{"id":"https://openalex.org/W4399206144","doi":"https://doi.org/10.1109/jiot.2024.3407780","title":"DEyeAuth: A Secure Smartphone User Authentication System Integrating Eyelid Patterns With Eye Gestures","display_name":"DEyeAuth: A Secure Smartphone User Authentication System Integrating Eyelid Patterns With Eye Gestures","publication_year":2024,"publication_date":"2024-05-31","ids":{"openalex":"https://openalex.org/W4399206144","doi":"https://doi.org/10.1109/jiot.2024.3407780"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3407780","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3407780","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101576564","display_name":"Ling Kuang","orcid":"https://orcid.org/0000-0002-6821-7041"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ling Kuang","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042768667","display_name":"Fanzi Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fanzi Zeng","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061448582","display_name":"Hongbo Jiang","orcid":"https://orcid.org/0000-0001-7372-2539"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongbo Jiang","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037449474","display_name":"Daibo Liu","orcid":"https://orcid.org/0000-0002-8268-2951"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daibo Liu","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075376655","display_name":"Jie Li","orcid":"https://orcid.org/0000-0001-7896-5388"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]},{"id":"https://openalex.org/I119273862","display_name":"Central South University of Forestry and Technology","ror":"https://ror.org/02czw2k81","country_code":"CN","type":"education","lineage":["https://openalex.org/I119273862"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["College of Computer and Information Engineering, Central South University of Forestry and Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Central South University of Forestry and Technology, Changsha, China","institution_ids":["https://openalex.org/I119273862","https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006165634","display_name":"Hui Zheng","orcid":"https://orcid.org/0000-0003-2930-4641"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hui Zheng","raw_affiliation_strings":["Department of Product Integration, Chongqing Changxian Intelligent Technology Co., Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Department of Product Integration, Chongqing Changxian Intelligent Technology Co., Ltd., Chongqing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075859007","display_name":"Qibo Zhang","orcid":"https://orcid.org/0000-0001-7725-2722"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qibo Zhang","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100770003","display_name":"Geyong Min","orcid":"https://orcid.org/0000-0003-1395-7314"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Geyong Min","raw_affiliation_strings":["College of Engineering, Mathematics and Physical Sciences, University of Exeter, England, U.K"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Mathematics and Physical Sciences, University of Exeter, England, U.K","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101576564"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":0.8142,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75528644,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"11","issue":"18","first_page":"30069","last_page":"30083"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11707","display_name":"Gaze Tracking and Assistive Technology","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8666602373123169},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5867716670036316},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5826932787895203},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5570244193077087},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5188813805580139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.486580491065979},{"id":"https://openalex.org/keywords/gesture","display_name":"Gesture","score":0.471155047416687},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.4431454837322235},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.40911269187927246},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.38722699880599976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3278273940086365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8666602373123169},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5867716670036316},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5826932787895203},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5570244193077087},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5188813805580139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.486580491065979},{"id":"https://openalex.org/C207347870","wikidata":"https://www.wikidata.org/wiki/Q371174","display_name":"Gesture","level":2,"score":0.471155047416687},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.4431454837322235},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.40