{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T08:12:13Z","timestamp":1775895133123,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,8,8]],"date-time":"2015-08-08T00:00:00Z","timestamp":1438992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2015,8,8]],"date-time":"2015-08-08T00:00:00Z","timestamp":1438992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2015,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Up to now, biometric recognition has shown significant advantages as to be considered a reliable solution for security systems in mobile environments. Nevertheless, due to the short lifetime of biometrics in mobile devices, a handful of concerns regarding usability and accessibility need to be covered in order to meet users\u2019 requirements. This work is focused on analysing the usability and accessibility of a face recognition system used by visually impaired people, focusing on the time spent in the process, which is a critical aspect. Specifically, we cover different key questions including which kind of feedback is more useful for visually impaired users and beneficial for performance and how is the performance evolution in contrast with the time spent in the recognition. Our findings suggest that several parameters improve along with the time spent in the process, including performance. The audio feedback provided in real time involves also better performance and user experience than instructions given previously.<\/jats:p>","DOI":"10.1186\/s13673-015-0043-0","type":"journal-article","created":{"date-parts":[[2015,8,7]],"date-time":"2015-08-07T05:22:06Z","timestamp":1438924926000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Time evolution of face recognition in accessible scenarios"],"prefix":"10.1186","volume":"5","author":[{"given":"Ramon","family":"Blanco-Gonzalo","sequence":"first","affiliation":[]},{"given":"Norman","family":"Poh","sequence":"additional","affiliation":[]},{"given":"Rita","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Sanchez-Reillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,8]]},"reference":[{"key":"43_CR1","unstructured":"International Organization for Standardization (1999 ) ISO 13407:1999. Human-centred design processes for interactive systems"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Abidin A, Xie H, Wong KW (2013) Touch screen with audio feedback: Content analysis and the effect of spatial ability on blind people\u2019s sense of position of web pages. In: Research and Innovation in Information Systems (ICRIIS), 2013 International Conference, pp 548\u2013553","DOI":"10.1109\/ICRIIS.2013.6716768"},{"key":"43_CR3","unstructured":"Atos: Ukps biometric enrolment trial (2005)"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Barra S, De Marsico M, Galdi C, Riccio D, Wechsler H (2013) Fame: face authentication for mobile encounter. In: Biometric Measurements and Systems for Security and Medical Applications (BIOMS), IEEE Workshop, pp 1\u20137","DOI":"10.1109\/BIOMS.2013.6656140"},{"key":"43_CR5","doi-asserted-by":"publisher","unstructured":"Blanco-Gonzalo R, Diaz-Fernandez L, Miguel-Hurtado O, Sanchez-Reillo R (2014) Usability evaluation of biometrics in mobile environments. In: Hippe ZS, Kulikowski JL, Mroczek T, Wtorek J (eds.) Human-computer systems interaction: backgrounds and applications 3, advances in intelligent systems and computing, vol 300. Springer International Publishing, New York, pp 289\u2013300. doi:10.1007\/978-3-319-08491-6_24","DOI":"10.1007\/978-3-319-08491-6_24"},{"issue":"12","key":"43_CR6","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1016\/j.imavis.2014.09.003","volume":"32","author":"R Blanco-Gonzalo","year":"2014","unstructured":"Blanco-Gonzalo R, Sanchez-Reillo R, Miguel-Hurtado O, Bella-Pulgarin E (2014) Automatic usability and stress analysis in mobile biometrics, Image Vision Comput 32(12):1173\u20131180","journal-title":"Image Vision Comput"},{"issue":"1","key":"43_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.3745\/JIPS.2014.10.1.092","volume":"10","author":"O Chagnaadorj","year":"2014","unstructured":"Chagnaadorj O, Tanaka J (2014) Gesture input as an out-of-band channel. J Inform Process Syst 10(1):92\u2013102","journal-title":"J Inform Process Syst"},{"issue":"1","key":"43_CR8","first-page":"32","volume":"5","author":"H Cho","year":"2014","unstructured":"Cho H, Choy M (2014) Personal mobile album\/diary application development. J Converg 5(1):32\u201337","journal-title":"J Converg"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Choong YY, Theofanos M, Guan H (2012) Fingerprint self-captures: Usability of a fingerprint system