Implementing Computer Vision and Biometrics into User Authentication

Danial Muhammad Firdaus Anson (1), Nur Erlida Ruslan (2), Su-Cheng Haw (3)
(1) Faculty of Computing and Informatics, Multimedia University, Persiaran Multimedia, Cyberjaya, Malaysia
(2) Faculty of Computing and Informatics, Multimedia University, Persiaran Multimedia, Cyberjaya, Malaysia
(3) Faculty of Computing and Informatics, Multimedia University, Persiaran Multimedia, Cyberjaya, Malaysia
Fulltext View | Download
How to cite (IJASEIT) :
[1]
D. M. Firdaus Anson, N. E. Ruslan, and S.-C. Haw, “Implementing Computer Vision and Biometrics into User Authentication”, Int. J. Adv. Sci. Eng. Inf. Technol., vol. 15, no. 1, pp. 310–317, Feb. 2025.
The highly digital world that is present today requires robust protection of personal information, primarily when it is handled digitally. As cyber threats continually expand, the demand for reliable authentication systems becomes more critical. Many security systems are more secure than currently implemented since some still use basic and multi-factor authentication features. Unfortunately, these systems are tedious to navigate and would compromise user experience so that it can be more secure. This paper goes through research in the field, focusing on facial and speech recognition. Additionally, implementing current authentication systems will be evaluated and used further as benchmarking. The review intends to gather an understanding of the current state of research and real-world implementation so that a method of implementing computer vision in biometric authentication can be proposed. This paper comprehensively overviews the current state-of-the-art facial and brief speech recognition state. Training a model and evaluating its accuracy can be viable for biometric authentication. This paper first demonstrates facial recognition as Labelled Faces in the Wild (LFW) taken from Kaggle.com. The proposed result was focused on the accuracy metric. This paper shall be continued by using libraries such as Keras Tuner and Optuna to assist in selecting the optimal set of hyperparameters.

V. W. S. Tan, W. X. Ooi, Y. F. Chan, C. Tee, and M. K. O. Goh, “Vision-based gait analysis for neurodegenerative disorders detection,” J. Inform. Web Eng., vol. 3, no. 1, pp. 136–154, 2024, doi: 10.33093/jiwe.2024.3.1.9.

J. Kim, T.-S. Ng, and A. B. J. Teoh, “Conditional deployable biometrics: Matching periocular and face in various settings,” J. Inform. Web Eng., vol. 3, no. 3, pp. 302–313, Oct. 2024, doi: 10.33093/jiwe.2024.3.3.19.

F. Ahamed, F. Farid, B. Suleiman, Z. Jan, L. A. Wahsheh, and S. Shahrestani, “An intelligent multimodal biometric authentication model for personalised healthcare services,” Future Internet, vol. 14, no. 8, pp. 1–28, 2022, doi: 10.3390/fi14080222.

A. Jaya Prakash, K. K. Patro, M. Hammad, R. Tadeusiewicz, and P. Pławiak, “BAED: A secured biometric authentication system using ECG signal based on deep learning techniques,” Biocybern. Biomed. Eng., vol. 42, no. 4, pp. 1081–1093, 2022, doi: 10.1016/j.bbe.2022.08.004.

N. D. Sarier, “Privacy preserving biometric authentication on the blockchain for smart healthcare,” Pervasive Mob. Comput., vol. 86, p. 101683, 2022, doi: 10.1016/j.pmcj.2022.101683.

Y. Liang, S. Samtani, B. Guo, and Z. Yu, “Behavioral biometrics for continuous authentication in the Internet-of-Things era: An artificial intelligence perspective,” IEEE Internet Things J., vol. 7, no. 9, pp. 9128–9143, 2020, doi: 10.1109/jiot.2020.3004077.

P. Bothra, R. Karmakar, S. Bhattacharya, and S. De, “How can applications of blockchain and artificial intelligence improve performance of Internet of Things? – A survey,” Comput. Netw., vol. 224, p. 109634, 2023, doi: 10.1016/j.comnet.2023.109634.

S. Furnell, “Assessing website password practices – Unchanged after fifteen years?,” Comput. Secur., vol. 120, p. 102790, 2022, doi: 10.1016/j.cose.2022.102790.

L. A. Meyer, S. Romero, G. Bertoli, T. Burt, A. Weinert, and J. L. Ferres, “How effective is multifactor authentication at deterring cyberattacks?,” arXiv, 2023, doi: 10.48550/arxiv.2305.00945.

B. Jeon et al., “A facial recognition mobile app for patient safety and biometric identification: Design, development, and validation,” JMIR Mhealth Uhealth, vol. 7, no. 4, p. e11472, 2019, doi: 10.2196/11472.

R. R. Datta, D. D. Suman, C. Nabanita, and K. D. Ranjan, “Biometric-based computer vision for boundless possibilities: Process, techniques, and challenges,” Oct. 31, 2024. doi: 10.1049/pbpc064e_ch3.

J. Kim, T. Ng, and A. J. Teoh, “Conditional deployable biometrics: Matching periocular and face in various settings,” J. Inform. Web Eng., vol. 3, no. 3, 2024, doi: 10.33093/jiwe.2024.3.3.19.

V. Upadhyaya, “Advancements in computer vision for biometrics enhancing security and identification,” in Leveraging Computer Vision to Biometric Applications, Chapman and Hall/CRC, 2025, pp. 260–292. doi: 10.1201/9781032614663-14.

