Next Level User Authentication In Android
- Pulkit Tandon
- Geogen George
Shoulder Surfing, Brute Force Attack, Custom User, Speech Identification, MFCC, Vector Quantization, Pattern Recognition, PIBRAS.
Device security are the major challenges faced by the smartphone developers in the recent era to secure the E-Data from security breaches. The finest possible alternative present due to limited range of current methods is to concatenate existing data security method with novel procedures which should be quick-to-implement and at the same time should be highly secure. The paper aims to strengthen the data security on the device by creating a custom user for the device other than the device administrator. The administrator is authenticated through speech recognition and pattern recognition methods whereas the custom user is verified using PIBRAS.
Volume 2 Issue 1
Pages. 847-851