with real-time feedback. In: Biometrics: theory, applications and systems (BTAS), 2012 IEEE Fifth International Conference, pp 16\u201322","DOI":"10.1109\/BTAS.2012.6374553"},{"key":"43_CR10","unstructured":"Cisco: Cisco visual networking index (2014) Global mobile data traffic forecast update, 2013\u20132018. http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/serviceprovider\/visual-networking-index-vni\/white_paper_c11-520862.html. Accessed 5 Aug 2015"},{"key":"43_CR11","unstructured":"Guan H, Theofanos M, Choong YY, Stanton B (2011) Real-time feedback for usable fingerprint systems. In: Biometrics (IJCB), 2011 International Joint Conference, pp 1\u20138"},{"key":"43_CR12","volume-title":"Handbook of Face Recognition","author":"AK Jain","year":"2005","unstructured":"Jain AK, Li SZ (2005) Handbook of Face Recognition. Springer-Verlag New York Inc, Secaucus"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Kamencay P, Breznan M, Jelsovka D, Zachariasova M (2012) Improved face recognition method based on segmentation algorithm using sift-pca. In: Telecommunications and signal processing (TSP). 2012 35th International Conference, pp 758\u2013762","DOI":"10.1109\/TSP.2012.6256399"},{"issue":"1","key":"43_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s13673-014-0009-7","volume":"4","author":"H Kim","year":"2014","unstructured":"Kim H, Lee SH, Sohn MK, Kim DJ (2014) Illumination invariant head pose estimation using random forests classifier and binary pattern run length matrix. Human-Centric Comput Inform Sci 4(1):9","journal-title":"Human-Centric Comput Inform Sci"},{"key":"43_CR15","unstructured":"Kukula E (2008) Design and evaluation of the human-biometric sensor interaction method. PhD thesis, Purdue University, USA"},{"issue":"4","key":"43_CR16","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TIM.2009.2037878","volume":"59","author":"E Kukula","year":"2010","unstructured":"Kukula E, Sutton M, Elliott S (2010) The human biometric-sensor interaction evaluation method: Biometric performance and usability measurements. Instrum Measurement IEEE Trans 59(4):784\u2013791","journal-title":"Instrum Measurement IEEE Trans"},{"issue":"3","key":"43_CR17","doi-asserted-by":"publisher","first-page":"461","DOI":"10.3745\/JIPS.2013.9.3.461","volume":"9","author":"IY Lee","year":"2013","unstructured":"Lee IY, Park SW (2013) Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment. J Inform Process Syst 9(3):461\u2013476","journal-title":"J Inform Process Syst"},{"issue":"2","key":"43_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D Lowe","year":"2004","unstructured":"Lowe D (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91\u2013110","journal-title":"Int J Comput Vision"},{"key":"43_CR19","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-17711-8_22","volume-title":"Recognizing Patterns in Signals, Speech, Images and Videos","author":"S Marcel","year":"2010","unstructured":"Marcel S, McCool C, Mat\u011bjka P, Ahonen T, \u010cernock\u00fd J, Chakraborty S et al (2010) On the results of the first mobile biometry (mobio) face and speaker verification evaluation. In: Nay D, Ataltepe Z, Aksoy S (eds) Recognizing Patterns in Signals, Speech, Images and Videos, vol 6388., Lecture notes in computer scienceSpringer, Berlin Heidelberg, pp 210\u2013225"},{"issue":"4","key":"43_CR20","first-page":"633","volume":"9","author":"V Ravi","year":"2013","unstructured":"Ravi V, Nishanth K (2013) A computational intelligence based online data imputation method: An application for banking. J Converg 9(4):633\u2013650","journal-title":"J Converg"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Riley C, McCracken H, Buckner K (2007) Fingers, veins and the grey pound: Accessibility of biometric technology. In: Proceedings of the 14th European Conference on Cognitive Ergonomics: Invent! Explore!, ECCE\u201907, ACM, New York, pp 149\u2013152","DOI":"10.1145\/1362550.1362580"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Sanchez-Reillo R, Blanco-Gonzalo R, Liu-Jimenez J, Lopez M, Canto E (2013) Universal access through biometrics in mobile scenarios. In: Proceedings ICCST2013: 47th annual IEEE International Carnahan Conference on Security Technology","DOI":"10.1109\/CCST.2013.6922051"},{"issue":"1","key":"43_CR23","first-page":"38","volume":"5","author":"H Seo","year":"2014","unstructured":"Seo H, Choy Y (2014) Id credit scoring system based on application scoring system: Conceptual online id credit for id integrated environment. J Converg 5(1):38\u201342","journal-title":"J Converg"},{"issue":"1","key":"43_CR24","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s13673-014-0007-9","volume":"4","author":"R