Lip Recognition for Authentication and Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Lip is used as an identifier from person to person as the size of the upper and lower lips, furrows, grooves, the distances between the lines and the edges vary individualistically. These unique parameters are experimented to distinguish individuals and their uniqueness is also verified. The highlighting advantage in devising the biometric system based on lip recognition is that the data acquisition and handling are simple and hence storing and processing the data becomes an unconstrained task leading to drastic increase in the efficacy of the system. The main focus of this work is to track the lips in the given face image and then extract suitable features from the lips to perform the differentiation task. Accurately and robustly tracking lip motion in image sequences is especially difficult because lips are highly deformable, and they vary in shape, colour, and relation to surrounding features across individuals; in addition, they are subject to both non -rigid (expression, utterance of speech) and rigid motion (head movement). The use of colour space transformation has shown very well for lip image segmentation.
Authors and Affiliations
Sunil Sangve , Nilakshi Mule
VCloud: Dynamic Resource Allocation for the Cloud Users
Abstract: Cloud building means virtualization of whole system like hardware and software. That is accessible through network at any time anywhere in this world. The resources of cloud are allocated to the requested...
Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation
In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout i...
Routing Framework for Delay Tolerant Networks using BayesiaLab
Routing in delay tolerant networks (DTN) can benefit from the fact that most real life DTN, especially in the context of people-centric networks (e.g. Pocket Switching Networks (PSN)), exhibit som...
Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography
Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key me...
A Close Approach to Iris Recognition System
Abstract: Iris recognition, a relatively new biometric technology, has great advantages such as variability, stability and security, thus it is the most promising for high security environments. Among its applicati...