Secure Authentication System Using Video Surveillance

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 6

Abstract

 Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and  recognition can be performed during a standard web session. The main contribution of this novel proposal is,  making comparison of portrait. Centroid context algorithm is used for selecting an random movements from an  video and stored it in a database and make them to compare with video. To better characterize a portrait in a  sequence, triangulate it into triangular meshes, which we extract the features: skeleton feature and centroid  feature. Skeleton feature and centroid context feature working together makes human movement analysis a very  efficient and accurate process. Depth first search(DFS) scheme is used to extract the skeletal feature of a  portrait from triangulation result, from skeletal feature result, centroid context feature is extracted, which is a  finer representation that can characterize the shape of a whole movements. For efficient and accurate process,  generate a set of key portrait from a movement sequence. The ordered key portrait sequence is represented by string. For arbitrary matching action, string matching algorithm is used for implementing the concept.

Authors and Affiliations

S Selvan

Keywords

Related Articles

 Performance Analysis of Hybrid (supervised and unsupervised) method for multiclass data set

 Abstract: Due to the increasing demand for multivariate data analysis from the various application the dimensionality reduction becomes an important task to represent the data in low dimensional space for the robus...

Risk Minimization in Agribusiness using Soft Computing Technique

Abstract: India is an agriculture based country and farmer community is the backbone of the agriculture sector. Agribusiness is one of the important segments of agriculture sector. This paper aims to minimize agribusine...

 Empirical Coding for Curvature Based Linear Representation inImage Retrieval System

Abstract : Image retrieval systems are finding their applications in all automation systems, wherein automateddecision needs to be taken based on the image contents. The prime requirement of such systems is to develop av...

 JTAG Architecture with Multi Level Security

 For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes...

 Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspired Elephant Based Swarm Optimization

 : The robust and complex real-time applications and dramatically increased sensor capabilities may play a vital role in enhancing the lifespan of WSNs. On the other hand majority of WSNs operate on battery powe...

Download PDF file
  • EP ID EP135903
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

S Selvan (2013).  Secure Authentication System Using Video Surveillance. IOSR Journals (IOSR Journal of Computer Engineering), 11(6), 97-104. https://europub.co.uk/articles/-A-135903