Face recognition for e-commerce security

被引:0
|
作者
Wang, W [1 ]
Hui, SC [1 ]
Gao, Y [1 ]
Leung, MKH [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
face recognition; e-commerce; Internet security; LEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In electronic commerce, it is difficult to verify the buyers identity as his signature cannot be produced on demand. Furthermore, it is easy to impersonate anothers identity by using a stolen credit card number ii-hen making, online payments. Credit card frauds have been reported all over the world. In this paper, we propose a FaceID system to support user verification over the Internet using a face recognition technique, known as the Line Edge Map (LEM). In any e-commerce transactions, the buyers credit card number and face image data captured by a video camera located on the PC are encoded, encrypted and transmitted via the Internet to the FaceID server for verification, At the FaceID server, the face image code associated with the credit card number is retrieved from the face image code database and then matched with the received face image code captured from the buyer using the LEM algorithm. A positive verification gives the go ahead for the intended transaction. The verification results will then be transmitted to the seller for completing the transaction.
引用
收藏
页码:904 / 907
页数:4
相关论文
共 50 条
  • [41] e-Commerce security - A life cycle approach
    Sengupta, A
    Mazumdar, C
    Barik, MS
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2005, 30 (2-3): : 119 - 140
  • [42] The Application of VMware in Teaching for E-commerce Security
    Dai, Jie-qiang
    Wu, Cui-hong
    [J]. INTERNATIONAL CONFERENCE ON MODERN EDUCATION AND INFORMATION TECHNOLOGY (MEIT 2017), 2017, : 278 - 281
  • [43] The Viewpoint of E-Commerce Security in the Digital Economy
    Priescu, Iustin
    Patriciu, Victor Valeriu
    Nicolaescu, Sebastian
    [J]. INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 431 - +
  • [44] Privacy and security the drivers for growth of E-commerce
    Hinde, S
    [J]. COMPUTERS & SECURITY, 1998, 17 (06) : 475 - 478
  • [45] e-commerce and security governance in developing countries
    Sanayei, Ali
    Rajabion, Lila
    [J]. GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 288 - +
  • [46] Security in e-commerce and the economics of immediate satisfaction
    Zhang, Min
    Jiang, Renguo
    Hu, Haiqing
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 588 - +
  • [47] The program is assessing the level of security of e-commerce
    Oladko, Vladlena S.
    [J]. VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2015, 33 (04): : 46 - 53
  • [48] E-commerce - Locking up cyber security
    D'Amico, E
    [J]. CHEMICAL WEEK, 2002, 164 (01) : 37 - 38
  • [49] Research on E-Commerce Network Security Architecture
    Shi, Yanrong
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 377 - 380
  • [50] Application of Micro Lecture in E-commerce Security
    Tian, Hongyun
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATIONAL INNOVATION (EBMEI 2016), PT 2, 2016, 55 : 62 - 65