Secure Authentication System Using Video Surveillance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6
Abstract
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and recognition can be performed during a standard web session. The main contribution of this novel proposal is, making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an video and stored it in a database and make them to compare with video. To better characterize a portrait in a sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid feature. Skeleton feature and centroid context feature working together makes human movement analysis a very efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a finer representation that can characterize the shape of a whole movements. For efficient and accurate process, generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.
Authors and Affiliations
S Selvan
Performance Analysis of Hybrid (supervised and unsupervised) method for multiclass data set
Abstract: Due to the increasing demand for multivariate data analysis from the various application the dimensionality reduction becomes an important task to represent the data in low dimensional space for the robus...
Risk Minimization in Agribusiness using Soft Computing Technique
Abstract: India is an agriculture based country and farmer community is the backbone of the agriculture sector. Agribusiness is one of the important segments of agriculture sector. This paper aims to minimize agribusine...
Empirical Coding for Curvature Based Linear Representation inImage Retrieval System
Abstract : Image retrieval systems are finding their applications in all automation systems, wherein automateddecision needs to be taken based on the image contents. The prime requirement of such systems is to develop av...
JTAG Architecture with Multi Level Security
For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspired Elephant Based Swarm Optimization
: The robust and complex real-time applications and dramatically increased sensor capabilities may play a vital role in enhancing the lifespan of WSNs. On the other hand majority of WSNs operate on battery powe...