Chaudhry et al., 2018 - Google Patents
Discovering trends for the development of novel authentication applications for dementia patientsChaudhry et al., 2018
View PDF- Document ID
- 17159933694726551247
- Author
- Chaudhry J
- Farmand S
- Islam S
- Islam M
- Hannay P
- Valli C
- Publication year
- Publication venue
- International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence
External Links
Snippet
We aim at creating ease in authentication process through non-password-based authentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive …
- 206010012289 Dementia 0 title abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/222—Studio circuitry; Studio devices; Studio equipment; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
- H04N5/225—Television cameras; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
- H04N5/232—Devices for controlling television cameras, e.g. remote control; Control of cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in, e.g. mobile phones, computers or vehicles
- H04N5/23219—Control of camera operation based on recognized human faces, facial parts, facial expressions or other parts of the human body
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
US9411950B1 (en) | Methods and systems for user authentication in a computer system using image-based log-ins | |
Alt et al. | Emerging trends in usable security and privacy | |
Wang et al. | Verification Grid and Map Slipping Based Graphical Password against Shoulder‐Surfing Attacks | |
Shuwandy et al. | Sensor-Based Authentication in Smartphone; a Systematic Review | |
Vaithyasubramanian et al. | A scheme to create secured random password using markov chain | |
JP7021790B2 (en) | Providing access to structured stored data | |
Fatima et al. | A novel text-based user authentication scheme using pseudo-dynamic password | |
Chaudhry et al. | Discovering trends for the development of novel authentication applications for dementia patients | |
Abraheem et al. | Survey of various graphical password techniques and their schemes | |
Zimmermann et al. | Keep on rating–on the systematic rating and comparison of authentication schemes | |
Zimmermann¹ et al. | The quest to replace passwords revisited–rating authentication schemes | |
Dasgupta et al. | Authentication Basics: Key to the kingdom–Access a Computing System | |
Wang et al. | Analysis of multi-attribute user authentication to against man-in-the-room attack in virtual reality | |
Rawat et al. | Conversational Artificial Intelligence | |
Usmani et al. | New text-based user authentication scheme using CAPTCHA | |
Wills | The Official (ISC) 2 SSCP CBK Reference | |
Huan et al. | Authentication in E-learning systems: Challenges and Solutions | |
Rajarajan et al. | GRAMAP: Three stage graphical password authentication scheme. | |
Vaithyasubramanian et al. | Access to Network Login by Three‐Factor Authentication for Effective Information Security | |
Rawal et al. | Manage the Identification and Authentication of People, Devices, and Services | |
Ayannuga Olanrewaju et al. | Graphic-text authentication of a window-based application | |
Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
Su et al. | User biometric information‐based secure method for smart devices | |
Ling et al. | A case study of usable security: Usability testing of android privacy enhancing keyboard |