Abstract
ID/PW method is easy to implement, but has the disadvantage of the security strength is weak. The proposed face recognition authentication system method is used with ID/PW for the enhanced authentication. The main feature of the proposed system prevents face recognition technology from unlocking of photos only that is one of the shortcomings of Android 4.0. It also validates the machine including biometric information and a more secure encryption module is expected to provide a smart work environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee, J.S, Kim, H.S.: Smartwork current status and study. J. Korean Assoc. Reg. Inf. Soc. 13(4), 75–96 (2010)
Shabtai, A., et al.: Google Android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 35–44 (2010)
Pan, S.B., et al.: Technology trends of the biometric template protection techniques. Electron. Telecommun. Trends 18(5), 39–43 (2003)
Kim, J.-y., Kim, H.-C., Lee, B.-k.: Service system design inquiring identity using USIM card. Korean Society for Internet Information, Proceedings of the Korean Society for Internet Information Conference, pp. 15–18 (2009)
Yang, M.-H., Kriegman, D., Ahuja, N.: Detecting faces in images: a survey. IEEE Trans. Pattern Anal. Mach. Intell. (PAMI), 35–49 (2001)
Start, T.: Face Recognition, Apple, Google Android, Google+, Ipads, iPhone, iPod Blow. In: ComputerSight. www.computersight.com/communication-networks/security/face-recognitionapple-google-android-google-ipads-iphone-ipod-blow/ (2012)
Brunelli, R., Poggio, T.: Face recognition through geometrical features. In: Computer Vision—ECCV’92. Lecture Notes in Computer Science, Vol. 588, pp. 792–800 (1992)
Park, S.: Face detection and facial expression recognition using geometric features and micro texture distribution. Doctoral Dissertation, Department of Computer Science and Engineering, pp. 62–83 (2011)
Song, W.C., Park, S.H., Koh, K.S.: Metric and non-metric characteristics of Korean eyes using satadardized photographs. Korean. J. Phys. Anthropol. 15(2), 95–107 (2002)
Wang, J., Jiang, N.: Secure authentication and authorization scheme for mobile devices. In: Proceedings of the IEEE International Conference on Communications Technology and Applications ‘09, pp. 207–211 (2009)
Bovet, D., Cesati, M.: Understanding the Linux Kernel, 3rd edn. O’Reilly, Sebastopol (2005)
Stables, J.: Android 4.0 vs Apple iOS 5 vs Windows Phone 7.5. A Techradar Site, Buying Guides. http://whatlaptop.techradar.com/2012/03/android-4-0-vs-apple-ios-5-vs-windows-phone-7-5/ (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Han, S., Yang, S., Choi, Jh., Chung, M. (2013). Face Recognition System for the Enhanced Authentication in the Smart Work Environment. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_5
Download citation
DOI: https://doi.org/10.1007/978-94-007-5857-5_5
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5856-8
Online ISBN: 978-94-007-5857-5
eBook Packages: EngineeringEngineering (R0)