Review Article

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Figure 6

A face-based authentication and authorization scheme using the support vector machine (SVM) for mobile IoT devices. In Step 1, the system applies four substeps: training images, facial segments, clustering, and set of clusters. In Step 2, the system subset of clusters trains an SVM classifier. In Step 3, the system applies five substeps: clustering, a subset of clusters, statistical features, pretrained SVM, and score.