Articles with "face authentication" as a keyword



Face authentication in encrypted domain based on correlation filters

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-5275-8

Abstract: Privacy and security are main concerns in face authentication by cloud or semi-honest server. To deal with this problem, a face authentication method based on correlation filters in encrypted domain is presented in this paper.… read more here.

Keywords: based correlation; authentication; face authentication; encrypted domain ... See more keywords
Photo by chrisjoelcampbell from unsplash

PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3083970

Abstract: Privacy concerns of using sensitive biometric data as credentials arise with the wide adoption of user-friendly face authentication. To protect the facial features of users, two important functions, i.e., revocability and reusability, are anticipated to… read more here.

Keywords: mml mml; mml; face authentication; privacy ... See more keywords
Photo by aiony from unsplash

Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3232957

Abstract: With the ubiquitous adoption, mobile face authentication systems have been facing constant security challenges, particularly the spoofing risks. Except for those using specialized hardware, existing proposals for face anti-spoofing on mainstream smartphones either leverage people’s… read more here.

Keywords: authentication; face authentication; eye movement; face ... See more keywords
Photo from wikipedia

Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

Sign Up to like & get
recommendations!
Published in 2018 at "Future Internet"

DOI: 10.3390/fi10020017

Abstract: Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for… read more here.

Keywords: mobile devices; location; face authentication; gesture ... See more keywords