A Review On Live Remote Face Recognition and Access Provision Schemes

Haifa Al-Omar, Rouqaiah Al-Refai, Cady Alnafea, M. Al-ghuwainim, N. Saqib, Malak Alfosail
{"title":"A Review On Live Remote Face Recognition and Access Provision Schemes","authors":"Haifa Al-Omar, Rouqaiah Al-Refai, Cady Alnafea, M. Al-ghuwainim, N. Saqib, Malak Alfosail","doi":"10.1109/CAIS.2019.8769480","DOIUrl":null,"url":null,"abstract":"The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common in application. However, they need to be memorized and are a prey to dictionary, password guessing, and password resetting attacks by the attackers. Biometric based authentication mechanisms prove an alternative; as they do not need a user to memorize and are difficult to duplicate since they need physical presence of the end users. But due to the constant increase of number of attacks, an attacker has the capability to deceive the system by proving fake or previously recorded biometric features. Liveness detection while acquiring biometric authentication enables setting a limit to the attacks occurring. It is an innovative method that will be constantly authenticating and monitoring the subject user after a specific duration of time to validate the user identity. The performance of this mechanism is intended to be a trustworthy solution for this issue. In this paper, various facial recognition schemes that are used to improve effectiveness of resulting authentication systems will be reviewed.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIS.2019.8769480","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common in application. However, they need to be memorized and are a prey to dictionary, password guessing, and password resetting attacks by the attackers. Biometric based authentication mechanisms prove an alternative; as they do not need a user to memorize and are difficult to duplicate since they need physical presence of the end users. But due to the constant increase of number of attacks, an attacker has the capability to deceive the system by proving fake or previously recorded biometric features. Liveness detection while acquiring biometric authentication enables setting a limit to the attacks occurring. It is an innovative method that will be constantly authenticating and monitoring the subject user after a specific duration of time to validate the user identity. The performance of this mechanism is intended to be a trustworthy solution for this issue. In this paper, various facial recognition schemes that are used to improve effectiveness of resulting authentication systems will be reviewed.
实时远程人脸识别及接入方案综述
由于对薄弱的安全机制和方法的依赖,对身份验证系统的攻击不断增加,因此应该利用活体生物识别系统。特别是因为它们是可靠身份验证的认可基础。基于密码的身份验证系统提供了许多好处,它们在应用中很常见。然而,它们需要被记住,并且容易受到攻击者的字典、密码猜测和密码重置攻击。基于生物识别的身份验证机制证明了一种替代方案;因为它们不需要用户记忆,也很难复制,因为它们需要终端用户的实际存在。但由于攻击次数的不断增加,攻击者有能力通过证明虚假或先前记录的生物特征来欺骗系统。在获得生物识别身份验证的同时进行活动检测,可以对发生的攻击设置限制。这是一种创新的方法,它将在一段特定的时间后不断地对主题用户进行身份验证和监视,以验证用户身份。此机制的性能旨在成为此问题的可靠解决方案。在本文中,各种面部识别方案,用于提高所产生的认证系统的有效性将进行审查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信