Suriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir
{"title":"Multiway analysis for face recognition","authors":"Suriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir","doi":"10.1145/3309074.3309111","DOIUrl":"https://doi.org/10.1145/3309074.3309111","url":null,"abstract":"The benefit of multiway analysis is it can extract underlying structures, as well as, establishing unknown relationship among the components (modes) of multidimensional data. This can be achieved using tensor decomposition approach. The aim of this paper is to emphasize on the advantage of this approach in face applications. As face researches have demonstrated that human faces are represented in high dimensional space with static and dynamic facial attributes, a good interpretation of a model can thus reveal an explicit relationship between the model and the factors. Motivated by this, we study the effect of two facial attributes, expression and intensity towards recognition performance. At the same time, we compare the recognition rates of tensor model with Principal Component Analysis (PCA) technique. The results showed that tensor model gives a higher recognition rate compared to PCA and there is an interaction effect between expression and intensity factors that affect the recognition performance.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128620361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-based identity sharing for token grants","authors":"Kavindu Dodanduwa, I. Kaluthanthri","doi":"10.1145/3309074.3309078","DOIUrl":"https://doi.org/10.1145/3309074.3309078","url":null,"abstract":"Authentication and authorization are two key elements of a software application. In modern day, OAuth 2.0 framework and OpenID Connect protocol are widely adopted standards fulfilling these requirements. These protocols are implemented into authorization servers. It is common to call these authorization servers as identity servers or identity providers since they hold user identity information. Applications registered to an identity provider can use OpenID Connect to retrieve ID token for authentication. Access token obtained along with ID token allows the application to consume OAuth 2.0 protected resources. In this approach, the client application is bound to a single identity provider. If the client needs to consume a protected resource from a different domain, which only accepts tokens of a defined identity provider, then the client must again follow OpenID Connect protocol to obtain new tokens. This requires user identity details to be stored in the second identity provider as well. This paper proposes an extension to OpenID Connect protocol to overcome this issue. It proposes a client-centric mechanism to exchange identity information as token grants against a trusted identity provider. Once a grant is accepted, resulting token response contains an access token, which is good enough to access protected resources from token issuing identity provider's domain.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","authors":"","doi":"10.1145/3309074","DOIUrl":"https://doi.org/10.1145/3309074","url":null,"abstract":"","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}