We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Establishing User Authentication using Face Geometry

by Indradip Banerjee, Dipankar Chatterjee, Souvik Bhattacharyya, Gautam Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 16
Year of Publication: 2014
Authors: Indradip Banerjee, Dipankar Chatterjee, Souvik Bhattacharyya, Gautam Sanyal
10.5120/16090-5259

Indradip Banerjee, Dipankar Chatterjee, Souvik Bhattacharyya, Gautam Sanyal . Establishing User Authentication using Face Geometry. International Journal of Computer Applications. 92, 16 ( April 2014), 1-7. DOI=10.5120/16090-5259

@article{ 10.5120/16090-5259,
author = { Indradip Banerjee, Dipankar Chatterjee, Souvik Bhattacharyya, Gautam Sanyal },
title = { Establishing User Authentication using Face Geometry },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 16 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number16/16090-5259/ },
doi = { 10.5120/16090-5259 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:27.189336+05:30
%A Indradip Banerjee
%A Dipankar Chatterjee
%A Souvik Bhattacharyya
%A Gautam Sanyal
%T Establishing User Authentication using Face Geometry
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 16
%P 1-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The use of digital media or information is very precarious for increasing of hacker in the nation. So the information security is one of the commanding articles to shield it. The biometric information security is one information security mechanism, which is powerful than conventional cryptography system. The biometric system plays a vital role in person recognition. The main reason of biometry is so popular in security, because there is no risk if something might be lost or stolen in case of traditional IDs and passwords. After several comparisons among possible features of a human face geometry processing approaches, an authorized person recognition system have been designed and developed. Freely accessible sample faces of different persons are used in this novel biometric authentication system. Furthermore, the functionality to extract features of face has been implemented to compare the new samples with user templates. The implementation has been evaluated by the FAR (False Acceptance Rate) and FRR (False Rejection Rate) of the system in order to reduce FAR. Examining the Distance between some objects of faces and angles between objects points are used in this system and this is the novelty.

