A Haar casecade based Biometric Approach for Ensuring Secured Authentication

被引:0
|
作者
Vijayapriya, V. [1 ]
Krishnan, Bala R. [1 ]
Kumar, Rajesh N. [1 ]
Raajan, N. R. [1 ]
Meganathan, S. [1 ]
机构
[1] SASTRA Univ, Dept CSE, Thanjavur, Tamil Nadu, India
关键词
Haar casecade; Face Detection; Authentication; Data accuracy;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In order to avoid fraudulent activities, face recognition method is used widely now-a-days. The proposed method deals with real time human face detection using Haar casecade. It is an automated system model for human face recognition in a real time background. It reads the features from the human face and performs the comparison in the background using the Haar casecade features to decide the user authentication. From the experimental observations, it is established that this biometric approach assures accuracy in terms of detecting the human face through the biological features and grants access for the eligible users.
引用
收藏
页码:1467 / 1471
页数:5
相关论文
共 50 条
  • [1] Multimodal Biometric-Based Authentication with Secured Templates
    Choudhary, Swati K.
    Naik, Ameya K.
    [J]. INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (02)
  • [2] Ensuring Secured Iris Authentication for Mobile Devices
    Choudhary, Meenakshi
    Tiwari, Vivek
    Venkanna, U.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [3] IT and SLT Characterizations of Secured Biometric Authentication Systems
    Schmid, Natalia A.
    Wechsler, Harry
    [J]. MEDIA FORENSICS AND SECURITY II, 2010, 7541
  • [4] Development of a Biometric Authentication System based on HAAR Transformation and Score Level Fusion
    Naidu, Balaka Ramesh
    Babu, M. S. Prasad
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 1090 - 1093
  • [5] BAED: A secured biometric authentication system using ECG signal based on deep learning techniques
    Allam, Jaya Prakash
    Patro, Kiran Kumar
    Hammad, Mohamed
    Tadeusiewicz, Ryszard
    Plawiak, Pawel
    [J]. BIOCYBERNETICS AND BIOMEDICAL ENGINEERING, 2022, 42 (04) : 1081 - 1093
  • [6] Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication
    Vishwakarma, Nisha
    Patel, Vinod
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 119 - 123
  • [7] A Secured and Reliable Biometric User Authentication Using Keystroke Template Method
    Visumathi, J.
    Jayarin, P. Jesu
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2015, 10 (03) : 375 - 384
  • [8] Secured Authentication of Space Specified Token with Biometric Traits - Face and Fingerprint
    Lakshmi, B. Prasana
    Kannammal, A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 231 - 234
  • [9] Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data
    Haas, Sarah
    Ulz, Thomas
    Steger, Christian
    [J]. ROBOCUP 2017: ROBOT WORLD CUP XXI, 2018, 11175 : 143 - 155
  • [10] SEGAUTH: A Segment-based Approach to Behavioral Biometric Authentication
    Li, Yanyan
    Xie, Mengjun
    Bian, Jiang
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 1 - 9