Skip to main content
Have a personal or library account? Click to login
Facial Biometric Authentication Enhanced by Emotional and Demographic Contexts Cover

Facial Biometric Authentication Enhanced by Emotional and Demographic Contexts

Open Access
|Mar 2026

References

  1. SOEKARTA, R. – KU-MAHAMUD, K. R.: Recent facial image preprocessing techniques: A review, Engineering Proceedings, vol. 84, no. 1, p. 39, 2025. [Online]. Available: https://www.mdpi.com/2673-4591/84/1/39. doi: 10.3390/engproc2025084039
  2. TANWAR, S. – TYAGI, S. – KUMAR, N. – OBAIDAT, M. S.: Ethical, legal, and social implications of biometric technologies, in Biometricbased physical and cybersecurity systems, Springer, 2018, pp. 535–569.
  3. LI, C. – WANG, L. – JI, S. – ZHANG, X. – XI, Z. – GUO, S. – WANG, T.: “Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era,” in Proc. 31st USENIX Security Symposium (USENIX Security 22), pp. 2673–2690, 2022.
  4. YU, Z. – CAI, R. – LI, Z. – YANG, W. – SHI, J. – KOT, A. C.: “Benchmarking joint face spoofing and forgery detection with visual and physiological cues,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 5, pp. 4327–4342, 2024.
  5. WANG, M. – QIN, Y. – LIU, J. – LI, W.: “Privacy protection framework for face recognition in edgebased IoT,” Frontiers in Psychology, vol. 13, 2022. doi: 10.3389/fpsyg.2022.1018137
  6. DEY, M. – MONDAL, A., Et al.: “Ensuring privacy in face recognition: a survey on data generation, inference and storage,” SN Applied Sciences, vol. 7, no. 2, 2025. doi: 10.1007/s42452-025-06987-2
  7. VERDOLIVA, L.: “Media Forensics and DeepFakes: An Overview,” IEEE Journal of Selected Topics in Signal Processing, vol. 14, no. 5, pp. 910–932, 2020. doi: 10.1109/JSTSP.2020.3002101
  8. JAIN, A. K. – ROSS, A. – PRABHAKAR, S.: “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20, 2004.
  9. TIWARI, S. – RAJA, R. – WADAWADAGI, R. S. – NAITHANI, K. – RAJA, H. – INGLE, D.: “Emerging biometric modalities and integration challenges,” in Online Identity—An Essential Guide, IntechOpen, 2024.
  10. SADEEQ, M. M. – ABDULKAREEM, N. M. – ZEEBAREE, S. R. M. – AHMED, D. M. – SAMI, A. S. – ZEBARI, R. R.: IoT and cloud computing issues, challenges, and opportunities: A review. In Qubahan Academic Journal, volume 1, number 2, pages 1–7, 2021.
  11. RAHMAN, A. – SUBRIADI, A. P.: Software as a service (SaaS) adoption factors: individual and organizational perspective. In 2022 2nd International Conference on Information Technology and Education (ICIT&E), pages 31–36, IEEE, 2022.
  12. GOHIL, R. – PATEL, H.: Comparative analysis of cloud platform: Amazon Web Service, Microsoft Azure, and Google Cloud Provider: A review. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), pages 1–5, IEEE, 2024.
  13. ALETABI, H. – ABDALLAH, M.: A proposed cloud quality model (IaaSQual) for “Infrastructure as a Service (IaaS)” from user’s perspective. In 2023 International Conference on Information Technology (ICIT), pages 695–699, IEEE, 2023.
  14. DENG, H. – QIN, Z. – WU, Q. – GUAN, Z. – DENG, R. H. – WANG, Y. – ZHOU, Y.: Identitybased encryption transformation for flexible sharing of encrypted data in public cloud. IEEE Transactions on Information Forensics and Security, 15:3168–3180, IEEE, 2020.
