Secure Authentication System Using Video Surveillance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6
Abstract
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and recognition can be performed during a standard web session. The main contribution of this novel proposal is, making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an video and stored it in a database and make them to compare with video. To better characterize a portrait in a sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid feature. Skeleton feature and centroid context feature working together makes human movement analysis a very efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a finer representation that can characterize the shape of a whole movements. For efficient and accurate process, generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.
Authors and Affiliations
S Selvan
Enhance similarity searching algorithm with optimized fast population count method based on parallel design
In chemoinformatics, drug discovery helps the chemists find new drugs with minimum side effects. The new drug should have similar behavior in terms of the chemical molecular formula to a known drug by applying...
Analytical Review on the Correlation between Ai and Neuroscience
Neuroscience is the pragmatic study of brain anatomy and physiology. AI and neuroscience are typical related to the human brain’s behavior. The alliance between artificial intelligence and neuroscience can produc...
Steganography Techniques Used To Hide the Information
Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which...
Solution against BGP vulnerabilities
Abstract: The Border Gateway Protocol (BGP) is the only inter-domain routing protocol.Routing informationamong Autonomous Systems (AS) is exchanged using BGP. BGP protocol does not provide any securitymechanism, so it is...
Enabling Platform-As-A-Service through a Consolidated Resource Manager
Abstract: Platform as a Service (PAAS) is a new initiative that is changing the structure of the organizations from traditional infrastructure services to the cloud based services. With the growing demand for these...