3-FACTOR AUTHENTICATION: THE FUTURE

Shreyas Joshi
3 min readAug 20, 2020

INTRODUCTION

Right from the stone age to the present technological epoch, humans have encountered a bunch of quandaries for the protection of their valuable assets. The initial resolution to this perplexity was to have a guard protecting them. But it was apprehended that not all humans can be trusted. The next measure was to stock all assets in a room and the room should have a single opening that has a lock and it can only be opened with a unique key. It was a remarkably efficient approach but it gave rise to a dilemma that if the key is lost, then how to recover it. But the breakthrough came with electronic locks such as card readers, etc. PIN (Personal Identification Number) is attached to those card readers so that if it’s stolen, then it will be challenging to decipher the pin. But with the progression of technologies such as cryptography, decryption takes scarcer time. Now the only decision that persisted was to attach something which is unique to everybody, like fingerprint and DNA, so that only the authenticated user will get access.

BIOMETRIC MODALITY

Biometric modality implies the use of one person’s biological attributes of a person such as a face, voice, and fingerprint, and can be distinguished into 2 varieties:

Behavioural: Identification accomplished by behavioural characteristics such as keystrokes.

Physiological: Identification achieved by body parts that have unique attributes such as the face, fingerprint, etc.

BIOMETRIC MULTIMODAL

Nowadays most of the systems utilize only one type of source of erudition for the determination of authentication. These unimodal are suitable for small level protection but for high-class security, we cannot rely on these unimodal as they are vulnerable such as spoofing and noisy data. The multimodal system is very effective and reliable.

FINGERPRINT BIOMETRICS

FINGERPRINT

One of the most ancient and widely practiced biometric technology is fingerprint biometrics. The most traditional fields of usages are:

· Passport

· Aadhar Card (India)

· Electronic Locks

Since fingerprints are unique for each person, they are immensely reliable; no two humans have the same fingerprint pattern. One of the most significant advantages of fingerprints is that they cannot be reconstructed, and they can depreciate only after death.

FACIAL BIOMETRICS

FACE RECOGNITION

In facial biometrics, the face of the person is recognized using a video source. Since precision is pretty high and intrusiveness is low, this approach is immensely effective. The foremost 3 modules are:

· Face Detection

· Feature Extraction

· Feature Match

VOICE BIOMETRICS

VOICE RECOGNITION

Voice biometrics is a unique trait directly connected to the human vocal tract anatomy as well as the speaking manner. The vocal cords vibration and the patterns that are created are as distinguishing as fingerprints.

ARCHITECTURE

· First Step: Fingerprint authentication is succeeded.

· Second Step: Facial authentication will be needed.

· Third Step: After successful fingerprint and face authentication, the last step will be voice authentication.

Only if all the three authentications succeed, we can say that the person is authenticated and he/she will receive the verification.

CLOSURE

In conclusion, this architecture is more robust, effective, and secure as compared to the two-tier architecture. Since a user goes through three levels of authentication, the possibilities of a wrong person accessing the system are insignificant.

--

--