Secure Authentication System Using Video Surveillance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6
Abstract
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and recognition can be performed during a standard web session. The main contribution of this novel proposal is, making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an video and stored it in a database and make them to compare with video. To better characterize a portrait in a sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid feature. Skeleton feature and centroid context feature working together makes human movement analysis a very efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a finer representation that can characterize the shape of a whole movements. For efficient and accurate process, generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.
Authors and Affiliations
S Selvan
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizontal Aggregations
Data mining refers to the process of analyzing the data from different perspectives and summarizing it into useful information that is mostly used by the different users for analyzing the data as well as for p...
A Word Stemming Algorithm for Hausa Language
Abstract: Hausa, a highly inflected language, needs a worthy stemming approach for efficient informationretrieval (IR). However, there is a limited or unavailable study to stemming in the language. Stemming refers tothe...
Conjunctive Use of Surface and Groundwater as Agri-tourismResource Facilitator: Discourse Analysis for Planning inDeveloping Nations
Abstract: Ecotourism is increasingly exhibited as a component of the conventional tourism that needsaugmentation with enhanced availability of water resources in sustainable modes. This sustainability isattainable...
Detecting Malicious Nodes in Wireless Sensor Networks
Abstract:A typical wireless sensor network consists of several tiny and low-power sensors which use radio frequencies to perform distributed sensing tasks. Wireless sensor networks are used to detect the occurrence of ev...
An Approach to Single Documnent Text Summarization & Simplification
Abstract: The amount of information available on the internet is increasing day by day which is leading to information overload. For more information than can realistically be digested is available on the World-Wid...