security is one of the major concerns and the deciding factor for the growth and advancement of the services through a vendor or to an individual, this security can be enforced through different medium either physical or biological security depends which is more preferable according to the scenario. The technology is working to develop a strong and authenticated security system which will not only authorize the user but will provide authentication parameters for the access of his/her data or data sharing platforms, thus trying to build and implement the advancement of biometrics which requires the measurement of biological characteristics such as fingerprint, retina image, iris pattern, retina image or palm geometry or the unique behavior characteristics using cryptography, technology traits and various secure algorithms and advancement in biometrics which will help to overcome the patches in confidentiality, integrity and availability of data.

References
  1. Zhang, D., Lu, G., & Zhang, L. (2018). Advanced Biometrics. Springer International Publishing.
  2. Zhang, D. D. (2013). Automated biometrics: Technologies and systems (Vol. 7). Springer Science & Business Media.
  3. Chao, L., Yang, Y. X., & Niu, X. X. (2006). Biometric-based personal identity-authentication system and security analysis. The Journal of China Universities of Posts and Telecommunications, 13(4), 43-47.
  4. Duta, N. (2009). A survey of biometric technology based on hand shape. Pattern Recognition, 42(11), 2797-2806.
  5. .Monrose, F., & Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future GenerKhitrov, M. (2013). Talking passwords: voice biometrics for data access and security. Biometric Technology Today, 2013(2), 9-11.ation computer systems, 16(4), 351-359.
  6. Khitrov, M. (2013). Talking passwords: voice biometrics for data access and security. Biometric Technology Today, 2013(2), 9-11.
  7. Schneier, B. (1999). The uses and abuses of biometrics. Communications of the ACM, 42(8), 136-136.
  8. Fenu, G., Marras, M., & Boratto, L. (2018). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters, 113, 83-92.
  9. Fierrez, J., Morales, A., Vera-Rodriguez, R., & Camacho, D. (2018). Multiple classifiers in biometrics. Part 2: Trends and challenges. Information Fusion, 44, 103-112.
  10. Elhoseny, M., Elkhateb, A., Sahlol, A., & Hassanien, A. E. (2018). Multimodal biometric personal identification and verification. In Advances in Soft Computing and Machine Learning in Image Processing (pp. 249-276). Springer, Cham.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Biometrics Cryptography Social engineering