Haifa Al-Omar, Rouqaiah Al-Refai, Cady Alnafea, M. Al-ghuwainim, N. Saqib, Malak Alfosail
{"title":"A Review On Live Remote Face Recognition and Access Provision Schemes","authors":"Haifa Al-Omar, Rouqaiah Al-Refai, Cady Alnafea, M. Al-ghuwainim, N. Saqib, Malak Alfosail","doi":"10.1109/CAIS.2019.8769480","DOIUrl":null,"url":null,"abstract":"The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common in application. However, they need to be memorized and are a prey to dictionary, password guessing, and password resetting attacks by the attackers. Biometric based authentication mechanisms prove an alternative; as they do not need a user to memorize and are difficult to duplicate since they need physical presence of the end users. But due to the constant increase of number of attacks, an attacker has the capability to deceive the system by proving fake or previously recorded biometric features. Liveness detection while acquiring biometric authentication enables setting a limit to the attacks occurring. It is an innovative method that will be constantly authenticating and monitoring the subject user after a specific duration of time to validate the user identity. The performance of this mechanism is intended to be a trustworthy solution for this issue. In this paper, various facial recognition schemes that are used to improve effectiveness of resulting authentication systems will be reviewed.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIS.2019.8769480","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common in application. However, they need to be memorized and are a prey to dictionary, password guessing, and password resetting attacks by the attackers. Biometric based authentication mechanisms prove an alternative; as they do not need a user to memorize and are difficult to duplicate since they need physical presence of the end users. But due to the constant increase of number of attacks, an attacker has the capability to deceive the system by proving fake or previously recorded biometric features. Liveness detection while acquiring biometric authentication enables setting a limit to the attacks occurring. It is an innovative method that will be constantly authenticating and monitoring the subject user after a specific duration of time to validate the user identity. The performance of this mechanism is intended to be a trustworthy solution for this issue. In this paper, various facial recognition schemes that are used to improve effectiveness of resulting authentication systems will be reviewed.