EconPapers    
Economics at your fingertips  
 

A novel and smarter model to authenticate and identify people intelligently for security purposes

Hajar Kavusi, Keivan Maghooli () and Siamak Haghipour
Additional contact information
Hajar Kavusi: Islamic Azad University
Keivan Maghooli: Islamic Azad University
Siamak Haghipour: Islamic Azad University

Telecommunication Systems: Modelling, Analysis, Design and Management, 2023, vol. 82, issue 1, No 3, 27-43

Abstract: Abstract In recent years, security concerns, including document fraud and identity theft, terrorism, and cybercrime have led to the growth and development of biometric technologies, and in general, all activities related to biometric research have gained momentum. This research presents a more intelligent methodology for authenticating and verifying one's identity while reading and typing a text. Threats to e-commerce security are wreaking havoc on online trade via a variety of nefarious methods. Thus, this method can be implemented to furtively identify these attacks and impede them, using a variety of texts to study. We refer to the authentication as a behavioral biometric technology based on how people look when typing in which the visual information was implemented to verify the identity of 35 users while typing via using an eye tracker device. Hence, we have employed the two-layer perceptron neural network to model the learning phase in the object recognition process. The fusion of eye tracker device information and two-layer perceptron neural network coefficients was done at the decision level, and we have achieved an average of 98.97%, 98.76% and 98.86% for sensitivity, specificity and accuracy, respectively. By the combination of biometric technology products as well as modern computer technology, it is easy to perform monitoring, management, systems integration, automated management, and security applications.

Keywords: Authentication; Biometrics; Perceptron neural network; Decision level (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
http://link.springer.com/10.1007/s11235-022-00957-4 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:82:y:2023:i:1:d:10.1007_s11235-022-00957-4

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-022-00957-4

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:82:y:2023:i:1:d:10.1007_s11235-022-00957-4