The Assistance of Eye Blink Detection for Two- Factor Authentication
Main Article Content
Abstract
This paper discusses the implementation of a blink detection method using 68 facial markers and the eye aspect ratio (EAR) to provide strong protection for access systems. It investigates the importance of 68 facial markers and explores how to use eye landmarks to calculate the eye aspect ratio. Access systems, which should have good security measures and be difficult to decipher, are typically safeguarded by passwords or multi-factor verification, such as passwords combined with facial recognition. However, these methods have inherent weaknesses, including the risk of shoulder surfing with passwords and the potential to be deceived by fake face images with facial recognition. To address these issues, a two-factor authentication method by using password with eye blink recognition is proposed as an effective solution for access control. By incorporating real-time eye blinking action, the system can avoid the use of fake images and prevent shoulder spoofing. To demonstrate the practical application of eye blink detection for enhanced two-factor authentication, a web application called "Eblink" is introduced. Functional tests have been conducted to validate the application's core features.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
All articles published in JIWE are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License. Readers are allowed to
- Share — copy and redistribute the material in any medium or format under the following conditions:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use;
- NonCommercial — You may not use the material for commercial purposes;
- NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
References
W. Jing, L. W. Ang, S. Palaniappan, B. He, “Robust Image Watermarking With Quaternion Fractional-Order Polar Harmonic-Fourier Moments Based On Wavelet Transformation: Resistance Against Rotation Attacks,” Journal of Informatics and Web Engineering, vol. 2, no. 1, pp. 56 – 65, 2023.
W-Chi. Ku, “Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture”, IEEE Transactions on Neural Networks, vol. 16, no. 4, pp. 1002–1005, 2005, doi: 10.1109/TNN.2005.849781.
A. A. Abusharha, “Changes in blink rate and ocular symptoms during different reading tasks. Clinical Optometry”, Clinical Optometry, vol. 9, pp. 133–138, 2017.
K. Kwon, R. J. Shipley, M. Edirisinghe, D. G. Ezra, G. Rose, S. M. Best, R. E. Cameron, “High-speed camera characterization of voluntary eye blinking kinematics,” Journal of the Royal Society Interface, vol. 10, no. 85, 2013.
“Why Do We Blink Our Eyes? | MyVision.org”, 2023. https://myvision.org/eye-health/why-do-we-blink/
N. A. C. Hasan, K. Karuppiah, N. A. Hamzah and S. B. M. Tamrin, “Risk Factors of Fatigue: A Systematic Review Among Transportation Drivers,” Malaysian Journal of Medicine and Health Sciences, vol. 17, pp. 184-192, 2021.
H. Jee, S. Jung, J. Yoo, “Liveness Detection for Embedded Face Recognition System,” International Journal of Biological and Medical Sciences. vol. 1, pp. 235-238, 2006.
R. J. Simpson, S. P. Levine, “Voice control of a powered wheelchair”, IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 10, pp. 122–125, 2022.
M. S. Kandhari, F. Zulkemine, H. Isah, "A Voice Controlled E-Commerce Web Application", 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, pp. 118-124, 2018.
J. Perret, E. V. Poorten, “Touching Virtual Reality: A Review of Haptic Gloves”, 16th International Conference on New Actuators, pp. 1–5, 2018.
A. Abbas, “QR Code in Authentication Services: A Safe and Secure Verification Process”, 2023. https://www.linkedin.com/pulse/qr-code-authentication-services-safe-secure-process-aliasgar-abbas
P. I. Fatema, A. Khan, A. Gedekar, A. Khawaja, M. Barghat. N. Khan, “Masked Face Recognition,” International Journal of Advanced Research in Science, Communication and Technology, pp. 98–102, 2021.
Q. Wang and D. Wang, "Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices", IEEE Transactions on Information Forensics and Security, vol. 18, pp. 597-612, 2023.
T. Soukupova and J. Cech, “Real-Time Eye Blink Detection using Facial Landmarks”, 21st Computer Vision Winter Workshop, 2016.