Skip to main content

A Fuzzy System for Three-Factor, Non-textual Authentication

  • Conference paper
  • First Online:
Intelligent Systems in Science and Information 2014 (SAI 2014)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 591))

Included in the following conference series:

  • 756 Accesses

Abstract

As text-based authentication has had its critiques, non-textual techniques have been suggested throughout the last two decades. However, it is only lately, with the wide-spread adoption of smartphones and tablet devices that they have found a compelling application. Non-textual authentication may be faster and more secure and it also introduces a new paradigm for the authentication decision. We present a three factor system based on facial recognition, gesture and device ID and we define a fuzzy matching engine to handle authentication. Preliminary results indicate that such an approach can be fast and user-friendly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ross, T.J.: Fuzzy Logic with Engineering Applications, Wiley, New York (2004). ISBN: 0470860758. http://www.worldcat.org/isbn/0470860758

  2. Chi, Z., Yan, H., Pham, T.: Fuzzy algorithms: with applications to image processing and pattern recognition. In: Advances in Fuzzy Systemsā€”Applications and Theory, vol. 10. World Scientific (1996). ISBN: 9810226977, 9789810226978

    Google ScholarĀ 

  3. Martino, F.D., Sessa, S.: Image matching by using fuzzy transforms. Adv. Fuzzy Syst. 2013(760704), 10 (2013). doi:10.1155/2013/760704

  4. Perfilieva, I.: Fuzzy Transforms, Transactions on Rough Sets II, vol. 3135, pp. 63ā€“81. Lecture Notes in Computer Science. Springer (2005). ISBN: 978-3-540-23990-1

    Google ScholarĀ 

  5. Bloch, I: Fuzzy relative position between objects in image processing: a morphological approach. In: IEEE Transactions on Pattern Analysis and Machine Intelligence (1999)

    Google ScholarĀ 

  6. Bloch, I., Ralescu, A.: Directional relative position between objects in image processing: a comparison between fuzzy approaches. Pattern Recogn. 36, 1563ā€“1582 (2003)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  7. Tan, Q., Akimoto, M.: Fuzzy matching for robot localization. In: Proceedings of IROS. IEEE (1996). ISBN: 96. 0-7803-3213-X

    Google ScholarĀ 

  8. Jinwen, T., Jianzhong, H., Jian, L., Dchua, L.: Image matching based on fuzzy information. In: 3rd International Conference on Signal Processing 1996, vol. 2, pp. 946ā€“949. 14ā€“18 Oct 1996. doi:10.1109/ICSIGP.1996.566246

  9. Wu, H., Chen, Q., Yachida, M.: Face detection from color images using a fuzzy pattern matching method. IEEE Trans. Pattern Anal. Mach. Intell. 21(6), 557ā€“563 (1999)

    Google ScholarĀ 

  10. Surajit C., Kris, G., Venkatesh, G., Rajeev, M.: Robust and efficient fuzzy match for online data cleaning. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMODā€™03) (2003)

    Google ScholarĀ 

  11. Zvi G., Alberto, A.: Pattern Matching Algorithms. Oxford University Press, Oxford (1997). ISBN: 0-19-511367-5

    Google ScholarĀ 

  12. Mustafa, A.A.Y.: Fuzzy shape matching with boundary signatures. Pattern Recogn. Lett. 23, 14731482 (2002)

    Google ScholarĀ 

  13. Ukkonen, E.: Algorithms for approximate string matching. Inf. Control 64, 10018 (1985). doi:10.1016/S0019-9958(85)80046-2

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  14. Li, Z.K., Xu, L.J., Fang, J., Peng, Q.J., Wang, M.: Research on the surrounding traffic flow of railway station based on License Plate Recognition and fuzzy matching. IEEE (2011). 978-1-61284-109-0

    Google ScholarĀ 

  15. Schultz P.T., Sartini, R.A.: Multi factor authentication method and system for multi-factor biometric authentication. US 20130227651 A1 (2012)

    Google ScholarĀ 

  16. Vyas, R., Garg, G.: Face recognition using feature extraction and neuro-fuzzy techniques. Int. J. Electron. Comput. Sci. Eng. (2013). ISSN: 2277ā€“1956

    Google ScholarĀ 

  17. Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338ā€“353 (1965)

    ArticleĀ  MATHĀ  MathSciNetĀ  Google ScholarĀ 

  18. Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst., Man Cybern. 15(1), 116132 (1985). http://www.hi.cs.meiji.ac.jp/takagi/paper/TS-MODEL.tar.gz

  19. http://www.openCV.org/

  20. http://www.webrtc.org/

  21. http://argodata.com/solutions/analytics/fuzzy-search/

  22. http://dev.w3.org/html5/html-author/

  23. Huang, X et al.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390ā€“1397 (2011)

    Google ScholarĀ 

  24. Pulli, K., Baksheev, A., Kornyakov, K., Eruhimov, V.: Real-time computer vision with OpenCV. Commun. ACM (CACM) 55(6), 61ā€“69 (2012)

    ArticleĀ  Google ScholarĀ 

Download references

Acknowledgments

This work was supported by Enterprise Ireland and carried out under the intellectual property of Sensipass Ltd. Patent Publication No. WO/2012/164385 Method and Computer Program for Providing Authentication to Control Access to a Computer System, Roman Sirota (UA), Michael J. Hill (US) and Thomas R. Ruddy (US).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alex Vakaloudis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Stockdale, J., Vakaloudis, A., EscaƱo, J.M., Liang, J., Cahill, B. (2015). A Fuzzy System for Three-Factor, Non-textual Authentication. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems in Science and Information 2014. SAI 2014. Studies in Computational Intelligence, vol 591. Springer, Cham. https://doi.org/10.1007/978-3-319-14654-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14654-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14653-9

  • Online ISBN: 978-3-319-14654-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics