scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Evaluating the validity of music as an authentication key

TL;DR: In this article, the authors investigated the validity of music as an authentication key and verified the usefulness of music-based personal authentication through some experiments, and used music as a key for a personal authentication system.
Abstract: In this paper, we investigate the validity of music as an authentication key. Recently, it is often necessary to use a personal authentication system when we would like to use web sites and personalized systems. We often need to memorize a password to use them. Although a long password is preferable from system side, it is not preferable from user side because it is hard to remember it. Although a short password is preferable from user side, it is not preferable from system side because it is easy to crack it. We aim to solve this problem by using music as a key for a personal authentication system. We verified the usefulness of music-based personal authentication through some experiments.
References
More filters
Book
06 Sep 2005
TL;DR: The favorite biometric user authentication for it security from fundamentals to handwriting book as the choice today is offered.
Abstract: It's coming again, the new collection that this site has. To complete your curiosity, we offer the favorite biometric user authentication for it security from fundamentals to handwriting book as the choice today. This is a book that will show you even new to old thing. Forget it; it will be right for you. Well, when you are really dying of biometric user authentication for it security from fundamentals to handwriting, just pick it. You know, this book is always making the fans to be dizzy if not to find.

90 citations

Journal ArticleDOI
01 Feb 2018
TL;DR: Results show that biometrics authentication significantly influences the individual's security concern, perceived usefulness, and trust of online store, and the willingness to continue using the website account associated with the payment authentication method.
Abstract: Biometrics authentication for electronic payment is generally viewed as a quicker, convenient and a more secure means to identify and authenticate users for online payment. This view is mostly anecdotal and conceptual is nature. The aim of the paper is to shed light on the comparison of perceptions and beliefs of different authentication methods for electronic payment (i.e., credit card, credit card with PIN, and fingerprint biometrics authentication) in an e-commerce context. As theoretical foundation, the valence framework is used in understanding and explaining the individual's evaluation of benefit and risk concerning the payment methods. We propose a research model with hypotheses that evaluate and compare the individual's perceptions of the payment authentication methods, trust of the online store, and the willingness to continue using the website account associated with the payment authentication method. An experiment is used to test the hypotheses. The results show that biometrics authentication significantly influences the individual's security concern, perceived usefulness, and trust of online store. Theoretically, through the study's context – biometrics versus credit card authentication – evidence is provided for the importance of the individual's perceptions, concerns, and beliefs in the use of biometrics for electronic payments. Managerial implications include shedding light on the perceptions and concerns of secure authentication and the need for implementing biometrics authentication for electronic payments.

81 citations

Journal ArticleDOI
TL;DR: An iris recognition algorithm, namely Cumulative SUMs, and a well-known technique in the image forensic field for camera source identification based on the extraction of the Sensor Pattern Noise are adopted leading to a system with a good trade-off between ease of use and accuracy.

65 citations

Journal ArticleDOI
TL;DR: In this article, the authors presented the method and results of a systematic qualitative research of 20 BPD female patients undergoing individual psychoanalytical music therapy in an acute psychiatric context, identifying typical interaction patterns arising from the relationship between patient and therapist and also from the significance of music.
Abstract: Music therapy for patients suffering from borderline personality disorder (BPD) has been a standard treatment option for many years in in-patient psychiatric work The BPD symptoms, such as identity disturbance, emotional regulation and unstable relationships, lead to challenging and stormy therapy sessions for all therapists of all disciplines In music therapy, difficulties in treatment include, for example, the patient’s refusal to play, extreme loud music or withdrawal from the process This article presents the method and results of a systematic qualitative research of 20 BPD female patients undergoing individual psychoanalytical music therapy in an acute psychiatric context The aim of the research was to identify typical interaction patterns, arising from the relationship between patient and therapist and also from the significance of music The method “forming types by understanding” is based on the well-known sociological research method of “ideal types” Abstracted results are generated by contr

31 citations

Proceedings ArticleDOI
01 Jan 2018
TL;DR: The paper proposes the iris recognition algorithm for identity authentication, which includes iris image preprocessing, iris boundaries�location and iris segmentation, normalization, iri texture feature extraction and matching, and the algorithm based on the line segment extraction is used to normalize the image after the position.
Abstract: Iris recognition is very accurate and stable,it has been widely applied in finance, border control and access control,etc. The paper proposes the iris recognition algorithm for identity authentication. The algorithm includes iris image preprocessing, iris boundaries�location and iris segmentation, normalization, iris texture feature extraction and matching. Firstly, the iris image is pretreated by median filter and improved salt and pepper algorithm to reduce noise. Second, the iris is modeled by gray projection method for rough position, and the inner boundary of the iris is precisely positioned by point Hough transform(PHT), while the outer boundary of the iris is precisely positioned by the improved Daugman algorithm. Third, the algorithm based on the line segment extraction is used to normalize the image after the position and the wavelet transform is used to extract the feature after normalization. Finally, the two iris are identified by calculating the Hamming distance of the two iris codes. The experimental results show that the accuracy of the system is 97.8%.

12 citations