The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: An imposter identification system allows authenticated user to request for regeneration of password while restricting users who possess imposter properties. Existing system in the literature either allows the users to request for regeneration of password or denies access to the users. So the imposter acceptance and genuine rejection percentage is high in the existing system. Methods: The proposed system improves the performance of imposter identification system by adding three levels of non biometric factors to it. Fuzzy score is calculated on each level and the scores are accumulated with its own weight at last level. Using weighted score the threshold is compared and evaluated to make further decisions. Based on the evaluations made with respect to the threshold, the user will be allowed or denied to regenerate the password. Neural Network is applied to find out the threshold value whereas initially the threshold value is randomly assigned. The neural system works on two modes; one is learning mode in which the developer has to validate the system using training and testing dataset. Findings: With the validation, the threshold value is set to the most accurate value. Secondly, the system works on production mode where the end user uses the system. The proposed system increases the performance of imposter identification algorithm by increasing the rate of genuine user acceptance and imposter rejection. Applications: For all, ID-Password based authentication applications which supports Forget password as a sub module for the authentication module.

Keywords

Bio-metric, Imposter, Neural System.
User