Improved continuous authentication system with counterfeit protection
Journal of computational and engineering mathematics, Tome 6 (2019) no. 1, pp. 35-47.

Voir la notice de l'article provenant de la source Math-Net.Ru

The article examines the possibility of improving the security of user workstations equipped with web cameras. This is achieved by implementation of continuous user authentication through face recognition. This method significantly increases a security level of the system from the threat of gaining access while the user is not at the workplace. In addition, various methods to protect the system from imitating the images of a genuine user were developed. Testing various approaches to solving the problem was performed and the reliability of the system was estimated.
Keywords: authentication, face recogniton, webcam, photo recogniton, Dlib library.
@article{JCEM_2019_6_1_a2,
     author = {A. A. Kudinov and S. M. Elsakov},
     title = {Improved continuous authentication system with counterfeit protection},
     journal = {Journal of computational and engineering mathematics},
     pages = {35--47},
     publisher = {mathdoc},
     volume = {6},
     number = {1},
     year = {2019},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/JCEM_2019_6_1_a2/}
}
TY  - JOUR
AU  - A. A. Kudinov
AU  - S. M. Elsakov
TI  - Improved continuous authentication system with counterfeit protection
JO  - Journal of computational and engineering mathematics
PY  - 2019
SP  - 35
EP  - 47
VL  - 6
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/JCEM_2019_6_1_a2/
LA  - en
ID  - JCEM_2019_6_1_a2
ER  - 
%0 Journal Article
%A A. A. Kudinov
%A S. M. Elsakov
%T Improved continuous authentication system with counterfeit protection
%J Journal of computational and engineering mathematics
%D 2019
%P 35-47
%V 6
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/JCEM_2019_6_1_a2/
%G en
%F JCEM_2019_6_1_a2
A. A. Kudinov; S. M. Elsakov. Improved continuous authentication system with counterfeit protection. Journal of computational and engineering mathematics, Tome 6 (2019) no. 1, pp. 35-47. http://geodesic.mathdoc.fr/item/JCEM_2019_6_1_a2/

[1] J. Radjkumar, S. Kumar, S. Zhang, T. Sim, “Using Continuous Face Verification to Improve Desktop Security”, Seventh IEEE Workshops on ‘`Applications of Computer Vision" (WACV/MOTION’05), Proc. Int. Conference (Breckenridge, CO, USA, 2005, January 5–7), v. 1, IEEE, 2005, 501–507 | DOI

[2] T. Feng, X. Zhao, B. Carbunar, “Continuous Mobile Authentication Using Virtual Key Typing Biometrics”, 12th IEEE International Conference on "Trust, Security and Srivacy in Computing and Communications" (TrustCom), Proc. Int. Conference (Melbourne, VIC, Australia, 2013, July 16–18), IEEE, 2013, 1547–1552 | DOI

[3] T. Feng, Z. Liu, K. A. Kwon, B. Carbunar, Y. Jiang, N. Nguyen, “Continuous Mobile Authentication Using Touchscreen Gestures”, IEEE Conference on Technologies for "Homeland Security" (HST), Proc. Int. Conference (Waltham, MA, USA, 2012, November 13–15), IEEE, 2012, 451–456 | DOI

[4] S. Mondal, P. Bours, “Continuous Authentication Using Mouse Dynamics”, International Conference for the "Biometrics Special Interest Group" (BIOSIG), Proc. Int. Conference (Darmstadt, Germany, 2013, September 5–6), IEEE }, 2013, 13826562, 12 pp. (accessed on January 10, 2019) {\tt https://ieeexplore.ieee.org/document/6617151

[5] L. R. Donida, R. Sassi, F. Scotti, “ECG Biometric Recognition: Permanence Analysis of QRS Signals for 24 Hours Continuous Authentication”, IEEE International Workshop on "Information Forensics and Security" (WIFS), Proc. Int. Conference (Guangzhou, China, 2013, November 18–21), IEEE, 2013, 31–36 | DOI | MR

[6] F. Lin, C. Song, Y. Zhuang, W. Xu, C. Li, K. Ren, “Cardiac Scan: a Non-Contact and Continuous Heart-Based User Authentication System”, Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, Proc. Int. Conference (Snowbird, Utah, USA, 2017, October 16–20), ACM, 2017, 315–328 | DOI

[7] U. Mahbub, V. M. Patel, D. Chandra, B. Barbello, R. Chellappa, “Partial Face Detection for Continuous Authentication”, IEEE International Conference on "Image Processing" (ICIP), Proc. Int. Conference (Phoenix, AZ, USA, 2016, September 25–26), IEEE, 2016, 315–328 | DOI

[8] M. Pamplona Segundo, S. Sarkar, D. Goldgof, L. Silva, O. Bellon, “Continuous 3D Face Authentication Using RGB-D Cameras”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Proc. Int. Conference (Portland, OR, USA, 2013, June 23–28), IEEE, 2013, 64–69 | DOI

[9] V. Kazemi, J. Sullivan, “One Millisecond Face Alignment with an Ensemble of Regression Trees”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Proc. Int. Conference (Columbus, Ohio, USA), IEEE, 2014, 1867–1874 | DOI

[10] S. Gupta, M. K. Markey, A. C. Bovik, “Advances and Challenges in 3D and 2D+ 3D Human Face Recognition”, Pattern Recognition in Biology, eds. M. S. Corrigan, 2007, 63–103

[11] E. Mills, N. Borg, “Trends in Recommended Illuminance Levels: an International Comparison”, Journal of the Illuminating Engineering Society, 1:28 (1999), 155–163 | DOI

[12] H. Kalming, Zh. Xiangyu, R. Shaiging, J. Sun, “Deep Residual Learning for Image Recognition”, The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Proc. Int. Conference (Las Vegas, NV, USA, 2016, June 27–30), IEEE, 2016, 770–778 | DOI