Acknowledgement
This study was supported by UISP (University Innovation Support Project) of Korean Bible University in 2022
References
- Boyko, N., Basystiuk, O., & Shakhovska, N. (2018, August). Performance evaluation and comparison of software for face recognition, based on dlib and opencv library. In 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), 478-482.
- De Luca, A., Weiss, R., & Drewes, H. (2007, November). Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In Proceedings of the 19th australasian conference on computer-human interaction: Entertaining user interfaces, 199-202.
- Heo, S. Y., Kim, K. M., & Lee, W. J. (2021). Design and Implementation of Visitor Access Control System using Deep learning Face Recognition. Journal of digital convergence, 19(2), 245-251. https://doi.org/10.14400/JDC.2021.19.2.245
- Jacob, R. J. (1995). Eye tracking in advanced interface design. Virtual environments and advanced interface design, 258, 288.
- Ju, S. H., & Seo, H. S. (2011). Password based user authentication methodology using multi-input on multi-touch environment. Journal of the Korea Society For Simulation, 20(1), 39-49. https://doi.org/10.9709/JKSS.2011.20.1.039
- Ju, S. H., & Seo, H. S. (2012). A study on User Authentication Technology of Numeric based Pattern Password. Journal of the Korea society of computer and information, 17(9), 65-73. https://doi.org/10.9708/jksci/2012.17.9.065
- Kang, M., Kim, B., Seo, J., Kim, K. (2021). A Study on the Feasibility of IoT and AI-based elderly care system application. Korean Journal of Artificial Intelligence,9(2), 15-21.
- Kim, S. Y., & Kwon, T. (2016). A Case Study of Password Usage for Domestic Users. Journal of the Korea Institute of Information Security & Cryptology, 26(4), 961-972. https://doi.org/10.13089/JKIISC.2016.26.4.961
- Lee, S. H. (2022). An Input Method for Decimal Password Based on Eyeblink Patterns. Journal of the Korea Institute of Information and Communication Engineering, 26(5), 656-661.
- Lim, S. M., Kim, H. J., & Kim, S. K. (2012). Designing Password Input System Resistant on Shoulder Surfing Attack with Statistical Analysis. Journal of the Institute of Electronics and Information Engineers, 49(9), 215-224. https://doi.org/10.5573/ieek.2012.49.9.215
- Martin, T. (2012). js-objectdetect. Retrieved Januray 13, 2023, from https://github.com/mtschirs/js-objectdetect
- Mathias, A. (2014). clmtrackr. Retrieved Januray 13, 2023, from https://github.com/auduno/clmtrackr
- Papoutsaki, A., Laskey, J., & Huang, J. (2017, March). Searchgazer: Webcam eye tracking for remote studies of web search. In Proceedings of the 2017 conference on conference human information interaction and retrieval, 17-26.
- Park, K. N. (2019). A morphing method using control lines of facial landmarks. The Journal of Digital Contents Society, 20(2), 443-450. https://doi.org/10.9728/dcs.2019.20.2.443
- Puttemans, S. (2021). Object Detection using Haar cascades. Retrieved Januray 12, 2023, from https://docs.opencv.org/3.4/db/d28/tutorial_cascade_classifier.html
- Seo, E. S. (2016). mobile eye tracker and for use of the same for revitalizing studies on eye tracking. The Journal of the Korea Contents Association, 16(12), 10-18. https://doi.org/10.5392/JKCA.2016.16.12.010