2020
DOI: 10.1007/978-3-030-39749-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics

Abstract: Today's biometric authentication systems are still struggling with replay attacks and irrevocable stolen credentials. This paper introduces a biometric protocol that addresses such vulnerabilities. The approach prevents identity theft by being based on memory creation biometrics. It takes inspiration from two different authentication methods, eye biometrics and challenge systems, as well as a novel biometric feature: the pupil memory effect. The approach can be adjusted for arbitrary levels of security, and cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…Challenges can also vary in degree of conscious control someone has over starting and/or halting processing the challenge in the scope of the biometric system. Users can have full control over the response, e.g., speaking a challenge word [14], or the response can be mostly automated and/or reflexive, e.g., pupil dilation changes in response to certain stimuli [15].…”
Section: Process Controlled To Automatedmentioning
confidence: 99%
See 4 more Smart Citations
“…Challenges can also vary in degree of conscious control someone has over starting and/or halting processing the challenge in the scope of the biometric system. Users can have full control over the response, e.g., speaking a challenge word [14], or the response can be mostly automated and/or reflexive, e.g., pupil dilation changes in response to certain stimuli [15].…”
Section: Process Controlled To Automatedmentioning
confidence: 99%
“…Other time, the security of the challenge-response protocol relies strongly on the user having had some form of practice during initial phases of application use. In [15], patterns in pupil dilation are used for verification, which arise from the presentation of a sequence of novel and non-novel pictures. It is possible to determine (non-)novelty, because users were presented with a sufficiently individualized selection of pictures during an enrollment phase.…”
Section: Skill Required Unpracticed To Practicedmentioning
confidence: 99%
See 3 more Smart Citations