scholarly journals BIOMETRICS-A PRELIMINARY APPROACH

2017 ◽  
Vol 5 (4RACSIT) ◽  
pp. 47-52
Author(s):  
Rohini B.R. ◽  
Thippeswamy G.

Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.

2020 ◽  
Vol 14 ◽  
Author(s):  
Ambika Annavarapu ◽  
Surekha Borra ◽  
Rohit Thanki

: The security of information is the major problem faced in today’s digital environment. Biometric Systems helps in achieving high–end security at precise performance requirements for various applications. This paper surveys the present multimodal and unimodal biometric based authentication systems which are in use, and their future possibilities. The authentication techniques that can identify the individual using unique features of the human such as face, fingerprint, DNA, speech and iris are discussed. Different recognition systems for new biometric traits such as voice, gait, and lip moment are also focused. This paper also focuses on information security of biometric systems and their performance requirements.


Face recognition plays a vital role in security purpose. In recent years, the researchers have focused on the pose illumination, face recognition, etc,. The traditional methods of face recognition focus on Open CV’s fisher faces which results in analyzing the face expressions and attributes. Deep learning method used in this proposed system is Convolutional Neural Network (CNN). Proposed work includes the following modules: [1] Face Detection [2] Gender Recognition [3] Age Prediction. Thus the results obtained from this work prove that real time age and gender detection using CNN provides better accuracy results compared to other existing approaches.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Kanokmon Rujirakul ◽  
Chakchai So-In ◽  
Banchar Arnonkijpanich

Principal component analysis or PCA has been traditionally used as one of the feature extraction techniques in face recognition systems yielding high accuracy when requiring a small number of features. However, the covariance matrix and eigenvalue decomposition stages cause high computational complexity, especially for a large database. Thus, this research presents an alternative approach utilizing an Expectation-Maximization algorithm to reduce the determinant matrix manipulation resulting in the reduction of the stages’ complexity. To improve the computational time, a novel parallel architecture was employed to utilize the benefits of parallelization of matrix computation during feature extraction and classification stages including parallel preprocessing, and their combinations, so-called a Parallel Expectation-Maximization PCA architecture. Comparing to a traditional PCA and its derivatives, the results indicate lower complexity with an insignificant difference in recognition precision leading to high speed face recognition systems, that is, the speed-up over nine and three times over PCA and Parallel PCA.


2022 ◽  
Vol 14 (1) ◽  
pp. 0-0

Attendance management can become a tedious task for teachers if it is performed manually.. This problem can be solved with the help of an automatic attendance management system. But validation is one of the main issues in the system. Generally, biometrics are used in the smart automatic attendance system. Managing attendance with the help of face recognition is one of the biometric methods with better efficiency as compared to others. Smart Attendance with the help of instant face recognition is a real-life solution that helps in handling daily life activities and maintaining a student attendance system. Face recognition-based attendance system uses face biometrics which is based on high resolution monitor video and other technologies to recognize the face of the student. In project, the system will be able to find and recognize human faces fast and accurately with the help of images or videos that will be captured through a surveillance camera. It will convert the frames of the video into images so that our system can easily search that image in the attendance database.


Attendance Management System under unconstrained video using face recognition technology has made a great variation from the traditional method of attendance marking system. This attendance management system has been developed under the domain of Deep Learning by using Face recognition. Automatic Attendance Management under unconstrained video using face recognition systems which automatically mark attendance by detecting end to end face from the frames obtained from live stream video of surveillance camera which placed in center of the classroom. From the recognized faces, it will be compared with stored images in database, then the attendance report will be generated and it also provides attendance reports to parents of the absentee’s student.


2016 ◽  
Vol 2 (3) ◽  
pp. 520
Author(s):  
Nooruldeen Nasih Qader

Newly released researches disclose the need of canceling the incorrect opinion; security by Password (PW) is dead and proves that these believe has been hurtful. Moreover, recommended a campaign prioritize strategies of building PW. Considering the PW features such as costless, maturity and vast experiences, and usability PW continues to be the most used options in Information Security (IS), it is furthermore, consider most challengers to researchers and really needs further boosting. PWs control authentication mechanism of IS, requiring that individuals choose strong PW. The best advice to protect from hackers is randomly generating unique PW for every site and service, to apply this advice we need more techniques of easy to remember and hard to guess. This study proposed a bunch of easy to remember techniques for building a strong PW. Also, it exhibited the importance of similar strategy despite existing of many helpful PW managers. On the other hand, this paper compiled and analyzed today’s data regarding authenticating secure systems via PW. Analyzed data showed some of common weakness in PW selection. Moreover, gathered information and evaluated data indicated the need of boosting PW. Proposed techniques and solutions enable individuals to select appropriate PW easily.


Sign in / Sign up

Export Citation Format

Share Document