IEEE Access (Jan 2021)

Continuous Multimodal Biometric Authentication Schemes: A Systematic Review

  • Riseul Ryu,
  • Soonja Yeom,
  • Soo-Hyung Kim,
  • David Herbert

DOI
https://doi.org/10.1109/ACCESS.2021.3061589
Journal volume & issue
Vol. 9
pp. 34541 – 34557

Abstract

Read online

Building safeguards against illegitimate access and authentication is a cornerstone for securing systems. Existing user authentication schemes suffer from challenges in detecting impersonation attacks which leave systems vulnerable and susceptible to misuse. A range of research proposals have suggested continuous multimodal biometric authentication (CMBA) systems as a reliable solution. Though contemporary authentication systems have the potential to change their current authentication scheme, there is a lack of critical analysis of current progress in the field to foster and influence practical solutions. This paper provides a systematic survey of existing literature on CMBA systems, followed by analysis to identify and discuss current research and future trends. The study has found that many diverse biometric characteristics are used for multimodal biometric authentication systems. The majority of the studies in the literature reviewed apply supervised learning approaches as a classification technique, and score level fusion is predominantly used as a fusion model. The review has determined however that there is a lack of comparative analysis on CMBA design in terms of combinations of biometric types (behavioural only, physiological only, or both), machine learning algorithms (unsupervised learning and semi-supervised learning), and fusion models. Most of the studies evaluated a CMBA system's accuracy functionality, such as False Acceptance Rate (FAR), False Rejection Rate (FRR) and Equal Error Rate (EER). However, security, scalability and usability (user acceptance and satisfaction) are generally not addressed thoroughly even though these are key factors for system success in a real deployment. Furthermore, a CMBA system should be implemented and evaluated extensively on real data without restriction to prove that such systems are feasible.

Keywords