Abstract
As text-based authentication has had its critiques, non-textual techniques have been suggested throughout the last two decades. However, it is only lately, with the wide-spread adoption of smartphones and tablet devices that they have found a compelling application. Non-textual authentication may be faster and more secure and it also introduces a new paradigm for the authentication decision. We present a three factor system based on facial recognition, gesture and device ID and we define a fuzzy matching engine to handle authentication. Preliminary results indicate that such an approach can be fast and user-friendly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ross, T.J.: Fuzzy Logic with Engineering Applications, Wiley, New York (2004). ISBN: 0470860758. http://www.worldcat.org/isbn/0470860758
Chi, Z., Yan, H., Pham, T.: Fuzzy algorithms: with applications to image processing and pattern recognition. In: Advances in Fuzzy SystemsāApplications and Theory, vol. 10. World Scientific (1996). ISBN: 9810226977, 9789810226978
Martino, F.D., Sessa, S.: Image matching by using fuzzy transforms. Adv. Fuzzy Syst. 2013(760704), 10 (2013). doi:10.1155/2013/760704
Perfilieva, I.: Fuzzy Transforms, Transactions on Rough Sets II, vol. 3135, pp. 63ā81. Lecture Notes in Computer Science. Springer (2005). ISBN: 978-3-540-23990-1
Bloch, I: Fuzzy relative position between objects in image processing: a morphological approach. In: IEEE Transactions on Pattern Analysis and Machine Intelligence (1999)
Bloch, I., Ralescu, A.: Directional relative position between objects in image processing: a comparison between fuzzy approaches. Pattern Recogn. 36, 1563ā1582 (2003)
Tan, Q., Akimoto, M.: Fuzzy matching for robot localization. In: Proceedings of IROS. IEEE (1996). ISBN: 96. 0-7803-3213-X
Jinwen, T., Jianzhong, H., Jian, L., Dchua, L.: Image matching based on fuzzy information. In: 3rd International Conference on Signal Processing 1996, vol. 2, pp. 946ā949. 14ā18 Oct 1996. doi:10.1109/ICSIGP.1996.566246
Wu, H., Chen, Q., Yachida, M.: Face detection from color images using a fuzzy pattern matching method. IEEE Trans. Pattern Anal. Mach. Intell. 21(6), 557ā563 (1999)
Surajit C., Kris, G., Venkatesh, G., Rajeev, M.: Robust and efficient fuzzy match for online data cleaning. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMODā03) (2003)
Zvi G., Alberto, A.: Pattern Matching Algorithms. Oxford University Press, Oxford (1997). ISBN: 0-19-511367-5
Mustafa, A.A.Y.: Fuzzy shape matching with boundary signatures. Pattern Recogn. Lett. 23, 14731482 (2002)
Ukkonen, E.: Algorithms for approximate string matching. Inf. Control 64, 10018 (1985). doi:10.1016/S0019-9958(85)80046-2
Li, Z.K., Xu, L.J., Fang, J., Peng, Q.J., Wang, M.: Research on the surrounding traffic flow of railway station based on License Plate Recognition and fuzzy matching. IEEE (2011). 978-1-61284-109-0
Schultz P.T., Sartini, R.A.: Multi factor authentication method and system for multi-factor biometric authentication. US 20130227651 A1 (2012)
Vyas, R., Garg, G.: Face recognition using feature extraction and neuro-fuzzy techniques. Int. J. Electron. Comput. Sci. Eng. (2013). ISSN: 2277ā1956
Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338ā353 (1965)
Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst., Man Cybern. 15(1), 116132 (1985). http://www.hi.cs.meiji.ac.jp/takagi/paper/TS-MODEL.tar.gz
Huang, X et al.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390ā1397 (2011)
Pulli, K., Baksheev, A., Kornyakov, K., Eruhimov, V.: Real-time computer vision with OpenCV. Commun. ACM (CACM) 55(6), 61ā69 (2012)
Acknowledgments
This work was supported by Enterprise Ireland and carried out under the intellectual property of Sensipass Ltd. Patent Publication No. WO/2012/164385 Method and Computer Program for Providing Authentication to Control Access to a Computer System, Roman Sirota (UA), Michael J. Hill (US) and Thomas R. Ruddy (US).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Stockdale, J., Vakaloudis, A., EscaƱo, J.M., Liang, J., Cahill, B. (2015). A Fuzzy System for Three-Factor, Non-textual Authentication. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems in Science and Information 2014. SAI 2014. Studies in Computational Intelligence, vol 591. Springer, Cham. https://doi.org/10.1007/978-3-319-14654-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-14654-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14653-9
Online ISBN: 978-3-319-14654-6
eBook Packages: EngineeringEngineering (R0)