References
  1. Jain. A. K, Hong. L, Pankanti. S: Biometric identification. Communications of the ACM 43 (2000) P. 91-98.
  2. A. K. Jain, A. Ross and S. Pankanti, Biometrics: A tool for information security, IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125-143, 2006.
  3. K. A. Rhodes, Information Security: Challenges in Using Biometrics, United States General Accounting Office, 2003.
  4. A. K. Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4-20, 2004.
  5. S. Prabhakar, S. Pankanti and A. K. Jain, Biometric recognition: Security and privacy concerns, IEEE Security and Privacy, vol. 1, no. 2, pp. 33-42, 2003.
  6. A. K. Jain and A. Kumar, Biometrics of next generation: An overview, The 2nd Generation Biometrics, 2010.
  7. Subhra Mazumdar; Venkata Dhulipala. "Biometric Security Using Finger Print Recognition". University of California, San Diego. p. 3. Retrieved 30 August 2010.
  8. Retina and Iris Scans. Encyclopedia of Espionage, Intelligence, and Security. Copyright © 2004 by The Gale Group, Inc.
  9. R. Brunelli, Template Matching Techniques in Computer Vision: Theory and Practice, Wiley, ISBN 978-0-470-51706-2, 2009.
  10. Miroslav Ba?a; Petra Grd and Tomislav Fotak (2012). "4: Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics". New Trends and Developments in Biometrics. InTech. Retrieved 1st December 2013.
  11. Shangling Song; Kazuhiko Ohnuma; Zhi Liu; Liangmo Mei; Akira Kawada; Tomoyuki Monma "Novel biometrics based on nose pore recognition" 2009.
  12. Surya Prakash, Umarani Jayaraman & Phalguni Gupta, A Skin-Color and Template Based Technique for Automatic Ear Detection, Proceedings of 7th International Conference on Advances in Pattern Recognition (ICAPR 2009), pp. 213-216, Kolkata, India, February 2009.
  13. Yeung, D; , H. , Xiong, Y. , George, S. , Kashi, R. , Matsumoto, T. , Rigoll, G. . "SVC2004: First international signature verification competition". Lecture Notes in Computer Science. LNCS-3072: 16–22. 2004.
  14. Probing the uniqueness and randomness of IrisCodes: Results from 200 billion iris pair comparisons. " Proceedings of the IEEE, vol. 94 (11), 2006, pp. 1927-1935.
  15. Homayoon Beigi, Speaker Recognition, Biometrics / Book 1, Jucheng Yang (ed. ), Intech Open Access Publisher, 2011, pp. 3-28, ISBN 978-953-307-618-8.
  16. Wang, L. -Y. , G. Leedham, and D. S. -Y. Cho, Infrared Imaging of Hand Vein Patterns for Biometric Purposes, The Institution of Engineering and Technology, Computer Vision, Vol. 1, pp. 113-122, 2007.
  17. Kumar, A. , K. and K. , V. Prathyusha, Personal authentication using hand vein triangulation, IEEE Trans. Image Process. , Vol. 38, pp. 2127-2136, 2009.
  18. J. Pedraza, M. A. Patricio, A. de Asís, and J. M. Molina, "Privacy and legal requirements for developing biometric identification software in context-based applications," International Journal of Bio-Science and Bio-Technology, vol. 2, no. 1, pp. 13–24, 2010.
  19. Min-Gu Kim, Hae-MinMoon, Yongwha Chung and Sung BumPan. "A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System" Hindawi Publishing Corporation Journal of Biomedicine and Biotechnology Volume 2012, Article ID 614146.
  20. G. A. Atkinson and M. L. Smith, "Using photometric stereo for face recognition," International Journal of Bio-Science and Bio-Technology, vol. 3, no. 3, pp. 35–44, 2011.
  21. J. L. Wayman, "Large-scale civilian biometric system—issues and feasibility," Card Tech/Secure Tech ID, 1997.
  22. E. Newham, The Biometrics Report, SJB Services, 1995.
  23. U. Park and A. K. Jain, "Face matching and retrieval using soft biometrics," Information Forensics and Security, vol. 5, no. 2, pp. 406–415, 2010.
  24. Sulochana Sonkamble, Dr. Ravindra Thool, Balwant Sonkamble, "Survey Of Biometric Recognition Systems And Their Applications" Journal of Theoretical and Applied Information Technology. Vol. 11 No 1,pp. 45-51.
  25. Muhammad Khurram Khan, Jiashu Zhang and Shi-Jinn Horng, "An Effective Iris Recognition System for Identification of Humans", IEEE 2004.
  26. Natalia A. Schmid, Joseph A. O'Sullivan, "Performance Prediction Methodology for Biometric Systems using a Large Deviations Approch", IEEE Transaction of Signal Processing, October 2004.
  27. Elena Deza & Michel Marie Deza (2009) Encyclopedia of Distances, page 94, Springer.
  28. Fichet, B. (1987). The role played by L1 in data analysis. In Statistical Data Analysis based on the L1-norm and related methods (Y. Dodge, ed. ). Amsterdam: North-Holland. .
  29. Kruskal J. B. (1964): Multidimensional scaling by optimizing goodness of fit to a non metric hypothesis. Psychometrika 29(1):1-27.
  30. James M. Abello, Panos M. Pardalos, and Mauricio G. C. Resende (editors) (2002). Handbook of Massive Data Sets. Springer. ISBN 1-4020-0489-3.
  31. Salton and Buckley, Gerard Salton and Christopher Buckley. Term-weighting approaches in automatic text retrieval. Information Processing & Management, 24(5):513-523, 1988.
  32. KUNG, S. Y. , MAK, M. W. , LIN, S. H. Biometric Authentication. Published as Prentice Hall Professional Technical Reference. New Jersey: First Printing, September 2004.
  33. Peter Varchol, Dušan Levický, Using of Hand Geometry in Biometric Security Systems, Radioengineering, Vol. 16, No. 4, P. 82-87, December 2007.
  34. Mathew Turk And Alex Pentland, "Eigen Faces For Recognition"; Journal Of Cognitive Neuroscience Vol. 3,No. 1,pp. 71-86,1991.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Approach Face Geometry Euclidean distance City block metric Minkowski distance Chebychev distance Cosine distance.