Logo IIIS


International Institute of
Informatics and Systemics
2024 Spring Conferences Proceedings




Face Authentication by Constructing a 3D Face Image from 2D Face Images, and Encoding a Unique Identification
Menachem Domb, Ayelet Zadok
Proceedings of the 15th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2024, pp. 65-69 (2024); https://doi.org/10.54808/IMCIC2024.01.65
The 15th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2024
Virtual Conference
March 26 - 29, 2024


Proceedings of IMCIC 2024
ISSN: 2771-5914 (Print)
ISBN (Volume): 978-1-950492-78-7 (Print)

Authors Information | Citation | Full Text |

Menachem Domb
Computer Science Department, Ashkelon Academy College, Ashkelon, Israel

Ayelet Zadok
Computer Science Department, Ashkelon Academy College, Ashkelon, Israel


Cite this paper as:
Domb, M., Zadok, A. (2024). Face Authentication by Constructing a 3D Face Image from 2D Face Images, and Encoding a Unique Identification. In N. Callaos, S. Hashimoto, N. Lace, B. Sánchez, M. Savoie (Eds.), Proceedings of the 15th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2024, pp. 65-69. International Institute of Informatics and Cybernetics. https://doi.org/10.54808/IMCIC2024.01.65
DOI: 10.54808/IMCIC2024.01.65
ISBN: 978-1-950492-78-7 (Print)
ISSN: 2771-5914 (Print)
Copyright: © International Institute of Informatics and Systemics 2024
Publisher: International Institute of Informatics and Cybernetics

Abstract
With the vast spread of automation, the significant demand for communication services, the addition of IoT to the Internet, and the corresponding increase and sophistication in malicious attacks utilizing system vulnerabilities to penetrate systems. Identification and Authentication are heavily used in every access trial towards any electronic resource and communication networks. The traditional approach to coping with such challenges is using passwords, encryption, Secure ID, Firewall, Etc. More safety methods use Biometrics, which suffer from spoofing. The access control market is a fast-growing and highly volatile market that poses significant challenges for investors seeking to make secured decisions. As the market continues to evolve and become more mainstream, there is a growing demand for new identification and authentication technologies. This paper proposes expanding the number of features extracted from a 3D image, with unique features evolved during the generation of the 3D image of the prospect at the access control stage. Experiments support the proposed approach.
Full Text



contact-us  
  Postal Address:
  13750 West Colonial Dr, Suite 350-408
  Winter Garden, Florida 34787, USA
  All rights reserved.
  © 2025 International Institute
   of Informatics and Systemics