Hedi Choura, Faten Chaabane, Mouna Baklouti, T. Frikha
{"title":"电子医疗应用的优化有效认证流程","authors":"Hedi Choura, Faten Chaabane, Mouna Baklouti, T. Frikha","doi":"10.3991/ijoe.v20i06.47881","DOIUrl":null,"url":null,"abstract":"Because of the availability of more than an actor and a wireless component in an e-health application, providing more security and safety to users of this type of applications is expected. Moreover, ensuring protection of data user available or shared within different services from any security attack becomes an important requirement. In this paper, we are interested essentially in the authentication process, and we propose an improved Landmarkbased algorithm as a tool to extract, firstly, key features from analysed faces, and hence to accelerate the authentication operation. The suggested approach beats other state-of-the-art works in terms of accuracy and speed-up attaining time execution constraint, according to experimental evaluations.","PeriodicalId":507997,"journal":{"name":"International Journal of Online and Biomedical Engineering (iJOE)","volume":"6 5","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Optimized Effective Authentication Process for E-Health Application\",\"authors\":\"Hedi Choura, Faten Chaabane, Mouna Baklouti, T. Frikha\",\"doi\":\"10.3991/ijoe.v20i06.47881\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Because of the availability of more than an actor and a wireless component in an e-health application, providing more security and safety to users of this type of applications is expected. Moreover, ensuring protection of data user available or shared within different services from any security attack becomes an important requirement. In this paper, we are interested essentially in the authentication process, and we propose an improved Landmarkbased algorithm as a tool to extract, firstly, key features from analysed faces, and hence to accelerate the authentication operation. The suggested approach beats other state-of-the-art works in terms of accuracy and speed-up attaining time execution constraint, according to experimental evaluations.\",\"PeriodicalId\":507997,\"journal\":{\"name\":\"International Journal of Online and Biomedical Engineering (iJOE)\",\"volume\":\"6 5\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Online and Biomedical Engineering (iJOE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3991/ijoe.v20i06.47881\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Online and Biomedical Engineering (iJOE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijoe.v20i06.47881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Optimized Effective Authentication Process for E-Health Application
Because of the availability of more than an actor and a wireless component in an e-health application, providing more security and safety to users of this type of applications is expected. Moreover, ensuring protection of data user available or shared within different services from any security attack becomes an important requirement. In this paper, we are interested essentially in the authentication process, and we propose an improved Landmarkbased algorithm as a tool to extract, firstly, key features from analysed faces, and hence to accelerate the authentication operation. The suggested approach beats other state-of-the-art works in terms of accuracy and speed-up attaining time execution constraint, according to experimental evaluations.