2018
DOI: 10.3390/fi10020017
|View full text |Cite
|
Sign up to set email alerts
|

Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

Abstract: Personal mobile devices currently have access to a significant portion of their user's private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capability on smartpho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 11 publications
0
6
0
1
Order By: Relevance
“…Thinking about opposite sides of a coin, every strategy has its solid and frail focuses. The six principle techniques are information -based strategies, appearance-based techniques, include invariant strategies, geometry-based techniques, format based strategies, and model-based techniques [1] The reason for this short audit paper [2] is to introduce, order and assess some new face detection techniques utilizing four ordinary learning machine. The execution and the other assessment parameters of these strategies contrast with one another all together with acquaint critical techniques and furthermore with state favourable circumstances and inconveniences of related works.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Thinking about opposite sides of a coin, every strategy has its solid and frail focuses. The six principle techniques are information -based strategies, appearance-based techniques, include invariant strategies, geometry-based techniques, format based strategies, and model-based techniques [1] The reason for this short audit paper [2] is to introduce, order and assess some new face detection techniques utilizing four ordinary learning machine. The execution and the other assessment parameters of these strategies contrast with one another all together with acquaint critical techniques and furthermore with state favourable circumstances and inconveniences of related works.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The execution and the other assessment parameters of these strategies contrast with one another all together with acquaint critical techniques and furthermore with state favourable circumstances and inconveniences of related works. [2] The focal point of this paper [3] is to construct a safe confirmation framework with face, area and motion acknowledgment as segments. Client motions and area information are a succession of time arrangement; in this way, in this paper we propose to utilize unsupervised learning in the long transient memory repetitive neural system to effectively figure out how to perceive, gathering and segregate client signals and area.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A comprehensive review of machine learning supported threat and attack detection is presented in [6,7]. Furthermore, machine learning algorithms could be applied to biometric authentication, as presented by [8], combined with mobile devices as in [9] or to enhance the feature list of standard security tools, such as Burp Suite, as explained by [10].…”
Section: Introductionmentioning
confidence: 99%
“…A rendszer az egyedi mintát digitális adattá konvertálja és adatbázisban tárolja. Megkülönböztetjük az első regisztrációs folyamatot, valamint a használat során jelentkező use-case eseteket(Rexha-Shala-Xhafa 2018). Hitelesítés során az aktuálisan levett mintát összevetjük ebben az adatbázisban korábban eltárolt mintákkal.…”
unclassified