scholarly journals BiometricAccessFilter: A Web Control Access System Based on Human Auditory Perception for Children Protection

Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 361 ◽  
Author(s):  
Muhammad Ilyas ◽  
Régis Fournier ◽  
Alice Othmani ◽  
Amine Nait-Ali

Along with internet growth, security issues come into existence. Efficient tools to control access and to filter undesirable web content are needed all the time. In this paper, a control access method for web security based on age estimation is proposed, where the correlation between human age and auditory perception is taken into account. In particular, access is denied if a person’s age is not appropriate for the given web content. Unlike existing web access filters, our biometric approach offers greater security and protection to individual privacy. From a technical point of view, the machine-learning regression model is used to estimate the person’s age. The primary contributions of this paper include an age estimation module based on human auditory perception and provision of an open-source web filter to prevent adults from accessing children web applications. The proposed system can also be used to limit the access of children to a webpage specially designed for adults. Our system is evaluated with a dataset collected from 201 persons with different ages from 06 to 60 years old, where it considered 109 male and 82 female volunteers. Results indicate that our system can estimate the age of a person with an accuracy of 97.04% and a root mean square error (RMSE) of 4.2 years. It presents significant performances in the verification scenario with an Equal Error Rate (EER) of 1.4%.


Because of the large and rapid increase in web data size and number of users, web users now face the problems of overloading and drowning information. As a result, Recovery of internet-based data and web applications, providing web users with more accurate information becomes a critical issue. In this study, by analyzing web data features, we aim to improve the performance of web information retrieval and web presentation through web data mining processes that discover the knowledge (intrinsic relationships) between web data expressed as textual, linkage or usability information. We concentrate on discovering web usage patterns through web usage mining, and then using the discovered usage knowledge along with profile information to provide web users with more personalized web content. Personalization is an engaging service for website visitors, based on their characteristics and deliberate behaviors to facilitate conversion and long-term commitment expectations. The purpose of this work is to extract the knowledge from web data and use this knowledge to create a web personalization system that allows users to access the content of their need from the website without specifically specifying it. The knowledge could be the navigational actions of the user as exposed by web access log analysis, as well as the characteristics and preferences of the user reflected by user profiles. Such knowledge is further analyzed to improve system performance, retention of users and/or modification of the site. This paper provides a comprehensive survey of the different approaches suggested by Web Personalization researchers and list out some of the issues that need to be tackled soon



Web applications support many of our daily activities, but they often have security issues, and their accessibility makes them easy to use. This paper presents an analysis for finding vulnerabilities that directly address weak or absent of input validation. We present the techniques for finding security vulnerabilities in Web applications. We implement our proposed system with a machine learning technique (ML technique) to measure the accuracy and provide an extensive evaluation that finds all vulnerabilities in web applications. SQL injection, Cross-Site Scripting (XSS), HTTP and command inj1ection vulnerabilities are addressed in the proposed system and also Naive Bayes ML technique is used to calculate the accurateness. The experimental result shows the technique is more efficient and accurate.



Author(s):  
Maragathavalli P. ◽  
Seshankkumar M. ◽  
Dhivakaran V. ◽  
Ravindran S.


2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

With the rapid increase in the volume of e-commerce, the security of web-based transactions is of increasing concern. A widespread but dangerously incorrect belief among web users is that all security issues are taken care of when a website uses HTTPS (secure HTTP). While HTTPS does provide security, websites are often developed and deployed in ways that make them and their users vulnerable to hackers. In this article we explore some of these vulnerabilities. We first introduce the key ideas and then provide several experiential learning exercises so that readers can understand the challenges and possible solutions to them in a hands-on manner.





2016 ◽  
pp. 866-884
Author(s):  
Georgios Bouloukakis ◽  
Ioannis Basdekis ◽  
Constantine Stephanidis

Web services are an emerging technology that has attracted much attention from both the research and the industry sectors in recent years. The exploitation of Web services as components in Web applications facilitates development and supports application interoperability, regardless of the programming language and platform used. However, existing Web services development standards do not take into account the fact that the provided content and the interactive functionality should be accessible to, and easily operable by, people with disabilities. This chapter presents a platform named myWebAccess, which provides a mechanism for the semi-automated “repair” of Web services' interaction characteristics in order to support the automatic generation of interface elements that conform to the de facto standard of the Web Content Accessibility Guidelines 2.0. myWebAccess enhances interaction quality for specific target user groups, including people with visual and motor disabilities, and supports the use of Web services on diverse platforms (e.g., mobile phones equipped with a browser). The Web developers can build their own design templates and the users of myWebAccess can create a personalized environment containing their favourite services. Thus, they can interact with them through interfaces appropriate to their specific individual characteristics.



