Search In this Thesis
   Search In this Thesis  
العنوان
Developing Secure Authentication Protocols for Mobile Devices /
المؤلف
Abdallah, Amal Zarif Mahfouz.
هيئة الاعداد
باحث / أمل ظريف محفوظ عبد الله
مشرف / كامل حسين عبد الرازق رحومه
مناقش / عبدالمجيد على أمين
مناقش / جرجس منصور
الموضوع
Electrical engineering. Computer communication systems.
تاريخ النشر
2022.
عدد الصفحات
158 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2022
مكان الإجازة
جامعة المنيا - كلية الهندسه - الهندسة الكهربائية
الفهرس
Only 14 pages are availabe for public view

from 173

from 173

Abstract

Biometric identification is the automatic method of evaluating the biological records. Some types of biometric are fingerprint recognition, retinal scanning, and face recognition. The word biometrics is commonly used now to identify a person by analyzing his/her physical characteristics and comparing these characteristics to an existing database. Face recognition is type of the biometric methods that are utilized for detecting and authenticating the identity of a person.
In this dissertation, we propose some authentication protocols for mobile device. The first protocol was designed using MATLAB and it consists of 3 technologies for facial recognition. The first technique uses the Viola and Jones method for face detection. It is established on achieving a superior face detection rate with the lowest amount of time and it utilizes the correlation coefficients between the test image’s geometrical measurements and training database. The second technique is the face localization in which the detection of face region is done from the image, and then the feature extraction is carried out (nose detection, mouth detection, eyes detection). from the extracted features, we can obtain 11 measurements for each person and the recognition is done using correlation coefficient. The third technique uses the neural network as the recognition method for the same steps of the first technique.
The second and third protocols depend on the design of facial recognition systems for mobile devices using Android studio with the same way, but the difference between them in the face detector algorithm. The second uses object detection (Google’s API mobile vision) and the third uses feature-based method machine learning (ML) Kit mobile (machine learning SDK).
The fourth protocol relies on the traditional methods of protecting mobile devices. It combines between two systems password and pattern, and it depends on the user’s choice which system do you prefer to set password or pattern.