2009
DOI: 10.1007/978-3-642-01347-8_64
|View full text |Cite
|
Sign up to set email alerts
|

A Video-Based Biometric Authentication for e-Learning Web Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Authentication controls have three common factors that challenge what: a user knows (a password), a user has (a token), or a user is (a biometric) (Furnell, 2007). Although, a number of differing solutions have been proposed to address this prevailing issue by using authentication controls with a wide variation of strength, there is a lack of consistency in what level of authentication strength is suitable (Jalal & Zeb, 2008;Penteado & Marana, 2009). Authentication strength is measured by the combinations of the number and the type of authentication factors used to identify a remote system user (O'Gorman, 2003).…”
Section: Item Descriptionmentioning
confidence: 99%
“…Authentication controls have three common factors that challenge what: a user knows (a password), a user has (a token), or a user is (a biometric) (Furnell, 2007). Although, a number of differing solutions have been proposed to address this prevailing issue by using authentication controls with a wide variation of strength, there is a lack of consistency in what level of authentication strength is suitable (Jalal & Zeb, 2008;Penteado & Marana, 2009). Authentication strength is measured by the combinations of the number and the type of authentication factors used to identify a remote system user (O'Gorman, 2003).…”
Section: Item Descriptionmentioning
confidence: 99%
“…In addition, secure real-time user authentication and access right management solutions are being actively researched and deployed in both universities and corporate settings (Deutschmann, Nordstrom, & Nilsson, 2013;Penteado & Marana, 2009;Zhou & Bhanu, 2007). In response to these demands, researchers are actively seeking new communication and collaboration technologies, which will reduce meeting attendees' enrollment time and provide the meeting organizer with the tools for efficient real-time attendance tracking and access resource management.…”
Section: Biometric-based User Authentication and Activity Level Detecmentioning
confidence: 99%
“…Traditional approaches to the problem involve the use of IDs, smart cards, and user password/logon, coupled with user identity management solutions, all of which require a significant amount of time and additional resources (Jeon, Kim, & Kim, 2011;Kumar, 2010). Rapid development of biometric technologies opened the door to a new class of fast and reliable identity management solutions and changed the research landscape (Down & Sands, 2004;Penteado & Marana, 2009;Yanushkevich, Gavrilova, Wang, & Srihari, 2007). A biometric system can be defined as a patternrecognition system that can recognize individuals based on the characteristics of their physiology or behavior (Prabhakar, Pankanti, & Jain, 2003).…”
Section: Biometric-based User Authentication and Activity Level Detecmentioning
confidence: 99%
“…Hence, the authors propose an authentication system that exploits multi-biometrics to support various services in eLearning where user authentication is required. The use of webcam face images to authenticate the presence of users during on-line courses is addressed by the work in [24]. Also, the authors in [25] introduce a biometric scheme for providing continuous user authentication in e-examination through keystroke dynamics.…”
Section: Related Orkmentioning
confidence: 99%
“…So, they require special effort to become crossoperable and interoperable. On the other hand, most of the biometric solutions proposed so far either require special equipment to be deployed in certain places [24], or impose the use of expensive equipment [22], [26], [27]. A major problem of biometrics authentication (like Keystroke [25] and mouse clicking) is that it is not free from errors and false recognition rate can be very high.…”
Section: Related Orkmentioning
confidence: 99%