Face Recognition System for the Enhanced Authentication in the Smart Work Environment

  • SangKon Han
  • Seokhwan Yang
  • Jae-hyuk Choi
  • Mokdong Chung
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)


ID/PW method is easy to implement, but has the disadvantage of the security strength is weak. The proposed face recognition authentication system method is used with ID/PW for the enhanced authentication. The main feature of the proposed system prevents face recognition technology from unlocking of photos only that is one of the shortcomings of Android 4.0. It also validates the machine including biometric information and a more secure encryption module is expected to provide a smart work environment.


Face recognition Mobile security Smart work 


  1. 1.
    Lee, J.S, Kim, H.S.: Smartwork current status and study. J. Korean Assoc. Reg. Inf. Soc. 13(4), 75–96 (2010)Google Scholar
  2. 2.
    Shabtai, A., et al.: Google Android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 35–44 (2010)CrossRefGoogle Scholar
  3. 3.
    Pan, S.B., et al.: Technology trends of the biometric template protection techniques. Electron. Telecommun. Trends 18(5), 39–43 (2003)Google Scholar
  4. 4.
    Kim, J.-y., Kim, H.-C., Lee, B.-k.: Service system design inquiring identity using USIM card. Korean Society for Internet Information, Proceedings of the Korean Society for Internet Information Conference, pp. 15–18 (2009)Google Scholar
  5. 5.
    Yang, M.-H., Kriegman, D., Ahuja, N.: Detecting faces in images: a survey. IEEE Trans. Pattern Anal. Mach. Intell. (PAMI), 35–49 (2001) Google Scholar
  6. 6.
    Start, T.: Face Recognition, Apple, Google Android, Google+, Ipads, iPhone, iPod Blow. In: ComputerSight. (2012)
  7. 7.
    Brunelli, R., Poggio, T.: Face recognition through geometrical features. In: Computer Vision—ECCV’92. Lecture Notes in Computer Science, Vol. 588, pp. 792–800 (1992) Google Scholar
  8. 8.
    Park, S.: Face detection and facial expression recognition using geometric features and micro texture distribution. Doctoral Dissertation, Department of Computer Science and Engineering, pp. 62–83 (2011)Google Scholar
  9. 9.
    Song, W.C., Park, S.H., Koh, K.S.: Metric and non-metric characteristics of Korean eyes using satadardized photographs. Korean. J. Phys. Anthropol. 15(2), 95–107 (2002)Google Scholar
  10. 10.
    Wang, J., Jiang, N.: Secure authentication and authorization scheme for mobile devices. In: Proceedings of the IEEE International Conference on Communications Technology and Applications ‘09, pp. 207–211 (2009)Google Scholar
  11. 11.
    Bovet, D., Cesati, M.: Understanding the Linux Kernel, 3rd edn. O’Reilly, Sebastopol (2005)Google Scholar
  12. 12.
    Stables, J.: Android 4.0 vs Apple iOS 5 vs Windows Phone 7.5. A Techradar Site, Buying Guides. (2012)

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • SangKon Han
    • 1
  • Seokhwan Yang
    • 1
  • Jae-hyuk Choi
    • 2
  • Mokdong Chung
    • 1
  1. 1.Department of Computer EngineeringPukyong National UniversityBusan Korea
  2. 2.Department of Computer EducationSilla UniversityBusanKorea

Personalised recommendations