2021
DOI: 10.1109/tii.2020.2977774
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy Method for Person Identification in IIoT Environments by Means of Facial Dynamics

Abstract: In Industrial Internet of Things environments, dependability of complex manufacturing process in which human operators play a key role can be improved by identity recognition/authentication of whoever is involved in the various stages of a production process, according to where and when he/she is supposed to be. To this aim we propose an approach that exploits the dynamic appearance and the time-dependent local features characterizing the face of an individual during speech utterance with regard to their spati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…( 2018 ) De-authentication Identification Posture Patterns Private dataset: 30 subjects ML algorithms applied to time series of the force on the sensors True positive rate: 91.0% False positive rate: 0,33% False negative rate: 8.68% Multiple sessions True positive rate: 22%, False positive rate: 5.2%, False negative rate: 72.7% Castiglione et al. ( 2020 ) Identification Authentication Facial dynamics Private dataset: 48 subjects Local spatial–temporal descriptor for features Deep feedforward network for classification Identification Accuracy: 98.2% Authentication Accuracy: 99.49% EER: 0.05% Srivastava et al. ( 2019 ) Identification Voice Private datasets: 10 subjects LPC and MFCC feature extraction technique GMM classifier Isolated Hindi digit dataset Accuracy: 96.49% Hindi sentence dataset Accuracy: 94.97% Alkeem et al.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…( 2018 ) De-authentication Identification Posture Patterns Private dataset: 30 subjects ML algorithms applied to time series of the force on the sensors True positive rate: 91.0% False positive rate: 0,33% False negative rate: 8.68% Multiple sessions True positive rate: 22%, False positive rate: 5.2%, False negative rate: 72.7% Castiglione et al. ( 2020 ) Identification Authentication Facial dynamics Private dataset: 48 subjects Local spatial–temporal descriptor for features Deep feedforward network for classification Identification Accuracy: 98.2% Authentication Accuracy: 99.49% EER: 0.05% Srivastava et al. ( 2019 ) Identification Voice Private datasets: 10 subjects LPC and MFCC feature extraction technique GMM classifier Isolated Hindi digit dataset Accuracy: 96.49% Hindi sentence dataset Accuracy: 94.97% Alkeem et al.…”
Section: Methodsmentioning
confidence: 99%
“…To face this kind of challenge, both in terms of identification but also authentication, the authors in Castiglione et al. ( 2020 ) analyzed a dynamic approach with respect to the classical static representations of the face by exploiting the dynamics associated with language. The experiments were conducted on a customized database containing short video clips capturing 48 subjects speaking short sentences.…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…An authentication scheme based on the edge-fogcloud was proposed that captured the dynamic facial pattern from the edge of the IoT devices. Although this scheme enhances the robustness of the presentation attack, it could not provide mutual authentication and it was not secure enough and had no key agreement [12]. One proposed lightweight authentication scheme based on numerical series cryptography for IoT environments was proposed to provide mutual authentication and session key agreement for IoT devices [13].…”
Section: B Related Work On Iot Authentication Schemesmentioning
confidence: 99%
“…Both RBF NNs and multi-layer perceptrons are general aroaches, and as with any RBF NN, it can be seen that multi-layer perceptrons can completely replace NNs with perceptron layers RBF [17,18]. But they also have the following differences:…”
Section: Performance Analysis Of Rbf Nnmentioning
confidence: 99%