Reference Hub1
Artificial Intelligence-Based Behavioral Biometrics

Artificial Intelligence-Based Behavioral Biometrics

Muskan Gupta, B. K. Tripathy
Copyright: © 2023 |Pages: 12
ISBN13: 9781799892205|ISBN10: 1799892204|EISBN13: 9781799892212
DOI: 10.4018/978-1-7998-9220-5.ch051
Cite Chapter Cite Chapter

MLA

Gupta, Muskan, and B. K. Tripathy. "Artificial Intelligence-Based Behavioral Biometrics." Encyclopedia of Data Science and Machine Learning, edited by John Wang, IGI Global, 2023, pp. 887-898. https://doi.org/10.4018/978-1-7998-9220-5.ch051

APA

Gupta, M. & Tripathy, B. K. (2023). Artificial Intelligence-Based Behavioral Biometrics. In J. Wang (Ed.), Encyclopedia of Data Science and Machine Learning (pp. 887-898). IGI Global. https://doi.org/10.4018/978-1-7998-9220-5.ch051

Chicago

Gupta, Muskan, and B. K. Tripathy. "Artificial Intelligence-Based Behavioral Biometrics." In Encyclopedia of Data Science and Machine Learning, edited by John Wang, 887-898. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-7998-9220-5.ch051

Export Reference

Mendeley
Favorite

Abstract

Recognition of reliability of people entering into a system has been a vital downside in numerous business concerns. Biometrics, which provides recognition of personnel using their distinctive traits, has the potential to become an authentic approach and hence are irreplaceable as a part of several identification systems. Uni-modal biometric systems have been designed to validate user identity. These systems use single biometric traits that can be used for recognition. But most of the drawbacks in uni-modal biometric system are due to the use of single attribute of biometric. As a solution to this problem, multimodal biometric identification systems have been developed recently, which are useful for authentication of the users. These systems avoid security threats better and provide higher security to the systems. In this article, the authors present these aspects of behavioral biometrics based on artificial intelligence and provide a comparative study of the existing approaches and systems. Also, some suggestions for future enhancements are presented for better security of the systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.