scholarly journals MAC Based Security Integration using Face Recognition in Cloud Environment

2021 ◽  
Vol 2089 (1) ◽  
pp. 012005
Author(s):  
Sharma Yash ◽  
Pandey Neeraj Kumar

Abstract The major challenges, which come across face recognition system, are to find the age and gender in 2D/3D image of the person specifically in cloud environment. This paperis centered on face detection with MAC (Media Access Control) and biometric technology. Face scanning along with machine’s MAC address and biometric technologies has been shown to improve security controls. Face recognition can be used to search and label users and their assigned machines for sensitive purposes. Following that, it was stored in a specific database with their unique ID. In addition, the verification process has begun by comparing the models in the database. Face scanning along with speech and biometric technologies is used to improve security controls. Face recognition system may also be set up in high security machines to improve protection by allowing only registered individuals or others users. Related strategies for determining the age and gender and 2D/3D image from a specific picture are explored, as well as several modern methods for preserving protection. In this paper, the full model is explored independently with security implemented in cloud environment. The proposed model of the paper provides the integrated security features using MAC address of machine and face recognition of the machine user.

Author(s):  
Putri Nurmala ◽  
Wikaria Gazali ◽  
Widodo Budiharto

Face recognition and gender information is a computer application for automatically identifying or verifying a person's face from a camera to capture a person's face. It is usually used in access control systemsand it can be compared to other biometrics such as finger print identification system or iris. Many of face recognition algorithms have been developed in recent years. Face recognition system and gender information inthis system based on the Principal Component Analysis method (PCA). Computational method has a simple and fast compared with the use of the method requires a lot of learning, such as artificial neural network. In thisaccess control system, relay used and Arduino controller. In this essay focuses on face recognition and gender - based information in real time using the method of Principal Component Analysis ( PCA ). The result achievedfrom the application design is the identification of a person’s face with gender using PCA. The results achieved by the application is face recognition system using PCA can obtain good results the 85 % success rate in face recognition with face images that have been tested by a few people and a fairly high degree of accuracy.


2020 ◽  
Vol 1601 ◽  
pp. 052011
Author(s):  
Yong Li ◽  
Zhe Wang ◽  
Yang Li ◽  
Xu Zhao ◽  
Hanwen Huang

Author(s):  
CHING-WEN CHEN ◽  
CHUNG-LIN HUANG

This paper presents a face recognition system which can identify the unknown identity effectively using the front-view facial features. In front-view facial feature extractions, we can capture the contours of eyes and mouth by the deformable template model because of their analytically describable shapes. However, the shapes of eyebrows, nostrils and face are difficult to model using a deformable template. We extract them by using the active contour model (snake). After the contours of all facial features have been captured, we calculate effective feature values from these extracted contours and construct databases for unknown identities classification. In the database generation phase, 12 models are photographed, and feature vectors are calculated for each portrait. In the identification phase if any one of these 12 persons has his picture taken again, the system can recognize his identity.


Sensors ◽  
2014 ◽  
Vol 14 (11) ◽  
pp. 21726-21749 ◽  
Author(s):  
Won Lee ◽  
Yeong Kim ◽  
Hyung Hong ◽  
Kang Park

Sign in / Sign up

Export Citation Format

Share Document