Startseite Mathematik Cognitive Authentication for Smart Healthcare System
Kapitel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Cognitive Authentication for Smart Healthcare System

  • R. Babu , Prithi Samuel und K Jayashree
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract1

For cognitive monitoring, that is, behavioral recognition and intellectual tracking of each individual, safe, and reliable monitoring is critical. In recent years, both industry and academia have become interested in cognitive authentication, often known as biometric recognition. The main purpose of cognitive authentication is to recognize, detect, and monitor dissimilarities in biological signatures, behavioral characteristics including facial gestures, biometrics, voices, eye gaze, mannerisms, and posture, among other things. Numerous developing biometric authentication systems are currently becoming incorporated and developed in multidisciplinary sectors such as personally identifiable information, accessibility, and asset monitoring systems. Whenever it comes to simple legalizing and identification surveillance difficulties, conventional security methods are not up to equivalence. To address these issues, an electroencephalogram-based cardiovascular technology is a promising choice for next-generation mechanisms due to brain signals reflecting/ mimicking cognitive style and behaviors. Data encryption and identification tracking are included in today’s modern advanced authentication systems. Users identify themselves by using words/passwords, yet that alone would be insufficient to adequately protect and secure private data. Because standard password protection lacks cognitive distinctiveness, it could be stolen and hacked by anybody. To improve a bad passcode and maintain it, the user must enhance the difficulty level and that will be extremely difficult to remember.

Abstract1

For cognitive monitoring, that is, behavioral recognition and intellectual tracking of each individual, safe, and reliable monitoring is critical. In recent years, both industry and academia have become interested in cognitive authentication, often known as biometric recognition. The main purpose of cognitive authentication is to recognize, detect, and monitor dissimilarities in biological signatures, behavioral characteristics including facial gestures, biometrics, voices, eye gaze, mannerisms, and posture, among other things. Numerous developing biometric authentication systems are currently becoming incorporated and developed in multidisciplinary sectors such as personally identifiable information, accessibility, and asset monitoring systems. Whenever it comes to simple legalizing and identification surveillance difficulties, conventional security methods are not up to equivalence. To address these issues, an electroencephalogram-based cardiovascular technology is a promising choice for next-generation mechanisms due to brain signals reflecting/ mimicking cognitive style and behaviors. Data encryption and identification tracking are included in today’s modern advanced authentication systems. Users identify themselves by using words/passwords, yet that alone would be insufficient to adequately protect and secure private data. Because standard password protection lacks cognitive distinctiveness, it could be stolen and hacked by anybody. To improve a bad passcode and maintain it, the user must enhance the difficulty level and that will be extremely difficult to remember.

Heruntergeladen am 7.10.2025 von https://www.degruyterbrill.com/document/doi/10.1515/9783110750584-009/html
Button zum nach oben scrollen