University of Tasmania
Browse

Continuous multimodal biometric authentication schemes: A systematic review

Download (3.1 MB)
Version 2 2024-11-21, 01:03
Version 1 2023-05-20, 21:32
journal contribution
posted on 2024-11-21, 01:03 authored by Riseul RyuRiseul Ryu, Soonja YeomSoonja Yeom, S-H Kim, David HerbertDavid Herbert

Building safeguards against illegitimate access and authentication is a cornerstone for securing systems. Existing user authentication schemes suffer from challenges in detecting impersonation attacks which leave systems vulnerable and susceptible to misuse. A range of research proposals have suggested continuous multimodal biometric authentication (CMBA) systems as a reliable solution. Though contemporary authentication systems have the potential to change their current authentication scheme, there is a lack of critical analysis of current progress in the field to foster and influence practical solutions. This paper provides a systematic survey of existing literature on CMBA systems, followed by analysis to identify and discuss current research and future trends. The study has found that many diverse biometric characteristics are used for multimodal biometric authentication systems. The majority of the studies in the literature reviewed apply supervised learning approaches as a classification technique, and score level fusion is predominantly used as a fusion model. The review has determined however that there is a lack of comparative analysis on CMBA design in terms of combinations of biometric types (behavioural only, physiological only, or both), machine learning algorithms (unsupervised learning and semi-supervised learning), and fusion models. Most of the studies evaluated a CMBA system’s accuracy functionality, such as False Acceptance Rate (FAR), False Rejection Rate (FRR) and Equal Error Rate (EER). However, security, scalability and usability (user acceptance and satisfaction) are generally not addressed thoroughly even though these are key factors for system success in a real deployment. Furthermore, a CMBA system should be implemented and evaluated extensively on real data without restriction to prove that such systems are feasible.

History

Publication title

IEEE Access

Volume

9

Pagination

34541-34557

ISSN

2169-3536

Department/School

Information and Communication Technology

Publisher

Institute of Electrical and Electronics Engineers

Publication status

  • Published

Place of publication

United States

Rights statement

© 2021. The Authors. This is an open access article under the terms of the Creative Commons Attribution 4.0 International (CC BY 4.0) License, (https://creativecommons.org/licenses/by/4.0/), which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Socio-economic Objectives

220403 Artificial intelligence, 220405 Cybersecurity