RETRACTED: Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data (Retracted Article)

被引:2
作者
Chang, Shu [1 ]
Duan, Youtao [2 ]
机构
[1] Northwest Univ Polit Sci & Law, Sch Management, Xian 710122, Peoples R China
[2] Shanghai Univ Finance & Econ, Sch Humanity, Shanghai 200433, Peoples R China
关键词
D O I
10.1155/2022/4246750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although Internet technology brings invaluable benefits to all walks of life, the security of network and information is becoming more and more prominent. The leakage of personnel information caused by Internet security incidents causes irreparable harm and loss to individuals or enterprises. E-commerce is a virtual transaction mode based on Internet technology. Its security requirements for transactions are more stringent than those for traditional transaction modes. Traditional identity authentication technology can no longer meet its security needs. People urgently need a reliable identity authentication system, meaning to ensure the security of e-commerce. According to the actual application scenarios of the algorithm in e-commerce, this paper, based on the research on face recognition technology, focuses on the in-depth research on face detection technology under the background of big data in order to introduce face recognition technology in this paper. This paper proposes a feature-based face matching algorithm. The face image is preprocessed to improve the accuracy of real-time face detection and reduce the false detection rate. Based on the research of traditional facial feature extraction technology, a virtual sample set that can effectively support a traditional facial feature extraction algorithm is constructed to solve the problem of insufficient training samples in practical applications. The experimental results showed that the accuracy of the method in this paper can reach up to 79.5% and that the minimum time consumption is only 0.142 s. Compared with the traditional method, the accuracy rate is higher and the time consumption is shorter.
引用
收藏
页数:11
相关论文
共 19 条
[1]   Test-Based Security Certification of Composite Services [J].
Anisetti, Marco ;
Ardagna, Claudio ;
Damiani, Ernesto ;
Polegri, Gianluca .
ACM TRANSACTIONS ON THE WEB, 2019, 13 (01)
[2]   ASICS: authenticated key exchange security incorporating certification systems [J].
Boyd, Colin ;
Cremers, Cas ;
Feltz, Michele ;
Paterson, Kenneth G. ;
Poettering, Bertram ;
Stebila, Douglas .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) :151-171
[3]  
Doubleday J, 2019, PENTAGON, V35, P9
[4]  
Fang K.B., 2019, COMPUTER SIMULATION, V36, P115
[5]   The Challenges of Software Cybersecurity Certification [J].
Hernandez-Ramos, Jose L. ;
Matheu, Sara N. ;
Skarmeta, Antonio .
IEEE SECURITY & PRIVACY, 2021, 19 (01) :99-+
[6]   A structuration analysis of Small and Medium Enterprise (SME) adoption of E-Commerce: The case of Tanzania [J].
Kabanda, Salah ;
Brown, Irwin .
TELEMATICS AND INFORMATICS, 2017, 34 (04) :118-132
[7]   The General Data Protection Regulation and the rise of certification as a regulatory instrument [J].
Lachaud, Eric .
COMPUTER LAW & SECURITY REVIEW, 2018, 34 (02) :244-256
[8]  
[刘亚强 Liu Yaqiang], 2020, [计算机科学, Computer Science], V47, P293
[9]  
Liu Z, 2021, COMPUTER KNOWLEDGE T, V17, P246
[10]   Joint Feature Learning for Face Recognition [J].
Lu, Jiwen ;
Liong, Venice Erin ;
Wang, Gang ;
Moulin, Pierre .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) :1371-1383