Implementing Computer Vision and Biometrics into User Authentication
How to cite (IJASEIT) :
V. W. S. Tan, W. X. Ooi, Y. F. Chan, C. Tee, and M. K. O. Goh, “Vision-based gait analysis for neurodegenerative disorders detection,” J. Inform. Web Eng., vol. 3, no. 1, pp. 136–154, 2024, doi: 10.33093/jiwe.2024.3.1.9.
J. Kim, T.-S. Ng, and A. B. J. Teoh, “Conditional deployable biometrics: Matching periocular and face in various settings,” J. Inform. Web Eng., vol. 3, no. 3, pp. 302–313, Oct. 2024, doi: 10.33093/jiwe.2024.3.3.19.
F. Ahamed, F. Farid, B. Suleiman, Z. Jan, L. A. Wahsheh, and S. Shahrestani, “An intelligent multimodal biometric authentication model for personalised healthcare services,” Future Internet, vol. 14, no. 8, pp. 1–28, 2022, doi: 10.3390/fi14080222.
A. Jaya Prakash, K. K. Patro, M. Hammad, R. Tadeusiewicz, and P. Pławiak, “BAED: A secured biometric authentication system using ECG signal based on deep learning techniques,” Biocybern. Biomed. Eng., vol. 42, no. 4, pp. 1081–1093, 2022, doi: 10.1016/j.bbe.2022.08.004.
N. D. Sarier, “Privacy preserving biometric authentication on the blockchain for smart healthcare,” Pervasive Mob. Comput., vol. 86, p. 101683, 2022, doi: 10.1016/j.pmcj.2022.101683.
Y. Liang, S. Samtani, B. Guo, and Z. Yu, “Behavioral biometrics for continuous authentication in the Internet-of-Things era: An artificial intelligence perspective,” IEEE Internet Things J., vol. 7, no. 9, pp. 9128–9143, 2020, doi: 10.1109/jiot.2020.3004077.
P. Bothra, R. Karmakar, S. Bhattacharya, and S. De, “How can applications of blockchain and artificial intelligence improve performance of Internet of Things? – A survey,” Comput. Netw., vol. 224, p. 109634, 2023, doi: 10.1016/j.comnet.2023.109634.
S. Furnell, “Assessing website password practices – Unchanged after fifteen years?,” Comput. Secur., vol. 120, p. 102790, 2022, doi: 10.1016/j.cose.2022.102790.
L. A. Meyer, S. Romero, G. Bertoli, T. Burt, A. Weinert, and J. L. Ferres, “How effective is multifactor authentication at deterring cyberattacks?,” arXiv, 2023, doi: 10.48550/arxiv.2305.00945.
B. Jeon et al., “A facial recognition mobile app for patient safety and biometric identification: Design, development, and validation,” JMIR Mhealth Uhealth, vol. 7, no. 4, p. e11472, 2019, doi: 10.2196/11472.
R. R. Datta, D. D. Suman, C. Nabanita, and K. D. Ranjan, “Biometric-based computer vision for boundless possibilities: Process, techniques, and challenges,” Oct. 31, 2024. doi: 10.1049/pbpc064e_ch3.
J. Kim, T. Ng, and A. J. Teoh, “Conditional deployable biometrics: Matching periocular and face in various settings,” J. Inform. Web Eng., vol. 3, no. 3, 2024, doi: 10.33093/jiwe.2024.3.3.19.
V. Upadhyaya, “Advancements in computer vision for biometrics enhancing security and identification,” in Leveraging Computer Vision to Biometric Applications, Chapman and Hall/CRC, 2025, pp. 260–292. doi: 10.1201/9781032614663-14.
L. V. Chernenkaya, E. N. Desyatirikova, and A. V. Rechinskii, “Realization of computer vision system for biometric identification of personality,” in 2021 Int. Russ. Autom. Conf. (RusAutoCon), 2021, pp. 409–414. doi: 10.1109/rusautocon52004.2021.9537374.
F. Hashmi, K. Ashish, S. Katiyar, and A. Keskar, “Computer vision in contactless biometric systems,” Int. Arab J. Inf. Technol., vol. 18, no. 3, pp. 484–492, 2021, doi: 10.34028/iajit/18/3a/12.
E. Chen, “Machine learning in cybersecurity: Computer vision for biometric authentication systems,” Afr. J. Artif. Intell. Sustain. Dev., vol. 3, no. 2, pp. 367–373, 2023.
