Authentic Face Detection and Encryption for Security Assurance

被引:0
|
作者
Vaidya, Lahari [1 ]
Shasthrimath, Veena Devi V. [1 ]
机构
[1] NMAMIT, Dept Elect & Commun, Nitte, Karnataka, India
来源
PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018) | 2018年
关键词
Face detection; Feature extraction; encryption; PCA algorithm; Spoofing; Tampering; Biometrics;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid evolution of authentic face detection has been witnessed from the past along with the security assurance in the field of information technology. Now being a necessary note of issue the concept of face detection along with encryption, two non-connected field, as a discuss are brought together in this paper for the purpose of privacy assurance of data. Considering the security issues of information, which is the topic of concern in lack of confidence and negative impact profound by the user, the method is deployed to solve the problem by using face detection along with feature extraction using PCA algorithm and encryption of the facial image detected by generating random key that is bound to the image. Securing the information and maintaining the privacy of data is a mainstream topic nowadays. To ensure that the privacy of information is not violated by vulnerabilities such as spoofing and tampering there is a need of high security assurance to the data stored in the system which is the case in biometrics. There is a need of general awareness and widespread knowledge about security and privacy assurance of data which is an important threshold. The paper presents the promising method of authentication of user, data security and operational efficiencies. The novel solution of generating a key for the facial image detected is a method of encryption that maintains the high level secrecy and certainty of the data. Face detection and encryption is tested and the method is found to be reliable and persistent.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 50 条
  • [11] Door Security using Face Detection and Raspberry Pi
    Bhutra, Venkatesh
    Kumar, Harshav
    Jangid, Santosh
    Solanki, L.
    3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS-2017), 2018, 331
  • [12] Dual PTZ Cameras Approach for Security Face Detection
    Tran, Due X.
    Nguyen, Tien D.
    Bui, Hieu M.
    Nguyen, Son T.
    Hoang, Hong X.
    Pham, Thanh C.
    de Souza-Daw, Tony
    2014 IEEE FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2014, : 478 - 483
  • [13] Security assurance in wireless acoustic sensors via event forecasting and detection
    Zhong, Zhen
    Zhao, Chenglin
    Pi, Yiming
    Wang, Lingming
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2671 - 2677
  • [14] Improving Vulnerability Detection Measurement [Test Suites and Software Security Assurance]
    Hoole, Alexander M.
    Traore, Issa
    Delaitre, Aurelien
    de Oliveira, Charles
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING 2016 (EASE '16), 2016,
  • [15] Software assurance for security
    McGraw, G
    COMPUTER, 1999, 32 (04) : 103 - 105
  • [16] Search for assurance and security
    Burger, Rudolf
    MERKUR-DEUTSCHE ZEITSCHRIFT FUR EUROPAISCHES DENKEN, 2007, 61 (04): : 324 - 332
  • [17] Vehicle Security Encryption Based on Unlicensed Encryption
    Huang, Haomin
    Song, Jing
    Xu, Zhijia
    Ding, Xiaoke
    Deng, Wei
    MIPPR 2017: REMOTE SENSING IMAGE PROCESSING, GEOGRAPHIC INFORMATION SYSTEMS, AND OTHER APPLICATIONS, 2018, 10611
  • [18] ON THE SECURITY OF MULTIPLE ENCRYPTION
    MERKLE, RC
    HELLMAN, ME
    COMMUNICATIONS OF THE ACM, 1981, 24 (07) : 465 - 467
  • [19] RETRACTED: Face Security Authentication System Based on Deep Learning and Homomorphic Encryption (Retracted Article)
    Sun, Dechao
    Huang, Hong
    Zheng, Dongsong
    Hu, Haoliang
    Bi, Chunyue
    Wang, Renfang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [20] Chaotic encryption and decryption: Involving undergraduates in authentic research
    Addison, SR
    Ochterbeck, K
    Reynolds, KM
    Gray, JE
    PROCEEDINGS OF THE THIRTY-SEVENTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2005, : 244 - 248