SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3532
Dynamic Based face authentication using Video-Based Method
Srikar Banka1, Smit Parikh2, Isha Gupta3, Sambhaji Sarode4
1 ,2,3 Student & Dept.of Computer Science and Engineering, MIT-ADT University, Pune Maharashtra, India
4 Professor & Dept.of Computer Science and Engineering, MIT-ADT University, Pune Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: A system of facial recognition is a computer
program for a person to automatically recognize or verify
from a digital image or a video source. This can be done by
comparing selected face characteristics from the picture and
the face database. Face recognition is one of the most
important biometric methods. The recognition function is
performed by obtaining the facial features from an image of
the user’s face. However, the current facial authentication
system, for instance, the attendance system that uses an
image-based approach, has a few drawbacks especially by
hacking and granting access to an unauthorized person who
does not work in that industry. The proposed system would
build a video-based mechanism based on the drawbacks of
the current existing system by establishing a dynamic face
authentication system. During the user verification, it will be
checked by video instead of checking photos in this proposed
system. As a result, this system will be more secure for access
control. This system can be used in industries, residential,
and many more.
Keywords: Face Authentication, Dynamic System, Video-
Based Approach.
1. INTRODUCTION
The level of security implemented in any project
management software [32] determines how secure the
project is going to be. This includes the privacy and
confidentiality of our data, as well as infrastructure
security, and network stability. We need to understand the
risks and what cyber-criminals are searching for, to
understand security better. While ransomware (encrypting
files and demanding money to get them back) and major
frauds dominate the headlines, something far and less
apparent is what most companies face. The offenders
simply want to steal our data as well as our business and
personal information.
Hackers and scammers will open us up if there is
too little security. But too much security can limit our own
team's access to the data that they need. Only when
security is regularly addressed and referred to at any stage
of the planning and implementation of a project, then only
can the awareness increase. Facial recognition limits and
restricts access to information to those who own it. It made
authentication fairly simpler, with nothing much to be
fitted and lots of information within minutes to reach.
The facial authentication program has been used in
the top institutions and workplaces as a test of securities to
ensure there is no space for vandalism. This type of
software leaves no room for human error at all and is a big
helping hand. Authentication is the method of deciding
whether someone is really who or what they believe
themselves to be. The authentication method gives control
of system access by checking if the user data matches the
credentials throughout the authenticated user database or
authentication server program. Authentication is important
because it allows businesses to safeguard their networks
by allowing only authenticated users or processes to access
their protected resources, which can involve computer
systems, networks, databases, websites, and other software
or services based upon the network. The password-based
vulnerabilities in authentication are sometimes solved with
smarter usernames and password rules such as minimum
length and difficulty stipulations, such as capitals and
symbols. Password-based authentication and
authentication based on knowledge are more vulnerable
than systems that need multiple separate methodologies.
In paper [9], there are different types of
authentications such as Two-factor authentication, Multi-
factor authentication, One Time Password authentication,
API authentication, Public-key Cryptography, and
biometrics authentication. In Biometric authentication,
there are many types such as: - 1) Signature Dynamics, 2)
Eye Scans, 3) Fingerprint Recognition, 4) Hand or palm
geometry, 5) Voice Recognition, and 6) Facial Recognition.
Some other authentication types are:
1. Email Authentication
2. Database Authentication
In paper [25], cloud computing has an on-demand
delivery over the online platform of wages-as-you-go IT
service providers, which increase costs. Rather than
procure, own as well as operate physical cloud servers, a
cloud service like Amazon Web Services (AWS) can acquire
internet services including computing, storage, and
database systems, as required.
There are some benefits to this. We could swiftly
change resources from service providers like processing,
storing, as well as database systems to the IOTs, machine
learning, data lakes, as well as for analytics, and much
more, and hence, it provides agility. With cloud services, to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3533
interact with future access levels of corporate tasks, we will
not have to excessively-provide resources upside. To
expand and shrink capability as the business needs shift,
we will instantly reduce the operating costs of those tools
thereby providing us elasticity. Cloud computing enables
us to swap capital expenditure economic costs (like data
centers and physical servers), and charge for using its
services for a lower amount. Hence, it is cost-saving.
In most of the existing solutions [14], the face
authentication system is static and image-based. When a
person comes in front of the camera, the face of that person
gets captured, and it gets checked with the face image that
is uploaded to the database; if the person is verified, then
the person is allowed to enter and if the person is not
verified, then the person is not allowed to enter. Here, the
image processing method is used for face authentication.
