Skip to main content

Evaluation of the Waiting Time Tolerance of User Authentication in Custom Applications of IDTV

  • Conference paper
Applications and Usability of Interactive TV ( 2014)

Abstract

This study aims to present an analysis of the tolerance of the wait time for DTV viewers. To achieve this goal it is necessary to gather information on authentication and tolerance, evaluation criteria, develop a scenario of Digital TV environment in authentication process, simulating the proposed scenario and assess information generated by the implementation of the prototype. After the evaluation, if realized tolerance variations in the authentication of many viewers for a IDTV environment. The results of this study provide information that can be taken as a reference for studies on runtime, covering the performance level of the product, leading to a substantial quality that is efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blanco-Fernández, Y., et al.: TripFromTV+: Targeting personalized tourism to Interactive Digital TV viewers by social networking and semantic reasoning. IEEE Transactions on Consumer Electronics 57(2), 953–961 (2011)

    Article  Google Scholar 

  2. Corcoran, P., et al.: Biometric Access Control for Digital Media Streams in Home Networks. IEEE Transactions Consumer Electronics 53(3), 917–925 (2007)

    Article  Google Scholar 

  3. Jabbar, H., Jeong, T., Hwang, J., Park, G.: Viewer Identification and Authentication in IPTV using RFID Technique. IEEE Transactions on Consumer Electronics 54(1) (2008)

    Google Scholar 

  4. Kim, S.-C., Yeo, S.-S., Kim, S.K.: A hybrid user authentication protocol for mobile IPTV service. Multimed. Tools Appl. 65, 283–296 (2013). doi:10.1007/s11042-011-0810-5. Springer Science+Business Media: LLC, 2011

  5. Kosch, H., Hölbling, G.: Application of recommendation methods for TV programs. In: IEEE, pp. 1–4 (2011)

    Google Scholar 

  6. Krevatin, I.: Biometric recognition in telecom environment. In: 14th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 1–6 (2010)

    Google Scholar 

  7. Lacaz-Ruiz, R., de Oliveira, A.P., Scholtz, V., Anzai, N.H.: O Limite e a Tolerância. Disponível em: http://www.hottopos.com.br/vidlib2/o_limite_e_a_toler%C3%A2ncia.htm. Acessado em 4 jul 2014

  8. Magalhães, P.S., dos Santos, H.D.: Biometria e autenticação, pp. 1–17 (2003). Disponível em: http://repositorium.sdum.uminho.pt/handle/1822/2184. Acessado em 30 set 2013

  9. Mazi, R.C., Dal Pino Júnior, A.: Identificação Biométrica através da Impressão Digital usando Redes Neurais Artificiais. Anais do XIV ENCITA 2008, ITA, pp. 19–22 (2009)

    Google Scholar 

  10. Mlakar, T., Zaletelj, J., Tasic, J.F.: Viewer authentication for personalized iTV services. In: Eight International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS 2007), pp. 1–4 (2007)

    Google Scholar 

  11. Nose, S., Shimono, M., Nishiyama, M., et al.: Personal Identification based on Sole Pressure Distribution using a Hetero-core Optical Fiber Sensor Network for Personal Web Services. IEEE Computer Society. Congress on Services – I, 1–8 (2009)

    Google Scholar 

  12. Priberam: Dicionário Priberam da Língua Portuguesa (2013). Disponível em: http://www.priberam.pt/dlpo/. Acessado em 2 out 2013

  13. Song, S., Moustafa, H., Afifi, H.: A survey on personalized TV and NGN services through context-awareness. ACM Computing Surveys (CSUR) 44(1), 4 (2012)

    Article  Google Scholar 

  14. Takamizawa, H., Tanaka, N.: User authentication method using topographical information of Google maps. In: International Conference in Green and Ubiquitous Technology, pp. 11–14. IEEE (2012)

    Google Scholar 

  15. Kishimoto, T.M.: Salas de aula de escolas infantis: Domínio da fila, tempo de espera e falta de autonomia da criança. Faculdade de Educação – USP. São Paulo. Nuances, vol. 5, número 5 (1999). Disponível em http://revista.fct.unesp.br/index.php/Nuances/article/viewArticle/90. Acessado em 29 ago 2014

  16. Costa, T.B.: Gênero e Trabalho na ‘Cidade do Aço’. Anais do I Simpósio sobre Estudos de Gênero e Políticas Públicas. Universidade Estadual de Londrina (2010). Disponível em http://www.uel.br/eventos/gpp/pages/arquivos/5.TaniaBassi.pdf. Acessado em 25 ago 2014

  17. Walter, M.I.M.T.: A dualidade na inserção política, social e familiar do idoso: estudo comparado dos casos de Brasil, Espanha e Estados Unidos. Opinião Pública, vol 16, número 1. Campinas (2010). Disponível em http://dx.doi.org/10.1590/S0104-62762010000100008. Acessado em 30 ago 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Luis Nícolas de Amorim Trigo or Carlos André Guimarães Ferraz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

de Amorim Trigo, L.N., Ferraz, C.A.G. (2015). Evaluation of the Waiting Time Tolerance of User Authentication in Custom Applications of IDTV. In: Abásolo, M., Kulesza, R. (eds) Applications and Usability of Interactive TV. 2014. Communications in Computer and Information Science, vol 389. Springer, Cham. https://doi.org/10.1007/978-3-319-22656-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22656-9_6

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22655-2

  • Online ISBN: 978-3-319-22656-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics