CFP last date
20 May 2024
Reseach Article

Building a Website Architecture based on Face Authentication for Developing Trust between Consumers in KSA

by Mohamed S. Farag
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 2
Year of Publication: 2013
Authors: Mohamed S. Farag
10.5120/12469-8858

Mohamed S. Farag . Building a Website Architecture based on Face Authentication for Developing Trust between Consumers in KSA. International Journal of Computer Applications. 72, 2 ( June 2013), 45-53. DOI=10.5120/12469-8858

@article{ 10.5120/12469-8858,
author = { Mohamed S. Farag },
title = { Building a Website Architecture based on Face Authentication for Developing Trust between Consumers in KSA },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 2 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 45-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number2/12469-8858/ },
doi = { 10.5120/12469-8858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:36:53.316507+05:30
%A Mohamed S. Farag
%T Building a Website Architecture based on Face Authentication for Developing Trust between Consumers in KSA
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 2
%P 45-53
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Millions of Internet users worldwide are engaged in buying and selling of various products using Consumers (C2C) online buy and sell websites, The aim of this study is to working on increasing the trust in e-commerce between Consumers in the Kingdom of Saudi Arabia(KSA), about studying the architecture of the most important websites (Taobao, eBay and Paipai,…), which use the sale and purchase between consumers, and extract the problems that correspond to consumers which using of these sites and avoid them. One of the most important reasons that lead to increased trust between consumers is the ability of a trusted third parties (TTP) to be sure from both parties buyer and seller, so in this study we will discuss a number of algorithms used in face recognition and propose a more efficient algorithm for face recognition and implement it, to be sure from consumers entering the website (increasing the website authentication security). Finally we proposed architecture for our website, which will be used in buying and selling in KSA, this architecture consists of three stages, first stage: the stage of registration for the first time and where the consumer fills out the application form. The second stage: The login stages the consumer entering Assurance Key (AK), and uploads a personal image using webcam to log on to the website. the third stage: if TTP verify from the data in the first stage, generates AK for the consumer and send it to him, and in the second case, if TTP verify from the login data (authenticity of data) then the consumer can access the operations on the website.

References
  1. Yaobin Lu, Ling Zhao and Bin Wang," From virtual community members to C2C e-commerce buyers: Trust in virtual communities and its effect on consumers' purchase intension" Electronic Commerce Research and Applications Volume 9, Issue 4, July–August 2010, Pages 346–360.
  2. Ding, Chunhui Piao, Jing An and Meiqi Fang , "Study on Credit Evaluation Model and Algorithm for C2C E-Commerce" 2007 IEEE International Conference on e-Business Engineering.
  3. Nanchang, "An Approach to Integrating the User Credit Values on Multiple E-Commerce Websites" 2009 Second International Symposium on Electronic Commerce and Security
  4. Jonathan Traupman and Robert Wilensky, "EM-trust: A Robust Reputation Algorithm for Peer-to-Peer Marketplaces", Computer Science Division (EECS) University of California Berkeley, California, July 2005.
  5. Mohammad Usman Ahmed, www. cs. mcgill. ca /~mahmed26/eBay_Architecture_Study. pdf.
  6. Dehua HE , Yaobin LU, ZHOU Deyi , Empirical Study of Consumers' Purchase Intentions in C2C Electronic Commerce , ISSN 1007-0214 05/26 pp287-292 Volume 13, Number 3, June 2008.
  7. David S. Marshak, eBay Creates Technology Architecture for the Future , Patricia Seybold Group 2003,http://www. softwaresecretweapons. com/jspwiki/resources/presentations/Sun_eBay6-2_forWeb. pdf.
  8. www. mudah. my/about/index. htm?ca=9_s. Brown.
  9. http://www. haraj. com. sa/
  10. http://witkey. taskcn. com
  11. Yaobin Lu, Ling Zhao, Bin Wang, "From virtual community members to C2C e-commerce buyers: Trust in virtual communities and its effect on consumers' purchase intention" Electronic Commerce Research and Applications 9 (2010) 346–360
  12. David S. Marshak, eBay Creates Technology Architecture for the Future , Patricia Seybold Group 2003, http://www. softwaresecretweapons. com/ jspwiki/resources/presentations/Sun_eBay6-2_forWeb. pdf
  13. http://pages. ebay. com/help/account/questions/about- ebay. html
  14. A. Martinez, A. Kak, "PCA versus LDA", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23, no. 2, pp. 228-233, 2001
  15. A. Hossein Sahoolizadeh, B. Zargham Heidari, and C. Hamid Dehghani, "A New Face Recognition Method using PCA, LDA and Neural Network", International Journal of Electrical and Electronics Engineering 2:8 2008.
  16. A. Hossein Sahoolizadeh, B. Zargham Heidari, and C. Hamid Dehghani, "A New Face Recognition Metusing PCA, LDA and Neural Network", International Journal of Electrical and Electronics Engineering 2:8 2008.
  17. S. Sharavanan , M. Azath, "LDA BASED FACE RECOGNITION BY USING HIDDEN MARKOV MODEL IN CURRENT TRENDS", International Journal of Engineering and Technology Vol. 1(2), 2009, 7-85.
  18. Meina Kan, ShiguangShan , YuSuc, DongXu b, XilinChen, "Adaptive discriminant learning for face recognition", Pattern Recognition, Volume 46, Issue 9, September 2013, Pages 2497–2509
  19. Sharfi M. Abbass, Othman Bin Ibrahim, M. S. Farag "Building a Trust Model for Generating and Validating Assurance Keys between Consumers in E-Commerce" International Journal of Computer Applications (0975 – 8887)Vol. 57– No. 1, November 2012.
  20. Sharfi M. Abbass, Othman Bin Ibrahim, “A model for trust-building in E-commerce from Consumer to Consumer Perspective in KSA” International Journal e- Education, e-Business, e-Management and E-learning Vol. 1, No. 3, Agust2011.
Index Terms

Computer Science
Information Sciences

Keywords

Assurance keys (AK's) consumer to consumer (C2C) E-Commerce Evaluation Model building trust