Face recognition for e-commerce security

被引:0
|
作者
Wang, W [1 ]
Hui, SC [1 ]
Gao, Y [1 ]
Leung, MKH [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
face recognition; e-commerce; Internet security; LEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In electronic commerce, it is difficult to verify the buyers identity as his signature cannot be produced on demand. Furthermore, it is easy to impersonate anothers identity by using a stolen credit card number ii-hen making, online payments. Credit card frauds have been reported all over the world. In this paper, we propose a FaceID system to support user verification over the Internet using a face recognition technique, known as the Line Edge Map (LEM). In any e-commerce transactions, the buyers credit card number and face image data captured by a video camera located on the PC are encoded, encrypted and transmitted via the Internet to the FaceID server for verification, At the FaceID server, the face image code associated with the credit card number is retrieved from the face image code database and then matched with the received face image code captured from the buyer using the LEM algorithm. A positive verification gives the go ahead for the intended transaction. The verification results will then be transmitted to the seller for completing the transaction.
引用
收藏
页码:904 / 907
页数:4
相关论文
共 50 条
  • [1] E-commerce security
    Gollmann, D
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (03): : 115 - 118
  • [2] E-commerce security
    Gollmann, Dieter
    [J]. Elektron, 2001, 18 (03): : 44 - 47
  • [3] Security in e-commerce
    Müller, G
    [J]. LECTURES IN E-COMMERCE, 2001, : 149 - 162
  • [4] E-Commerce security
    Al-Slamy, Nada M. A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 340 - 344
  • [5] On the Security of e-commerce
    Razvan, Raducanu
    Eduard, Omusoru
    [J]. RECENT ADVANCES IN MATHEMATICS AND COMPUTERS IN BUSINESS, ECONOMICS, BIOLOGY & CHEMISTRY, 2010, : 171 - 174
  • [6] E-commerce - Is changing the face of IT
    Earl, M
    Khan, B
    [J]. MIT SLOAN MANAGEMENT REVIEW, 2001, 43 (01) : 64 - +
  • [7] RETRACTED: Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data (Retracted Article)
    Chang, Shu
    Duan, Youtao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] E-COMMERCE SECURITY ISSUES
    Ladan, Mohamad Ibrahim
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 197 - 201
  • [9] Rethinking E-commerce security
    Oreku, George S.
    Li, Jianzhong
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS, 2006, : 223 - +
  • [10] E-Commerce security issues
    Salehnia, A
    Pournaghshband, H
    [J]. ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, 2002, : 705 - 708