A novel and smarter model to authenticate and identify people intelligently for security purposes
Hajar Kavusi,
Keivan Maghooli () and
Siamak Haghipour
Additional contact information
Hajar Kavusi: Islamic Azad University
Keivan Maghooli: Islamic Azad University
Siamak Haghipour: Islamic Azad University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2023, vol. 82, issue 1, No 3, 27-43
Abstract:
Abstract In recent years, security concerns, including document fraud and identity theft, terrorism, and cybercrime have led to the growth and development of biometric technologies, and in general, all activities related to biometric research have gained momentum. This research presents a more intelligent methodology for authenticating and verifying one's identity while reading and typing a text. Threats to e-commerce security are wreaking havoc on online trade via a variety of nefarious methods. Thus, this method can be implemented to furtively identify these attacks and impede them, using a variety of texts to study. We refer to the authentication as a behavioral biometric technology based on how people look when typing in which the visual information was implemented to verify the identity of 35 users while typing via using an eye tracker device. Hence, we have employed the two-layer perceptron neural network to model the learning phase in the object recognition process. The fusion of eye tracker device information and two-layer perceptron neural network coefficients was done at the decision level, and we have achieved an average of 98.97%, 98.76% and 98.86% for sensitivity, specificity and accuracy, respectively. By the combination of biometric technology products as well as modern computer technology, it is easy to perform monitoring, management, systems integration, automated management, and security applications.
Keywords: Authentication; Biometrics; Perceptron neural network; Decision level (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
http://link.springer.com/10.1007/s11235-022-00957-4 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:82:y:2023:i:1:d:10.1007_s11235-022-00957-4
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-022-00957-4
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().