Audio-visual biometric authentication for secured access into personal devices

Q. Memon, Z. AlKassim, E. AlHassan, M. Omer, M. Alsiddig

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

The security of data is becoming a challenge, as newer smarter devices with increasingly more memory are appearing in the market. Currently, most of the user data remains on personal devices, when the user is either mobile or at workplace. The username and password are turning out to be old-fashioned techniques for secured access. In this work, a multimodal biometric authentication technique is propose to boost access security of such devices. Face recognition, speaker identification along with uttered word are fused together to determine authentication score before access to devices is granted. Experimental results show that as the number of biometric modes is increased, greater trust and satisfaction is experienced by the user.

Original languageEnglish
Title of host publicationProceedings of 2017 6th International Conference on Bioinformatics and Biomedical Science, ICBBS 2017
PublisherAssociation for Computing Machinery
Pages85-89
Number of pages5
ISBN (Electronic)9781450352222
DOIs
Publication statusPublished - Jun 22 2017
Event6th International Conference on Bioinformatics and Biomedical Science, ICBBS 2017 - Singapore, Singapore
Duration: Jun 22 2017Jun 24 2017

Publication series

NameACM International Conference Proceeding Series
VolumePart F130950

Other

Other6th International Conference on Bioinformatics and Biomedical Science, ICBBS 2017
Country/TerritorySingapore
CitySingapore
Period6/22/176/24/17

Keywords

  • Authentication
  • Biometric
  • Machine Intelligence
  • Multimodal Authentication
  • Secured Access
  • Security

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Audio-visual biometric authentication for secured access into personal devices'. Together they form a unique fingerprint.

Cite this