Secure Authentication System Using Video Surveillance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6
Abstract
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and recognition can be performed during a standard web session. The main contribution of this novel proposal is, making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an video and stored it in a database and make them to compare with video. To better characterize a portrait in a sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid feature. Skeleton feature and centroid context feature working together makes human movement analysis a very efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a finer representation that can characterize the shape of a whole movements. For efficient and accurate process, generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.
Authors and Affiliations
S Selvan
User Profile Completion with Online Social Circles
User profile is a kind of most effective feature and cue of user behavioranalysis. However, most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse on social media. It...
Trust Modeling Scheme using Cluster Aggregation of Messages for Vehicular Ad hoc Networks
Abstract: A VANET is a decentralized network as every node performs the functions of both host and router. The main benefit of VANET communication is the enhanced passenger safety by virtue of exchanging warning messages...
RKO Technique for Color Visual Cryptography
Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algo...
Emotion Recognition using combination of MFCC and LPCCwith Supply Vector Machine
Abstract: Speech is a medium through which emotions are expressed by human being. In this paper, a mixtureof MFCC and LPCC has been proposed for audio feature extraction. One of the greatest advantage of MFCC isthat it i...
A survey of Stemming Algorithms for Information Retrieval
Abstract:Now a day’s text documents is advancing over internet, e-mails and web pages. As the use of internetis exponentially growing, the need of massive data storage is increasing. Normally many of the documentscontain...