Facial Image Authentication System Based on Real-Time 3D Facial Imaging by Using Complex-Valued Eigenfaces Algorithm

Author(s):  
Shu Zhan ◽  
T. Kurihara ◽  
S. Ando
Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Fernando Nakayama ◽  
Paulo Lenz ◽  
Stella Banou ◽  
Michele Nogueira ◽  
Aldri Santos ◽  
...  

Smart health (s-health) is a vital topic and an essential research field today, supporting the real-time monitoring of user’s data by using sensors, either in direct or indirect contact with the human body. Real-time monitoring promotes changes in healthcare from a reactive to a proactive paradigm, contributing to early detection, prevention, and long-term management of health conditions. Under these new conditions, continuous user authentication plays a key role in protecting data and access control, once it focuses on keeping track of a user’s identity throughout the system operation. Traditional user authentication systems cannot fulfill the security requirements of s-health, because they are limited, prone to security breaches, and require the user to frequently authenticate by, e.g., a password or fingerprint. This interrupts the normal use of the system, being highly inconvenient and not user friendly. Also, data transmission in current authentication systems relies on wireless technologies, which are susceptible to eavesdropping during the pairing stage. Biological signals, e.g., electrocardiogram (ECG) and electroencephalogram (EEG), can offer continuous and seamless authentication bolstered by exclusive characteristics from each individual. However, it is necessary to redesign current authentication systems to encompass biometric traits and new communication technologies that can jointly protect data and provide continuous authentication. Hence, this article presents a novel biosignal authentication system, in which the photoplethysmogram (PPG) biosignal and a galvanic coupling (GC) channel lead to continuous, seamless, and secure user authentication. Furthermore, this article contributes to a clear organization of the state of the art on biosignal-based continuous user authentication systems, assisting research studies in this field. The evaluation of the system feasibility presents accuracy in keeping data integrity and up to 98.66% accuracy in the authentication process.


2015 ◽  
Vol 738-739 ◽  
pp. 533-537
Author(s):  
Xu Zhan ◽  
Yue Rong Lei ◽  
Hui Ming Zeng ◽  
Jian Ling Chen

In this paper, we study compressed sensing algorithm and image authentication algorithm, present a grayscale image vulnerability authentication system based on compressed sensing. The system extracts the original grayscale image edge information by prewitt algorithm and observes the edge information by compressed sensing algorithm of OMP to generate the observation matrix . Then, the system scrambles the observation matrix by arnold transform algorithm and embeds it into the original grayscale image by singular value decomposition algorithm. We make experiment in order to test the system. The result is shown that the algorithm has good imperceptibility and can resist copying attack.


Sign in / Sign up

Export Citation Format

Share Document