Back to Search Start Over

Securable networked scheme with face authentication

Authors :
Da‐You Huang
Chun‐Liang Lin
Yang‐Yi Chen
Source :
IET Biometrics, Vol 11, Iss 2, Pp 97-108 (2022)
Publication Year :
2022
Publisher :
Wiley, 2022.

Abstract

Abstract Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti‐spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.

Details

Language :
English
ISSN :
20474946 and 20474938
Volume :
11
Issue :
2
Database :
Directory of Open Access Journals
Journal :
IET Biometrics
Publication Type :
Academic Journal
Accession number :
edsdoj.79cbc8f1e52e408aae588a9921e49670
Document Type :
article
Full Text :
https://doi.org/10.1049/bme2.12056