Singh","year":"2014","unstructured":"Singh R, Singh P, Duhan M (2014) An effective implementation of security based algorithmic approach in mobile adhoc networks. Human-Centric Comput Inform Sci 4(1):7","journal-title":"Human-Centric Comput Inform Sci"},{"issue":"6","key":"43_CR25","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","volume":"19","author":"X Tan","year":"2010","unstructured":"Tan X, Triggs B (2010) Enhanced local texture feature sets for face recognition under difficult lighting conditions. Image Process IEEE Trans 19(6):1635\u20131650","journal-title":"Image Process IEEE Trans"},{"key":"43_CR26","unstructured":"Theofanos MF, Stanton BC, Wolfson C (2008) Usability and biometrics: Ensuring successful biometric systems. In: International Workshop on Usability and Biometrics, p 83"},{"key":"43_CR27","doi-asserted-by":"crossref","unstructured":"Theofanos MF, Stanton BC, Orandi S, Micheals R (2007) Effects of scanner height on fingerprint capture. National Institute of Standards and Technology, Gaithersburg NISTIT 7382 (2006)","DOI":"10.1037\/e577902012-005"},{"key":"43_CR28","doi-asserted-by":"crossref","unstructured":"Theofanos MF, Stanton BC, Micheals R Usability testing of face image capture for us ports of entry. In: 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems. BTAS, pp 1\u20136","DOI":"10.1109\/BTAS.2008.4699344"},{"issue":"1","key":"43_CR29","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MPRV.2012.54","volume":"12","author":"P Tresadern","year":"2013","unstructured":"Tresadern P, Cootes T, Poh N, Matejka P, Hadid A, Levy C (2013) Mobile biometrics: Combined face and voice verification for a mobile platform. Pervasive Comput IEEE 12(1):79\u201387","journal-title":"Pervasive Comput IEEE"},{"key":"43_CR30","doi-asserted-by":"crossref","unstructured":"Vazquez-Fernandez E, Garcia-Pardo H, Gonzalez-Jimenez D, Perez-Freire L (2011) Built-in face recognition for smart photo sharing in mobile devices. In: Multimedia and Expo (ICME), 2011 IEEE International Conference, pp 1\u20134","DOI":"10.1109\/ICME.2011.6012057"},{"issue":"1","key":"43_CR31","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/2192-1962-3-21","volume":"3","author":"P Verma","year":"2013","unstructured":"Verma P, Singh R, Singh A (2013) A framework to integrate speech based interface for blind web users on the websites of public interest. Human-Centric Comput Inform Sci 3(1):21","journal-title":"Human-Centric Comput Inform Sci"},{"key":"43_CR32","doi-asserted-by":"crossref","unstructured":"Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference, vol. 1, pp I-511\u2013I-518","DOI":"10.1109\/CVPR.2001.990517"},{"key":"43_CR33","doi-asserted-by":"crossref","unstructured":"Wamsley A, Elliott S, Dunkelberger C, Mershon M (2011) Analysis of slap segmentation and HBSI errors across different force levels. In: Security Technology (ICCST), 2011 IEEE International Carnahan Conference, pp 1\u20135","DOI":"10.1109\/CCST.2011.6095939"},{"key":"43_CR34","doi-asserted-by":"crossref","unstructured":"Wong R, Poh N, Kittler J, Frohlich D (2010) Interactive quality-driven feedback for biometric systems. In: Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference, pp 1\u20137","DOI":"10.1109\/BTAS.2010.5634481"},{"key":"43_CR35","unstructured":"World Health Organization: WHO ((2011)) World report on disability, 2013\u20132018"},{"issue":"2","key":"43_CR36","first-page":"11","volume":"4","author":"X Yang","year":"2013","unstructured":"Yang X, Peng G, Cai Z, Zeng K (2013) Occluded and low resolution face detection with hierarchical deformable model. J Converg 4(2):11\u201314","journal-title":"J Converg"},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Kowtko MA (2014) Biometric authentication for older adults. Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island, pp 1\u20136","DOI":"10.1109\/LISAT.2014.6845213"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-015-0043-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-015-0043-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-015-0043-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-015-0043-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T22:29:09Z","timestamp":1748557749000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-015-0043-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,8]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["43"],"URL":"https:\/\/doi.org\/10.1186\/s13673-015-0043-0","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,8]]},"assertion":[{"value":"14 October 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"24"}}