Secure Authentication System Using Video Surveillance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6
Abstract
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and recognition can be performed during a standard web session. The main contribution of this novel proposal is, making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an video and stored it in a database and make them to compare with video. To better characterize a portrait in a sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid feature. Skeleton feature and centroid context feature working together makes human movement analysis a very efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a finer representation that can characterize the shape of a whole movements. For efficient and accurate process, generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.
Authors and Affiliations
S Selvan
Recognition of Human Iris Using Accurate Iris Map
Personal identification based on Biometrics technology is a trend in future. Iris Recognition is regarded as a high accuracy verification technology when compared to traditional approaches. In real-time Iris Rec...
Design and Developing a Multicast Routing Protocol for Link Failure and Reliable Data Delivery.
MANET is a mobile Ad hoc network. It is a wireless and self organized network without infrastructure support. Ad hoc networks systems possess rapid deployment, robustness and flexibility. The problems of Ad ho...
Face Recognition using Face Alignment and PCA Techniques: ALiterature Survey
Abstract: The face is our key of attention in social communication, playing a main role in transmission identityand sentiment. Hence, Face recognition has become an important issue in many applications such as securitysy...
Semantic Based Amalgamation of Pulverized Components Using Ontology
Abstract: The problem faced by both software developers and user in development environment and user environment is finding compatible and complementary components in large set of different applications. Different...
Survey of different Web Application Attacks & Its Preventive Measures
Securing web is like securing our nation. Our whole world is Internet dependent In each sector internet is very much essential. So, internet security is very much promising task for us. More than 80% attacks are...