+

Smith, 2015 - Google Patents

The use of 3D sensor for computer authentication by way of facial recognition for the eyeglasses wearing persons

Smith, 2015

Document ID
4271779249940572704
Author
Smith V
Publication year

External Links

Snippet

The purpose of this study is to evaluate the problem faced by individuals who wear eyeglasses and are using facial recognition software as a form of computer authentication. The problem of this study is that there are personal computers whose login is authenticated …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00275Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Similar Documents

Publication Publication Date Title
US12223760B2 (en) Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices
US11973877B2 (en) Systems and methods for secure tokenized credentials
US20220284732A1 (en) Iris liveness detection for mobile devices
Vacca Biometric technologies and verification systems
Li et al. Understanding OSN-based facial disclosure against face authentication systems
Galbally et al. Three‐dimensional and two‐and‐a‐half‐dimensional face recognition spoofing using three‐dimensional printed models
JP7428242B2 (en) Authentication device, authentication system, authentication method and authentication program
Fenu et al. Controlling user access to cloud-connected mobile applications by means of biometrics
Das Biometric technology: authentication, biocryptography, and cloud-based architecture
Dieter Findling et al. Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices
Piugie Performance and security evaluation of behavioral biometric systems
Smith The use of 3D sensor for computer authentication by way of facial recognition for the eyeglasses wearing persons
Favorskaya Face presentation attack detection: Research opportunities and perspectives
Kagiri Enhancing community based health information system CBHIS reporting through open source short message service based tool
Singh et al. Attendance Monitoring System Using Facial and Geo-Location Verification
Al-Rashid Biometrics authentication: Issues and solutions
Li ◾ Biometrics in Social Media Applications
Srivastava et al. Biometric Authentication and AI: Securing eCommerce Transactions Through Facial Recognition
Majeed et al. Biometric Identification Criminal, Terrorist, and individual Identification System It ‘sa New Wine & Taste
Arepalli et al. Enhancing Transaction Security through Iris Recognition
Alsufyani Biometric Presentation Attack Detection for Mobile Devices Using Gaze Information
Kamau A model of two-factor authentication using facial recognition in automated teller machines
Akinnuwesi Boluwaji et al. AUTOMATED STUDENTS'ATTEDANCE TAKING IN TERTIARY INSTITUTION USING HYBRIDIZED FACIAL RECOGNITION ALGORITHM
Wali Antispoofing Methods for Authenticating Live Users in Biometric System
Gibson The science of disguise
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载