L. V. Chernenkaya, E. N. Desyatirikova, and A. V. Rechinskii, “Realization of computer vision system for biometric identification of personality,” in 2021 Int. Russ. Autom. Conf. (RusAutoCon), 2021, pp. 409–414. doi: 10.1109/rusautocon52004.2021.9537374.

F. Hashmi, K. Ashish, S. Katiyar, and A. Keskar, “Computer vision in contactless biometric systems,” Int. Arab J. Inf. Technol., vol. 18, no. 3, pp. 484–492, 2021, doi: 10.34028/iajit/18/3a/12.

E. Chen, “Machine learning in cybersecurity: Computer vision for biometric authentication systems,” Afr. J. Artif. Intell. Sustain. Dev., vol. 3, no. 2, pp. 367–373, 2023.

G. Zou, G. Fu, M. Gao, J. Pan, and Z. Liu, “A new approach for small sample face recognition with pose variation by fusing Gabor encoding features and deep features,” Multimed. Tools Appl., vol. 79, no. 31, pp. 23571–23598, 2020, doi: 10.1007/s11042-020-09076-1.

J. Y. Choi and B. Lee, “Ensemble of deep convolutional neural networks with Gabor face representations for face recognition,” IEEE Trans. Image Process., vol. 29, pp. 3270–3281, 2020, doi: 10.1109/tip.2019.2958404.

M. T. Masud, M. Keshk, N. Moustafa, I. Linkov, and D. K. Emge, “Explainable artificial intelligence for resilient security applications in the Internet of Things,” IEEE Open J. Commun. Soc., vol. PP, p. 1, 2024, doi: 10.1109/ojcoms.2024.3413790.

S. I. Serengil and A. Ozpinar, “LightFace: A hybrid deep face recognition framework,” in 2020 Innov. Intell. Syst. Appl. Conf. (ASYU), 2020, pp. 1–5. doi: 10.1109/asyu50717.2020.9259802.

W. Cui, W. Zhan, J. Yu, C. Sun, and Y. Zhang, “Face recognition via convolutional neural networks and Siamese neural networks,” in 2019 Int. Conf. Intell. Comput. Autom. Syst. (ICICAS), 2019, pp. 746–750. doi: 10.1109/icicas48597.2019.00161.

M. Zulfiqar, F. Syed, M. J. Khan, and K. Khurshid, “Deep face recognition for biometric authentication,” in 2019 Int. Conf. Electr., Commun., Comput. Eng. (ICECCE), 2019, pp. 1–6. doi: 10.1109/icecce47252.2019.8940725.

R. Goel, M. Alamgir, H. Wahab, M. Alamgir, H. Ugail, and I. Mehmood, “Sibling discrimination using linear fusion on deep learning face recognition models,” J. Inform. Web Eng., vol. 3, no. 3, 2024, doi: 10.33093/jiwe.2024.3.3.14.

M. Heidari and K. Fouladi-Ghaleh, “Using Siamese networks with transfer learning for face recognition on small-samples datasets,” in 2020 Int. Conf. Mach. Vis. Image Process. (MVIP), 2020, pp. 1–4. doi: 10.1109/mvip49855.2020.9116915.

N. H. Tandel, H. B. Prajapati, and V. K. Dabhi, “Voice recognition and voice comparison using machine learning techniques: A survey,” in 2020 6th Int. Conf. Adv. Comput. Commun. Syst. (ICACCS), 2020, pp. 459–465. doi: 10.1109/icaccs48705.2020.9074184.

V. Passricha and R. K. Aggarwal, “A hybrid of deep CNN and bidirectional LSTM for automatic speech recognition,” J. Intell. Syst., vol. 29, no. 1, pp. 1261–1274, 2020, doi: 10.1515/jisys-2018-0372.

A. B. Nassif, I. Shahin, I. Attili, M. Azzeh, and K. Shaalan, “Speech recognition using deep neural networks: A systematic review,” IEEE Access, vol. 7, pp. 19143–19165, 2019, doi: 10.1109/access.2019.2896880.

W. Han et al., “ContextNet: Improving convolutional neural networks for automatic speech recognition with global context,” in Proc. Annu. Conf. Int. Speech Commun. Assoc. (INTERSPEECH), vol. 2020-Octob, no. 1, pp. 3610–3614, 2020, doi: 10.21437/interspeech.2020-2059.

S. F. Tan and G. C. Chung, “An evaluation study of user authentication in the Malaysian FinTech industry with uAuth security analytics framework,” J. Cases Inf. Technol., vol. 25, no. 1, pp. 1–27, 2023, doi: 10.4018/jcit.318703.

E. Mostafa, M. M. Hassan, and W. Said, “An interactive multi-factor user authentication framework in cloud computing,” Int. J. Comput. Sci. Netw. Secur., vol. 23, no. 8, p. 63, 2023, doi:10.22937/ijcsns.2023.23.8.8.

E. Cadet, O. S. Osundare, H. O. Ekpobimi, Z. Samira, and Y. Wondaferew, “Cloud migration and microservices optimization framework for large-scale enterprises,” Open Access Res. J. Eng. Technol., no. October, 2024, doi: 10.53022/oarjet.2024.7.2.0059.

F. Yang, C. Ma, J. Zhang, J. Zhu, W. Yuan, and A. Owens, “Touch and go: Learning from human-collected vision and touch,” arXiv, 2022, doi: 10.48550/arxiv.2211.12498.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).