Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications

Francisco D. Guillén-Gámez1, Iván García-Magariño2,3

Article ID: 631
Vol 1, Issue 1, 2018

VIEWS - 11748 (Abstract)

Abstract


In recent years, new technologies have become the focal point of any operation or digital system. Smartphones are increasingly gaining ground as a technological tool that combines a large number of applications and online services. It is an observable reality, as operations are increasingly being carried out in electronic commerce applications, banking transactions, health applications, and distance education. However, the widespread use of these types of practices means that more risks can present themselves through the internet. Therefore, any organization must take into account changes in virtual security, having to face possible cyber attacks or identity theft. Although smartphones have become a powerful tool in daily lives of most people, it is true that it has brought a series of challenges in the security and privacy of users, where facial authentication seems to be a possible solution to this type of problems. This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.


Keywords


Facial Authentication; Technologies; Privacy

Full Text:

PDF PDF


References


Sivarajah, U., Irani, Z., & Weerakkody, V. (2015). Evaluating the use and impact of Web 2.0 technologies in local government. Government Information Quarterly, 32(4), 473-487. DOI: https://doi.org/10.1016/j.giq.2015.06.004 Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143-1155. DOI: 10.1109/JIOT.2017.2659783 Miranda, J., Mäkitalo, N., Garcia-Alonso, J., Berrocal, J., Mikkonen, T., Canal, C., & Murillo, J. M. (2015). From the Internet of Things to the Internet of People. IEEE Internet Computing, 19(2), 40-47. DOI: 10.1109/MIC.2015.24 Memon, N. (2017). How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]. IEEE Signal Processing Magazine, 34(4), 196-194. DOI: 10.1109/MSP.2017.2697179 Siddiqui, Z., Abdullah, A. H., Khan, M. K., & Alghamdi, A. S. (2014). Smart environment as a service: three factor cloud based user authentication for telecare medical information system. Journal of medical systems, 38(1), 9997. DOI: https://doi.org/10.1007/s10916-013-9997-5 Zhang, Z., Aziz, E. S., Esche, S., & Chassapis, C. (2018). A Virtual Proctor with Biometric Authentication for Facilitating Distance Education. In Online Engineering & Internet of Things(pp. 110-124). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-64352-6_11 Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1-31. DOI: 10.3390/cryptography2010001 Jiang, L., & Meng, W. (2017). Smartphone user authentication using touch dynamics in the big data era: Challenges and opportunities. In Biometric Security and Privacy (pp. 163-178). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-47301-7_7 Galdi, C., Nappi, M., Dugelay, J. L., & Yu, Y. (2018). Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones. IEEE Communications Magazine, 56(1), 136-142. Apple (2018). https://www.apple.com/es/iphone-x/ Website of Apple. Last visit: March 05, 2018. Samsung (2018). http://www.samsung.com/es/smartphones/galaxy-s8/ Website of Samsung. Last visit: March 05, 2018. Traoré, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J. D., & de Faria Quinan, P. M. (2017). Ensuring Online Exam Integrity Through Continuous Biometric Authentication. In Information Security Practices (pp. 73-81). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-48947-6_6 Karim, N. A., & Shukur, Z. (2015). Review of user authentication methods in online examination. Asian Journal of Information Technology, 14(5), 166-175. DOI: 10.3923/ajit.2015.166-175 Guillén-Gamez, F. D., García-Magariño, I., Bravo, J., & Plaza, I. (2015). Exploring the influence of facial verification software on student academic performance in online learning environments. Int. J. Eng. Edu., 31(6A), 1622-1628. Shah, K., Shah, S., Shah, T., Shinde, R., & Gharat, S. (2017). Secure Examination System using Biometric and QR Code Technology. International Journal of Engineering Science, 10365. Fenu, G., Marras, M., & Boratto, L. (2017). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters. DOI: https://doi.org/10.1016/j.patrec.2017.03.027 Labayen, M., Vea, R., Flórez, J., Guillén-Gámez, F. D., & García-Magariño, I. (2014). Smowl: a tool for continuous student validation based on face recognition for online learning. In Edulearn14 Proceedings (pp. 5354-5359). IATED. Guillén-Gámez, F. D., García-Magariño, I., Bravo-Agapito, J., Lacuesta, R., & Lloret, J. (2017). A proposal to improve the authentication process in m-health environments. IEEE Access, 5, 22530-22544. DOI: 10.1109/ACCESS.2017.2752176 Kawamata, T., Ishii, T., Fujimori, S., & Akakura, T. (2016, November). Student authentication by updated facial information with weighting coefficient in e-Learning. In Region 10 Conference (TENCON), 2016 IEEE (pp. 551-555). IEEE. DOI: 10.1109/TENCON.2016.7848061 Li, Y., Xu, K., Yan, Q., Li, Y., & Deng, R. H. (2014, June). Understanding OSN-based facial disclosure against face authentication systems. In Proceedings of the 9th ACM symposium on Information, computer and communications security (pp. 413-424). ACM. DOI: 10.1145/2590296.2590315

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.