Proceedings ArticleDOI
A Proposal of Music-Based Personal Authentication System
Shusei Narumi,Mitsuharu Matsumoto +1 more
- pp 356-359
TLDR
This paper describes a concept of music-based personal authentication, which pays attention to the feature of music and discusses the potential of music for personal authentication system.Abstract:
This paper describes a concept of music-based personal authentication. In recent years we frequently need to use personal authentication system to use the Internet and so on. Password is a popular way for personal authentication. However, long password is not good for remembering, while short password is not good for protecting. In the proposed method, we pay attention to the feature of music and discuss the potential of music for personal authentication system.read more
Citations
More filters
Proceedings ArticleDOI
Evaluating the validity of music as an authentication key
TL;DR: In this article, the authors investigated the validity of music as an authentication key and verified the usefulness of music-based personal authentication through some experiments, and used music as a key for a personal authentication system.
References
More filters
Book ChapterDOI
Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images
Tetsuji Takada,Hideki Koike +1 more
TL;DR: This paper proposes a novel authentication method called Awase-E, which uses image passwords and integrates image registration and notification interfaces and ensures that it has a higher usability even when it is used through a mobile phone.
Journal ArticleDOI
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems
Aditi Roy,Nasir Memon,Arun Ross +2 more
TL;DR: This paper exposes a potential vulnerability of partial fingerprint-based authentication systems, especially when multiple impressions are enrolled per finger, and indicates that it is indeed possible to locate or generate partial fingerprints that can be used to impersonate a large number of users.
Book
Biometric User Authentication for IT Security: From Fundamentals to Handwriting
TL;DR: The favorite biometric user authentication for it security from fundamentals to handwriting book as the choice today is offered.
Journal ArticleDOI
Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment
Obi Ogbanufe,Dan Jong Kim +1 more
TL;DR: Results show that biometrics authentication significantly influences the individual's security concern, perceived usefulness, and trust of online store, and the willingness to continue using the website account associated with the payment authentication method.