Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F09%3APU82623" target="_blank" >RIV/00216305:26230/09:PU82623 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication
Popis výsledku v původním jazyce
Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It's not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and how new behavioral biometric suitable for this approach - visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it's suitable only for liveness testing or it'
Název v anglickém jazyce
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication
Popis výsledku anglicky
Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It's not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and how new behavioral biometric suitable for this approach - visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it's suitable only for liveness testing or it'
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
Z - Vyzkumny zamer (s odkazem do CEZ)
Ostatní
Rok uplatnění
2009
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
The Fourth International Conference on Internet Monitoring and Protection
ISBN
978-0-7695-3612-5
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
—
Název nakladatele
IEEE Computer Society
Místo vydání
Venice
Místo konání akce
Venice/Mestre
Datum konání akce
24. 5. 2009
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—