Author(s):  
Shefali Arora ◽  
M. P. S. Bhatia

Biometric authentication is being increasingly used in various applications to identify people using various traits. This can be of use in various applications like forensics, passport control, etc. In the rapidly growing era of internet, it is necessary to restrict access to data on the web. Security and customer usage are some of the essential parameters which should be taken care of in a web biometric system. Also, biometric technology has been implemented on social media platforms so as to save users from cyber-attacks and breach of privacy. This chapter provides an overview of how a web biometric system works, with an approach to use deep learning algorithms to identify traits like face, iris, and fingerprints. Such techniques can also be used to authenticate people in e-commerce applications. Further, the authors discuss the implementation of biometric verification techniques on social networking platforms like Facebook, Twitter, etc.



Author(s):  
Khalissa Derbal Amieur ◽  
Kamel Boukhalfa ◽  
Zaia Alimazighi

Geographic Information (GI) is currently available at any time, from anywhere on the surface of the earth, for any person connected to internet. Some applications of design, implementation, generation and dissemination of maps on the web are recognized as “Webmapping” application, geographic web services or more generally on demand-map making tools. All these web applications aims the satisfaction of user needs by providing personalized maps in a fast response time with a good quality. However, the complexity and diversity of aspects taking into account have lead researchers to focus on one aspect at the expense of others. Consequently, few works have addressed all these aspects simultaneously. The authors propose in this paper, a Webmapping approach organized into two main tasks: (1) query analysis driven by domain ontology in analyzing a query launched by a user on a web browser and (2) map generation process. The first step allows extracting and formalizing user needs through two map determinants factors: the Level of Detail (LoD) and Point of View (PoV) and the second, exploit an hybrid approach “Multi Representation and Generalization” in storing and generating geographical data with integrating Multi-Agent technology in all steps of processing. To evaluate the effectiveness of our proposal, a first tool prototype implementing our approach is so developed using a geographic vector dataset provided by national cartographic agency.



Author(s):  
Marta Fernández de Arriba ◽  
Eugenia Díaz ◽  
Jesús Rodríguez Pérez

This chapter presents the structure of an index which serves as support so allowing the development team to create the specification of the context of use document for the development of Web applications, bearing in mind characteristics of usability and accessibility, each point of the index being explained in detail. A correct preparation of this document ensures the quality of the developed Web applications. The international rules and standards related to the identification of the context of use have been taken into account. Also, the functionality limitations (sensorial, physical, or cognitive) which affect access to the Web are described, as well as the technological environment used by disabled people (assistive technologies or alternative browsers) to facilitate their access to the Web content. Therefore, following the developed specification of the context of use, usable and accessible Web applications with their corresponding benefits can be created.



Author(s):  
G. Fleet ◽  
J. Reid

Lately, we have seen the use of a number of new technologies (such as Javascript, XML, and RSS) used to show how Web content can be delivered to users without a traditional browser application (e.g., Microsoft Explorer). In parallel, a growing number of PC applications, whose main job previously was to manage local resources, now are adding Internet connectivity to enhance their role and use (e.g., while iTunes started as a media player for playing and managing compressed audio files, it now includes Web access to download and purchase music, video, podcasts, television shows, and movies).While most attempts at providing Internet access on mobile devices (whether wireless phones or personal digital assistants) have sought to bring the traditional browser, or a mobile version of the browser, to these smaller devices, they have been far from successful (and a far cry from the richer experience provided by browsers on the PC using standard input and control devices of keyboards and a mouse). Next, we will highlight a number of recent trends to show how these physical and use-case constraints can be significantly diminished.



Sign in / Sign up

Export Citation Format

Share Document