911269187927246},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.38722699880599976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3278273940086365}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3407780","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3407780","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3431649396","display_name":null,"funder_award_id":"62072167","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8000452320","display_name":null,"funder_award_id":"62202505","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1972754743","https://openalex.org/W2036071415","https://openalex.org/W2040686253","https://openalex.org/W2046616910","https://openalex.org/W2063295356","https://openalex.org/W2084404970","https://openalex.org/W2139094422","https://openalex.org/W2164087268","https://openalex.org/W2202744952","https://openalex.org/W2295634449","https://openalex.org/W2314266355","https://openalex.org/W2346630854","https://openalex.org/W2395297283","https://openalex.org/W2487484013","https://openalex.org/W2611149039","https://openalex.org/W2622510676","https://openalex.org/W2759738317","https://openalex.org/W2788316753","https://openalex.org/W2791916643","https://openalex.org/W2795130519","https://openalex.org/W2901576596","https://openalex.org/W2914785018","https://openalex.org/W2925198140","https://openalex.org/W2979978649","https://openalex.org/W2980779265","https://openalex.org/W2993961376","https://openalex.org/W3012419368","https://openalex.org/W3033015976","https://openalex.org/W3139604217","https://openalex.org/W3165188639","https://openalex.org/W3205659379","https://openalex.org/W3217290035","https://openalex.org/W4206513194","https://openalex.org/W4224300822","https://openalex.org/W4229018792","https://openalex.org/W4304142421","https://openalex.org/W4313203596","https://openalex.org/W4316924444","https://openalex.org/W4319865678","https://openalex.org/W4382119206","https://openalex.org/W4386232196","https://openalex.org/W4388936902"],"related_works":["https://openalex.org/W2377502939","https://openalex.org/W2050433615","https://openalex.org/W2941888532","https://openalex.org/W2586637279","https://openalex.org/W1949088485","https://openalex.org/W2348068295","https://openalex.org/W2135836328","https://openalex.org/W2374177735","https://openalex.org/W2314541983","https://openalex.org/W4322762966"],"abstract_inverted_index":{"Password,":[0],"fingerprint":[1],"and":[2,24,44,103,130,141,145,152,172,179,200,231,240],"face":[3],"recognition":[4],"are":[5,18,166],"the":[6,48,112,120,160,168,175,193],"most":[7],"popular":[8],"authentication":[9,16,40,75,106,218,226],"schemes":[10,17],"on":[11,58,63,107,197],"smartphones.":[12,81,108],"However,":[13,54],"these":[14,30,92],"user":[15,39,105,188],"threatened":[19],"by":[20,94,205],"shoulder":[21],"surfing":[22],"attacks":[23],"spoof":[25],"attacks.":[26,53,242],"In":[27],"response":[28],"to":[29,37,126,155,170],"challenges,":[31],"eye":[32,59,69,99,134],"movements":[33,60],"have":[34,191],"been":[35],"utilized":[36],"secure":[38,102],"since":[41],"their":[42,78],"concealment":[43],"dynamics":[45],"can":[46,147,181],"reduce":[47],"risk":[49],"of":[50,115,162,195,220,228],"suffering":[51],"those":[52],"existing":[55],"approaches":[56],"based":[57],"often":[61],"rely":[62],"additional":[64],"hardware":[65],"(such":[66],"as":[67,184],"high-resolution":[68],"trackers)":[70],"or":[71,124],"involve":[72],"a":[73,86,216,223],"time-consuming":[74],"process,":[76],"limiting":[77],"practicality":[79],"for":[80,101,187],"This":[82],"paper":[83],"presents":[84],"DEyeAuth,":[85],"novel":[87],"dual-authentication":[88],"system":[89,157],"that":[90,174,213],"overcomes":[91],"limitations":[93],"integrating":[95],"eyelid":[96,116,122,177],"patterns":[97,117],"with":[98,222],"gestures":[100,135],"convenient":[104],"DEyeAuth":[109,196,214],"first":[110,169],"leverages":[111],"unique":[113],"characteristics":[114],"extracted":[118],"from":[119,150],"upper":[121,176],"margins":[123,178],"creases":[125,180],"distinguish":[127],"different":[128],"users":[129],"then":[131],"utilizes":[132],"four":[133],"(i.e.,":[136],"looking":[137],"up,":[138],"down,":[139],"left,":[140],"right)":[142],"whose":[143],"dynamism":[144],"randomness":[146],"counter":[148],"threats":[149],"image":[151,236],"video":[153,238],"spoofing":[154],"enhance":[156],"security.":[158],"To":[159],"best":[161],"our":[163],"knowledge,":[164],"we":[165],"among":[167],"discover":[171],"prove":[173],"be":[182],"used":[183],"potential":[185],"biometrics":[186],"authentication.":[189],"We":[190],"implemented":[192],"prototype":[194],"Android":[198],"platforms":[199],"comprehensively":[201],"evaluated":[202],"its":[203],"performance":[204],"recruiting":[206],"50":[207],"volunteers.":[208],"The":[209],"experimental":[210],"results":[211],"indicate":[212],"achieves":[215],"high":[217],"accuracy":[219],"99.38%":[221],"relatively":[224],"short":[225],"time":[227],"6.2":[229],"seconds,":[230],"is":[232],"effective":[233],"in":[234],"resisting":[235],"presentation,":[237],"replaying,":[239],"mimic":[241]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
