ABSTRACT
This paper describes some of the consumer-driven usability research conducted by NCR Self Service Strategic Solutions in the development of an understanding of usability and user acceptance of leading-edge biometrics verification techniques. We discuss biometric techniques in general and focus upon the usability phases and issues, associated with iris verification technology at the Automated Teller Machine (ATM) user interface. The paper concludes with a review of some of the major research issues encountered, and an outline of future work in the area.
- Adams, A. and Chang, S.Y. An investigation of keypad interface security. Information & Management, 24, 53--59, 1993. Google ScholarDigital Library
- Adams, A. and Sasse, M.A. Users are not the enemy. Communications of the ACM, 42, 41--46, 1999. Google ScholarDigital Library
- Ashbourn, J. Biometrics. Advanced Identity Verification. Springer Verlag, London, 2000. Google ScholarDigital Library
- Clarke, R. Human Identification in Information Systems: Management Challenges and Public Policy Issues. Information technology and People, 74, 6--37, 1994.Google Scholar
- Coventry, L., De Angeli, A., and Johnson, G. Biometric verification at a self service interface. Proceedings of the British Ergonomic Society Conference (Edinburgh April 2003), Contemporary Ergonomics (to be published).Google Scholar
- Davies, S.G. How biometrics will fuse flesh and machine, Information Technology and People, 7,4, 1994.Google ScholarCross Ref
- De Angeli, A., Coutts, M. Coventry, L., Johnson, G.I, Cameron D., and Fischer M. VIP: a visual approach to user authentication. Proceedings of the Working Conference on Advanced Visual Interfaces AVI 2002, ACM Press, pp. 316--323, 2002. Google ScholarDigital Library
- Deane, F.P., Barelle K., Henderson R.D. and Mahar D.P., Employee acceptance of computerised biometrics security systems, Computers and Security, 14, 225--231, 1995.Google ScholarDigital Library
- Deane, F.P., Henderson R.D., Mahar D.P. and Saliba A.J. Theoretical examination of the effects of anxiety and electronic performance monitoring on biometric security systems, Interacting with Computers, 7, 395--411, 1995.Google ScholarCross Ref
- Dhamija, R. & Perrig, A. Dééjà vu: A User Study Using Images for Authentication. In Proceedings of 9th USENIX Security Symposium, August 2000. Google ScholarDigital Library
- Feustal, T.C. and Velius, G.A. Speaker identity verification over telephone lines: Where we are and where we are going. Proceedings of the 1989 International Carahan conference on security technology, (3-5 Oct), 181--182, 1989.Google ScholarCross Ref
- Gong, L., Lomas, M.A., Needham, R.M. and Saltzer, J.H. Protecting poorly chosen secrets from guessing attacks. IEEE J. on Selected Areas in Communications, 11(5), 648--656, 1993.Google ScholarDigital Library
- Hide, S. Haslegrave, C.M. Hopkinson, N., Robertson D. and Johnson G.I. Tracking eye positions during the use of an Automatic Teller Machine (ATM), Proceedings of CAES '99, May: Barcelona, Spain. 1999.Google Scholar
- Mansfield, A.J. & Wayman, J.L. Best Practices in Testing and Reporting Performance of Biometric Devices. NPL Report CMSC 14/02 August 2002.Google Scholar
- Mansfield, A.J., Kelly, G., Chandler, P. and Kane, J. Biometric product testing final report. www.cesg.gov.uk/technology/biometrics, March 2001.Google Scholar
- Negin, M., Chmielewski, T.A., Salganicoff, M., Camus, T.A., Cahn von Seelen, M.M., Venetianer, P.L. and Zhang, G.G. An iris biometric system for public and personal use. Computer, 33,2, 70--75, 2000. Google ScholarDigital Library
- Phillips, P.J., Martin, A., Wilson, C.L. and Prozybocki, M. An introduction to evaluating biometric systems, Computer, 33,2, 56--62, 2000. Google ScholarDigital Library
- Scholtz, J. and Johnson, J. Interacting with identification technology: Can it make us more secure? CHI2002 Extended Abstracts, ACM Press, 2002. Google ScholarDigital Library
- Thalheim, L., Krissler, J. and Ziegler, P.M. Bodycheck: Biometric access protection devices and their programs put to the test. C'T, 11, May 22, 2002 (www.heise.de/ct/english/02/11/114/)Google Scholar
- Westin, A. Biometrics in the mainstream: What does the U.S. public think. Privacy and American Business Newsletter, 9,8, December 2002.Google Scholar
- Woodward. J.D. Biometrics: Privacy's Foe or Privacy's Friend? Proceedings of IEEE, 85, 9, pp 1480--1492, 1997.Google ScholarCross Ref
- Yan, J., Blackwell, A., Anderson, R. and Grant, A. The memorability and security of passwords - Some empirical results. Technical Report No. 500 2001, Computer Laboratory University of Cambridge, http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf, 2001.Google Scholar
Index Terms
- Usability and biometric verification at the ATM interface
Recommendations
Multimodal biometric cryptosystem based on fusion of wavelet and curvelet features in robust security application
The authentication system used at the automated teller machines ATM is a unique personal identification number PIN. This PIN can be easily tapped and misused. In this paper we propose a method in which the PIN is replaced by the biometrics of the ...
High security Iris verification system based on random secret integration
A dual-factor authentication methodology coined as S-Iris Encoding is proposed based on the iterated inner-products between the secret pseudo-random number and the iris feature, and with thresholding to produce a unique compact binary code per person. A ...
Iris verification based on Iris feature and secret pseudo-random number
ESPOCO'05: Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and ControlAn iris verification system based on the integration of secret pseudo-random number and the user-specific iris feature, which generated from the ID Log-Gabor filters, to produce a unique compact binary code per person is proposed in this paper. This ...
Comments