Password Authentication Using Gaze Based Eye Tracking
Keywords:
Haar cascade algorithm, Facial Landmark AlgorithmAbstract
'Password Authentication Using Gaze Based Eye Tracking' is a system used for eye(retina) tracking using Haar cascade algorithm, Facial Landmark Algorithm. used for password authentication. A mounted camera will track eye movement and by eye movement and eye blinks it calculates gaze ratio and blinking ratio which are two mains to lock and unlock the system, this is aimed to make the system highly securable and to avoid cybercrimes like shoulder surfing or thermal tracking.
References
- Sarangi, P., Grassi, V., Kumar, V., Okamoto, J.:” Integrating Human Input with autonomous behaviours on an Intelligent Wheelchair Platform”, Journal of IEEE Intelligent System, 22, 2, 33-41, [2007].
- Matt Bailey, ET. Al, “Development of Vision Based Navigation for a Robotic Wheelchair”, in Proceedings of 2007 IEEE 10th International conference on rehabilitation robotics.
- Shafi. M, Chung. P. W. H:” A Hybrid Method for Eyes Detection in Facial Images”,
- https://www.researchgate.net/publication/318177511_Eye_Tracking_Graphical_Passwords
- https://www.eecis.udel.edu/~hnw/paper/acns15 Exploiting Eye Tracking for Smartphone Authentication.
- K. Mowery, S. Meiklejohn and S. Savage, “Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks,” WOOT ’11, pp. 1-8, August2011
- L.McLauchlan,H.T.BuiandM.Mehrübeoglu,“Real time iris tracking with a smart camera,” Proc. SPIE 7871, 787104,2011.
- L. M. Pham, M. Mehrubeoglu, H. T. Le, M. Ramchander, and D. Ryu, “Realtime eye tracking using a smart camera,” Proc. 2011 IEEE Applied Imagery Pattern Recognition Workshop
- “Healthcare Solution based on Machine LearningApplications in IOT and Edge Computing” at International Journal of Pure and Applied Mathematics,Volume 119,No 16, 1473-1484, ISSN: 1314-3395, 2018
- “Edge Computing Applications on Vehicular Networks” at IC-IREASM-2019, ISSN 2348-4918. VOL 06, SPECIAL ISSUE 06 October 2019
- “A Review of Security Strategies used in Vehicular Adhoc Networks” International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Volume 4, Issue 9, November-December 2019
- EDGE COMPUTER-ENABLED INTERNET OF VEHICLE APPLICATIONS WITH SECURE COMPUTING AND LOAD BALANCING, Darpan Majumder, S Mohan Kumar, D V Ashoka, A ShajinNaragunam, International Conference on Emerging Trends in Science, Engineering and Management VIRTUAL CONFERENCE (ICETSEM-2021), 21st - 23rd January 2021
- A Review of Black and Gray Hole Attacks in AODV published in First International Conference on Emerging Trends and Challenges in Applied Science, Engineering and Technology (ICECAET -2020)"Organizing by Gopalan College of Engineering and Management, on 10th and 11th , March, 2020
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.