Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Certain Investigations on Continuous User Authentication System using Biometrics

IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015)
© 2015 by IJCA Journal
ICICT 2015 - Number 3
Year of Publication: 2015
S. Pravinth Raja
K. Umamaheswari
B. Kokila

S.pravinth Raja, K.umamaheswari and B Kokila. Article: Certain Investigations on Continuous User Authentication System using Biometrics. IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015) ICICT 2015(3):30-36, July 2015. Full text available. BibTeX

	author = {S.pravinth Raja and K.umamaheswari and B. Kokila},
	title = {Article: Certain Investigations on Continuous User Authentication System using Biometrics},
	journal = {IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015)},
	year = {2015},
	volume = {ICICT 2015},
	number = {3},
	pages = {30-36},
	month = {July},
	note = {Full text available}


In the past few years, Continuous Authentication system is most widely used verification system for personal computers. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous Authentication system prevents the intruders from invoking the system. It passively verifies the system without interrupting the users work progress. CA system is based on both hard and soft biometrics. In this paper, a study on passive continuous Authentication system is carried out to analyze various techniques and their performance which was proposed by various researchers. Here e also proposed new model of CA system using fingerprint, face and cloth color. This proposed technique is implemented in our future work.


  • Pei-Wei Tsai, Khan M. K, Jeng-Shyang Pan, Bin-Yih Liao"Interactive artificial Bee Colony Supported passive Continuous Authentication System," IEEE Systems Journal, vol. 8 No. 2 , june 2014.
  • K. Niinuma, U. Park, and A. K. Jain, "Soft biometric traits for continuous user authentication," IEEE Trans. Inform. Forensics Security, vol. 5, no. 4, pp. 771–780, Dec. 2010.
  • Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sandeep Kumar, "Continuous Verification Using Multimodal Biometrics," IEEE Trans On Pattern Analysis and Machine Intelligence, Vol 29, No 4, April 2007.
  • Alfredo Munoz-Briseno, Andres Gago- Alonso,JoseHernandez-Palancar,"Fingerprint indexing with bad quality areas," Expert Systems with Applications, 1839–1846, 2013.
  • Yong Wu , Yinyan Jiang, Yicong Zhou , WeifengLi , Zongqing Lu , QingminLiao, "Generalized Weber-face for illumination-robust face recognition," NeuroComputing 2014.
  • Mohd Fikri Azli Abdullah , Md Shohel Sayeed, Kalaiarasi Sonai Muthu, Housam Khalifa Bashier, Afizan Azman, Siti Zainab Expert Systems with Application 41 (2014) 6131–6137.
  • ZHANG Jie, JING Xiao-jun, CHEN Na, WANG Jian-li, " Incomplete fingerprint recognition based on feature fusion and pattern entropy," The Journal of China Universities of Posts and Telecommunications, June 2014.
  • Umarani Jayaraman N, Aman Kishore Gupta,PhalguniGupta, "An efficient minutiae based geometric hashing for fingerprint database," Neuro Computing 137(2014) 115–126.
  • Manhua Liu, "Fingerprint classification based on Adaboost learning from singularity features," Pattern Recognition 43 (2010) 1062 – 1070.
  • Randa Atta, Mohammad Ghanbari, "Low – Memory Requirement and Efficient Face Recognition System Based on DCT Pyramid," IEEE Trans on Consumer Elecronics, Vol 56, No. 3, August 2010.
  • M. Turk and A. Pentland, "Eigenfaces for recognition," Int. J. Cognitive Neuroscience, vol. 3, no. 1, pp. 71–86, 1991.
  • A. Altinok and M. Turk, "Temporal integration for continuous multimodal biometrics," in Proc. Workshop on Multimodal User Authentication, 2003, pp. 131–137.
  • Antonia Azzini, StefaniaMarrara, Roberto Sassi and Fabio Scotti, "A fuzzy approach to multimodal biometric continuous authentication, "Fuzzy Optimal Decision Making, vol. 7, pp. 243-256, 2008.
  • Koichiro Niinuma, Anil K. Jain, "Continuous User Authentication Using Temporal Information," proc. SPIC7667 Biometric Technology of Human Identication, April 14, 2010.
  • Cimato, S. , Gamassi, M. , Piuri, V. , Sassi, R. , &Scotti, F, " Personal identification and verification using multimodal biometric data," IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, pp. 41– 45,2006.
  • Hong, L. , & Jain, A, Multimodal biometrics chapter 16 In A. Jain, R. Bolle, & S. Pankanti (Eds. ), Biometrics: Personal identification in networked society. Norwell: Kluwer Academic Publishers, 1999.
  • A. Ross and A. K. Jain, „ Information Fusion in Biometrics," Patters Recognition Letters, vol 24, no 13,pp, 2115-2125, 2003.
  • A. Bhattacharyya, "On a measure of divergence between two statistical populations defined by their probability distributions," Bull. Calcutta Math . Soc. , vol. 35, pp. 99–109, 1943.
  • L. R. Rabiner,"A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
  • P. -W. Tsai, J. -S. Pan, B. -Y. Liao, and S. -C. Chu, "Enhanced artificial bee colony optimization," Int. J. Innovative Comput. Inform. Control, vol. 5, no. 12, pp. 5081– 5092, Dec. 2009.
  • S S. Pravinthraja*, Dr. K. Umamaheswari, "A Survey on Multimodal Biometrics," Int. J. Engineering and Technology Research, Volume-1, Issue-2, October-December, 2013.