Immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing

被引:0
作者
Peng Su
机构
[1] Business School of Henan University (Jinming Campus),
来源
Distributed and Parallel Databases | 2023年 / 41卷
关键词
Biometrics; Face recognition; Online guiding; Mobile terminal; Edge computing; Cloud services;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet deconstructs and reshapes the traditional classroom organization, the status of teachers, the authority of teaching materials and the role of students. Online Ideological and political education with the help of the Internet has become an inevitable trend of Ideological and political education. Mobile edge computing solves the high delay barrier when traditional cloud computing center provides services. It is a new technology with wide application prospects, which provides convenience for online education. At the network edge, the mobile edge computing service network can be established due to the deployment of small base stations. Mobile users can upload and migrate some computing intensive or delay sensitive tasks to the currently connected small base station, and then the mobile edge computing network uses the hardware resources on the small base station to assist users in processing such tasks. Face verification technology can be widely used in access control, attendance, government convenience services and other occasions that need identity verification. Hence, this paper proposes the immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing. We use the combined technologies to construct the efficient model. The proposed framework is validated compared with the other state-of-the-art methods.
引用
收藏
页码:133 / 154
页数:21
相关论文
共 62 条
[1]  
Boulkenafet Z(2017)Face spoofing detection using colour texture analysis IEEE Trans. Inf. Forensics Secur. 11 1818-1830
[2]  
Komulainen J(2016)Face liveness detection using dynamic local ternary pattern (DLTP) Computers 5 10-786
[3]  
Hadid A(2015)Face-spoofing 2D-detection based on Moiré-pattern analysis IEEE Trans. Inf. Forensics Secur 10 778-1
[4]  
Parveen S(2017)Face liveness detection using a flash against 2D spoofing attack IEEE Trans. Inf. Forensics Secur. 99 1-465
[5]  
Ahmad SMS(2017)Mobile edge computing: a survey IEEE Internet Things J. 5 450-777
[6]  
Abbas NH(2015)Detection of face spoofing using visual dynamics IEEE Trans. Inf. Forenics Secur 10 762-61
[7]  
Garcia DC(2020)Using lignin as the precursor to synthesize Fe3O4@ lignin composite for preparing electromagnetic wave absorbing lignin-phenol-formaldehyde adhesive Ind. Crops Prod. 154 112638-1656
[8]  
de Queiroz RL(2017)Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges IEEE Commun. Mag. 55 54-2589
[9]  
Chan PPK(2019)Comparative study of factors affecting public acceptance of mining projects: evidence from USA, China and Turkey J. Clean. Prod. 237 117634-73
[10]  
Liu W(2017)Mobile edge computing: a survey on architecture and computation offload-ing IEEE Commun. Surv. Tutor. 19 1628-70