Secure Authentication System Using Video Surveillance

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6

Abstract

 Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and  recognition can be performed during a standard web session. The main contribution of this novel proposal is,  making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an  video and stored it in a database and make them to compare with video. To better characterize a portrait in a  sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid  feature. Skeleton feature and centroid context feature working together makes human movement analysis a very  efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a  portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a  finer representation that can characterize the shape of a whole movements. For efficient and accurate process,  generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.

Authors and Affiliations

S Selvan

Keywords

Related Articles

 Performance Analysis of Sdrp for Wsn Using Diffie – Hellman Algorithm

 Abstract: Wireless Sensor Network is a group of wireless nodes exclusively designed for the continuous sensing of information at human inaccessible locates. Reprogramming is a definite need at such situations when...

 Handoff Management protocols MIPV6 and HMIPV6  Comparative analysis in 4G wireless networks

 With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS) guarantees. Instead of &nbsp...

A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects

Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...

 Automatic Determination Number of Cluster for NMKFC-MeansAlgorithms on Image Segmentation

 Abstract: Image segmentation plays an important role in image analysis. Image segmentation is useful in manyapplications like medical, face recognition, crop disease detection, and geographical object detection in...

Managing IoT data using relational schema and JSON fields, a comparative study

Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...

Download PDF file
  • EP ID EP135903
  • DOI -
  • Views 128
  • Downloads 0

How To Cite

S Selvan (2013).  Secure Authentication System Using Video Surveillance. IOSR Journals (IOSR Journal of Computer Engineering), 11(6), 97-104. https://europub.co.uk/articles/-A-135903