A new face authentication system for memory-constrained devices
نویسندگان
چکیده
Though biometrics to authenticate a person is a convenient tool, typical authentication algorithms by using biometrics may not be executable on the memory-constrained devices such as smart cards. We present a solution of a face authentication algorithm for the open issue. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. Our experimental results show that the proposed method provides good performance in terms of accuracy and memory requirement. Index Terms — Biometrics, Face Authentication, Memory-Constrained Devices.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملFace Verification Schemes for Mobile Personal devices
The fast growing public ownership and use of mobile personal programmable communication devices (e.g. PDA’s) create new and exciting opportunities for convenient and secure commercial and service providing transactions. The newer generations of these devices incorporate digital cameras and signature pads, raising the possibility of enhancing the security of mobile transactions using biometric-b...
متن کاملEnabling EBGM Face Authentication on mobile devices
This paper presents a systematic optimization strategy to implement the complicated EBGM face recognition on low processing power mobile devices We propose a tailor-made fixed point arithmetic and various memory access optimization techniques to speed up an EBGM authentication process from ~550s down to ~1s in a typical Intel PXA255 400 MHz mobile platform. The result shows that real time face ...
متن کاملIncreasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks
Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication me...
متن کاملAn Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Consumer Electronics
دوره 49 شماره
صفحات -
تاریخ انتشار 2003