Secure Authentication System Using Video Surveillance

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6

Abstract

 Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and  recognition can be performed during a standard web session. The main contribution of this novel proposal is,  making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an  video and stored it in a database and make them to compare with video. To better characterize a portrait in a  sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid  feature. Skeleton feature and centroid context feature working together makes human movement analysis a very  efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a  portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a  finer representation that can characterize the shape of a whole movements. For efficient and accurate process,  generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.

Authors and Affiliations

S Selvan

Keywords

Related Articles

 Enhance similarity searching algorithm with optimized fast population count method based on parallel design

 In chemoinformatics, drug discovery helps the chemists find new drugs with minimum side effects. The new drug should have similar behavior in terms of the chemical molecular formula to a known drug by applying...

 Analytical Review on the Correlation between Ai and Neuroscience

 Neuroscience is the pragmatic study of brain anatomy and physiology. AI and neuroscience are typical related to the human brain’s behavior. The alliance between artificial intelligence and neuroscience can produc...

Steganography Techniques Used To Hide the Information

Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which...

 Solution against BGP vulnerabilities

Abstract: The Border Gateway Protocol (BGP) is the only inter-domain routing protocol.Routing informationamong Autonomous Systems (AS) is exchanged using BGP. BGP protocol does not provide any securitymechanism, so it is...

 Enabling Platform-As-A-Service through a Consolidated Resource Manager

 Abstract: Platform as a Service (PAAS) is a new initiative that is changing the structure of the organizations from traditional infrastructure services to the cloud based services. With the growing demand for these...

Download PDF file
  • EP ID EP135903
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

S Selvan (2013).  Secure Authentication System Using Video Surveillance. IOSR Journals (IOSR Journal of Computer Engineering), 11(6), 97-104. https://europub.co.uk/articles/-A-135903