A Review On Live Remote Face Recognition and Access Provision Schemes

The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication system...

Full description

Saved in:
Bibliographic Details
Published in2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) pp. 1 - 5
Main Authors Al-Omar, Haifa, Al-Refai, Rouqaiah, Alnafea, Cady, Al-Ghuwainim, Maisa'a, Saqib, Nazar, AlFosail, Malak
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2019
Subjects
Online AccessGet full text
DOI10.1109/CAIS.2019.8769480

Cover

More Information
Summary:The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should be utilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common in application. However, they need to be memorized and are a prey to dictionary, password guessing, and password resetting attacks by the attackers. Biometric based authentication mechanisms prove an alternative; as they do not need a user to memorize and are difficult to duplicate since they need physical presence of the end users. But due to the constant increase of number of attacks, an attacker has the capability to deceive the system by proving fake or previously recorded biometric features. Liveness detection while acquiring biometric authentication enables setting a limit to the attacks occurring. It is an innovative method that will be constantly authenticating and monitoring the subject user after a specific duration of time to validate the user identity. The performance of this mechanism is intended to be a trustworthy solution for this issue. In this paper, various facial recognition schemes that are used to improve effectiveness of resulting authentication systems will be reviewed.
DOI:10.1109/CAIS.2019.8769480