Skip to main content

Table 12 Supporting technologies for user authentication from Table 9

From: Role of authentication factors in Fin-tech mobile transaction security

Feature

Technologies

Refs.

Frequency

Biometric

Fingerprint, vein scan image, voice recognition, touch screen signature

[44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64]

22

Password

Graphical password

Smartwatch worm

[65,66,67,68,69,70]

6

OTP

Time base, embedded code

[71,72,73,74,75,76,77]

7

Q.R. code

Digital watermark, hash technique, AES encryption

[78,79,80,81,82,83,84,85,86,87,88,89]

12

MAC and IMEI

ARP, SHA algorithm

[90,91,92,93,94,95]

6

A.I. and machine learning

Deep learning, CNN, and A.I

[96,97,98,99,100,101]

6