G. Zou, G. Fu, M. Gao, J. Pan, and Z. Liu, “A new approach for small sample face recognition with pose variation by fusing Gabor encoding features and deep features,” Multimed. Tools Appl., vol. 79, no. 31, pp. 23571–23598, 2020, doi: 10.1007/s11042-020-09076-1.
J. Y. Choi and B. Lee, “Ensemble of deep convolutional neural networks with Gabor face representations for face recognition,” IEEE Trans. Image Process., vol. 29, pp. 3270–3281, 2020, doi: 10.1109/tip.2019.2958404.
M. T. Masud, M. Keshk, N. Moustafa, I. Linkov, and D. K. Emge, “Explainable artificial intelligence for resilient security applications in the Internet of Things,” IEEE Open J. Commun. Soc., vol. PP, p. 1, 2024, doi: 10.1109/ojcoms.2024.3413790.
S. I. Serengil and A. Ozpinar, “LightFace: A hybrid deep face recognition framework,” in 2020 Innov. Intell. Syst. Appl. Conf. (ASYU), 2020, pp. 1–5. doi: 10.1109/asyu50717.2020.9259802.
W. Cui, W. Zhan, J. Yu, C. Sun, and Y. Zhang, “Face recognition via convolutional neural networks and Siamese neural networks,” in 2019 Int. Conf. Intell. Comput. Autom. Syst. (ICICAS), 2019, pp. 746–750. doi: 10.1109/icicas48597.2019.00161.
M. Zulfiqar, F. Syed, M. J. Khan, and K. Khurshid, “Deep face recognition for biometric authentication,” in 2019 Int. Conf. Electr., Commun., Comput. Eng. (ICECCE), 2019, pp. 1–6. doi: 10.1109/icecce47252.2019.8940725.
R. Goel, M. Alamgir, H. Wahab, M. Alamgir, H. Ugail, and I. Mehmood, “Sibling discrimination using linear fusion on deep learning face recognition models,” J. Inform. Web Eng., vol. 3, no. 3, 2024, doi: 10.33093/jiwe.2024.3.3.14.
M. Heidari and K. Fouladi-Ghaleh, “Using Siamese networks with transfer learning for face recognition on small-samples datasets,” in 2020 Int. Conf. Mach. Vis. Image Process. (MVIP), 2020, pp. 1–4. doi: 10.1109/mvip49855.2020.9116915.
N. H. Tandel, H. B. Prajapati, and V. K. Dabhi, “Voice recognition and voice comparison using machine learning techniques: A survey,” in 2020 6th Int. Conf. Adv. Comput. Commun. Syst. (ICACCS), 2020, pp. 459–465. doi: 10.1109/icaccs48705.2020.9074184.
V. Passricha and R. K. Aggarwal, “A hybrid of deep CNN and bidirectional LSTM for automatic speech recognition,” J. Intell. Syst., vol. 29, no. 1, pp. 1261–1274, 2020, doi: 10.1515/jisys-2018-0372.
A. B. Nassif, I. Shahin, I. Attili, M. Azzeh, and K. Shaalan, “Speech recognition using deep neural networks: A systematic review,” IEEE Access, vol. 7, pp. 19143–19165, 2019, doi: 10.1109/access.2019.2896880.
W. Han et al., “ContextNet: Improving convolutional neural networks for automatic speech recognition with global context,” in Proc. Annu. Conf. Int. Speech Commun. Assoc. (INTERSPEECH), vol. 2020-Octob, no. 1, pp. 3610–3614, 2020, doi: 10.21437/interspeech.2020-2059.
S. F. Tan and G. C. Chung, “An evaluation study of user authentication in the Malaysian FinTech industry with uAuth security analytics framework,” J. Cases Inf. Technol., vol. 25, no. 1, pp. 1–27, 2023, doi: 10.4018/jcit.318703.
E. Mostafa, M. M. Hassan, and W. Said, “An interactive multi-factor user authentication framework in cloud computing,” Int. J. Comput. Sci. Netw. Secur., vol. 23, no. 8, p. 63, 2023, doi:10.22937/ijcsns.2023.23.8.8.
E. Cadet, O. S. Osundare, H. O. Ekpobimi, Z. Samira, and Y. Wondaferew, “Cloud migration and microservices optimization framework for large-scale enterprises,” Open Access Res. J. Eng. Technol., no. October, 2024, doi: 10.53022/oarjet.2024.7.2.0059.
F. Yang, C. Ma, J. Zhang, J. Zhu, W. Yuan, and A. Owens, “Touch and go: Learning from human-collected vision and touch,” arXiv, 2022, doi: 10.48550/arxiv.2211.12498.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).