Secure Authentication System Using Video Surveillance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6
Abstract
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and recognition can be performed during a standard web session. The main contribution of this novel proposal is, making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an video and stored it in a database and make them to compare with video. To better characterize a portrait in a sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid feature. Skeleton feature and centroid context feature working together makes human movement analysis a very efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a finer representation that can characterize the shape of a whole movements. For efficient and accurate process, generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.
Authors and Affiliations
S Selvan
Performance Analysis of Sdrp for Wsn Using Diffie – Hellman Algorithm
Abstract: Wireless Sensor Network is a group of wireless nodes exclusively designed for the continuous sensing of information at human inaccessible locates. Reprogramming is a definite need at such situations when...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wireless networks
With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS) guarantees. Instead of  ...
A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects
Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...
Automatic Determination Number of Cluster for NMKFC-MeansAlgorithms on Image Segmentation
Abstract: Image segmentation plays an important role in image analysis. Image segmentation is useful in manyapplications like medical, face recognition, crop disease detection, and geographical object detection in...
Managing IoT data using relational schema and JSON fields, a comparative study
Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...