  15. DHAYA, R. – UJWAL, U. J. – TRIPTI SHARMA – PRABHDEEP SINGH – KANTHAVEL, R. – SENTHAMIL SELVAN – KRAH, D.: Energyefficient resource allocation and migration in private cloud data centre. Wireless Communications & Mobile Computing (Online), 2022, Hindawi Limited, 2022.
  16. AZAD, M. W. A. – SHANNIGRAHI, S. – STERGIOU, N. – ORTEGA, F. R. – MASTORAKIS, S.: Cledge: A hybrid cloud-edge computing framework over information centric networking. In 2021 IEEE 46th Conference on Local Computer Networks (LCN), pages 589–596, IEEE, 2021.
  17. ASLAN, O. – AKTUG˘, S. S. – OZKAN-OKAY, M. – YILMAZ, A. A. – AKIN, E.: “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, vol. 12, no. 6, p. 1333, 2023.
  18. ANTHONY, P. – AY, B. – AYDIN, G.: “A review of face anti-spoofing methods for face recognition systems,” in 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), 2021, pp. 1–9.
  19. SAI, G. H. – TYAGI, A. K. – SREENATH, N.: “Biometric security in Internet of Things based system against identity theft attacks,” in 2023 International Conference on Computer Communication and Informatics (ICCCI), 2023, pp. 1–7.
  20. MEHRAJ, H. – JAYADEVAPPA, D. – HALEEM, S. L. A. – PARVEEN, R. – MADDURI, A. – AYYAGARI, M. R. – DHABLIYA, D.: “Protection motivation theory using multi-factor authentication for providing security over social networking sites,” Pattern Recognition Letters, vol. 152, pp. 218–224, 2021.
  21. LEMBKE, J. – RAVI, S. – ROMAN, P. L. – EUGSTER, P.: “Secure and reliable network updates,” ACM Transactions on Privacy and Security, vol. 26, no. 1, pp. 1–41, 2022.
  22. VIGNESH, S. – DURGASHIVANI, S. – HARIDA, W.: “Create an Intrusion Detection System to Detect Threats in Public WiFi Networks,” in 2025 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), vol. 3, pp. 1–6, 2025.
  23. WANG, M. – QIN, Y. – LIU, J. – LI, W.: “Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks,” Humanities and Social Sciences Communications, vol. 10, no. 1, pp. 1–15, 2023.
  24. GUDIMETLA, SANDEEP REDDY: Data Encryption in Cloud Storage. International Research Journal of Modernization in Engineering Technology and Science, vol. 6, 2024, pp. 2582–5208.
  25. LEVICKY, D. – BRODA, M. – ŠIMKO, E.: Kyberneticka bezpeˇcnost’. 1. vyd. Košice: Technicka univerzita v Košiciach, 2025. 160 s. ISBN 978-80-553-4770-7.
  26. LEVICKY, D.: Aplikovana kryptografia. 1. vyd. Košice: Elfa, 2018. 437 s. ISBN 978-80-8086-265-7.
  27. SOMASUNDARAM, P.: “Enhancing security in multi-cloud environments through federated access control,” International Journal of Computer Engineering and Technology (IJCET), vol. 14, no. 2, pp. 90–96, 2023.
  28. POOKANDY, J.: “Multi-factor authentication and identity management in cloud CRM with best practices for strengthening access controls,” International Journal of Information Technology and Management Information Systems (IJITMIS), vol. 12, no. 1, pp. 85–96, 2021.
  29. COPPINI, S. – LUCIFORA, C. – VICARIO, C. M. – GANGEMI, A.: “Experiments on real-life emotions challenge Ekman’s model,” Scientific Reports, vol. 13, no. 1, p. 9511, 2023.
DOI: https://doi.org/10.2478/aei-2026-0003 | Journal eISSN: 1338-3957 | Journal ISSN: 1335-8243
Language: English
Page range: 18 - 26
Submitted on: Oct 20, 2025
Accepted on: Dec 4, 2025
Published on: Mar 21, 2026
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2026 Eva Kupcová, Matúš Pleva, Zuzana Sokolová, Jakub Bajo, published by Technical University of Košice
This work is licensed under the Creative Commons Attribution 4.0 License.