Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

[1]  Andy Adler,et al.  Biometric System Security , 2008 .

[2]  Indu Chhabra,et al.  Genetic Algorithm Implementation to Optimize the Hybridization of Feature Extraction and Metaheuristic Classifiers , 2018 .

[3]  Loris Nanni,et al.  Local binary patterns for a hybrid fingerprint matcher , 2008, Pattern Recognit..

[4]  Naveen K. Chilamkurti,et al.  IoT Resource Allocation and Optimization Based on Heuristic Algorithm , 2020, Sensors.

[5]  Aleksandr Ometov,et al.  Multi-Factor Authentication: A Survey , 2018, Cryptogr..

[6]  Seyedali Mirjalili,et al.  Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems , 2015, Neural Computing and Applications.

[7]  Takeshi Shakunaga,et al.  Combination of Projectional and Locational Decompositions for Robust Face Recognition , 2005, AMFG.

[8]  Takeshi Shakunaga,et al.  Gaussian Decomposition for Robust Face Recognition , 2006, ACCV.

[9]  M. Shamim Hossain,et al.  Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System , 2020, IEEE Transactions on Industrial Informatics.

[10]  Jun Cai,et al.  Single-Sample Face Recognition Based on Intra-Class Differences in a Variation Model , 2015, Sensors.

[11]  Bruce A. Draper,et al.  The Good, the Bad, and the Ugly Face Challenge Problem , 2012, Image and Vision Computing.

[12]  Prabhat Kumar,et al.  A Comprehensive Study on Multifactor Authentication Schemes , 2012, ACITY.

[13]  M. Shamim Hossain,et al.  Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.

[14]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[15]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[16]  Loris Nanni,et al.  A simple method for improving local binary patterns by considering non-uniform patterns , 2012, Pattern Recognit..

[17]  R. Abdullah,et al.  Authentication for ID cards based on colour visual cryptography and facial recognition , 2019, ICCSP.

[18]  Ali A. Yassin,et al.  Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device , 2019, Cryptogr..

[19]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..