The drawback of the existing system [20] is that it
is not secure, even with additional security in the system. A
hacker can easily hack the system and then upload a fake
profile of a person that he or she desires, who could be a
criminal. Once the profile is uploaded, then that person
could enter the building and no one would know that the
person is unauthorized.
However, the video stream processing of facial
images has already been gaining growing attention in
biometric technology. A possible outcome of using data
integrity that’s present in the video frames to focus on
improving still picture systems is an instant advantage
when using video data. While a substantial amount of study
has been performed in comparing still facial photos, the use
of face detection videos is much less investigated. The very
first stage of video-based face recognition (VFR) is to
conduct identification, where a gathering of videos is jump-
matched to identify the possible suspect in all occurrences.
In common, VFR methods [16] can be divided into
two groups depending on how we exploit the wide range of
information present in a video frame: sequence-based, and
(ii) set-based, then at a top standard, what separates these
different objectives is not whether they use temporal
features.
So, by using this method, the system will be able to
check the AWS bucket where the video is stored so that the
person who is at the gate is granted access or is rejected
accordingly.
Based on the above reading, we proposed a face
authentication system dynamically using the video-based
method.
2. PROPOSED SYSTEM
Figure 1 - Working of the Security Protocol
● From this system (Fig, 1), a safer way to facial
authentication can be offered to industries, offices,
buildings, and residential apartments.
● In the existing system [4], the user’s picture is
captured by the camera at the entrance. Then the
system checks if the user is registered or not by
checking his/her picture from the database. This
method is proven to compromise security at times.
● In the working of the security protocol (Fig. 1)
when a user reaches the entrance, the camera at
the entrance will capture the user’s face to allow
his/her entry. A video-based approach is used in
the proposed solution, in which a video is taken
and saved into the AWS Bucket. Then, the video is
checked frame by frame dynamically with the
other existing videos present inside the AWS
bucket. And this footage is picked up directly from
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3534
CCTV cameras present in the industry, office, etc.
for a more secure system.
● If the user is registered, then he will be granted
access to enter the premises. And if the user is not
registered, an alert will get generated to the
security team that he/she is not authorized or not
registered. The alert will get generated on a web
portal for the Security Team to keep track of the
security.
● So, the security team determines whether to allow
a person inside or not after the alert is witnessed.
If the individual is allowed, then a new user with a
new ID is created and the video is saved inside the
AWS bucket [25][26].
● If an unregistered user comes to visit the premises
after the working hours, the user will not be
allowed inside. The video of the user that is
captured will get deleted. However, his/her picture
will be captured and the name and the time of the
visit will get stored in the database for security
purposes
Figure 2 - Video-based Approach
● In the video-based approach figure (Fig. 2), the
video is checked frame by frame dynamically with
the other existing videos present inside the AWS
bucket. And this footage is picked up directly from
CCTV cameras present in the industry, office, etc.
for a more secure system.
● In the existing systems [5], static facial
authentication methods are being used. However, a
dynamic facial authentication method will be used
in the proposed system.
2.1 Mathematical Model
Local Binary Pattern (LBP) [29] is a fast and
convenient way operator that identifies the pixels in the
image by thresholding almost every pixel's neighbourhood
as well as considers the outcome as a binary number
Algorithm description of LBP: - A more normal
description of LBP can be written as: -
with the help of xc and yc as central pixel with intensity ip
and ic of the neighbour pixel S is sign function defined as: -
This definition helps you to capture an image with
very fine-grained descriptions. The authors were able to
compete for texture classification with state-of-the-art
tests. It was noted soon after the operator was written that
a fixed neighbourhood fails to encode information that
varies in size. Therefore, the operator has been generalized
in [AHP04] to use a variable neighbourhood. The idea
is to match an arbitrary number of nearest neighbours with
a variable radius on a circle, which allows the following
neighbourhoods to be captured:
For a given point xc and yc, the position neighbour xc, yc, pϵP
can be calculated by: -
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3535
where R is the radius of the circle and P is the number of
sample points.
The LBP operator is by default robust against
monotonous gray-scale transformation. By looking at the
LBP picture of a digitally transformed image, we can easily
notice how an LBP image looks like.
2.2 Results
2.2.1 Face Data set: -
OpenCV (Open-Source Computer Vision Library)
[30] is also an open-source computer vision and
application library for machine-learning. OpenCV was
designed to provide a shared computer vision platform and
to promote its use of machine perception in commercial
applications. As a BSD-licensed software, OpenCV [30]
allows the use and modification of the code for companies.
OpenCV face recognizer [31] accepts information
in a given format to know which face belongs to which
person. It has two vectors to it:
● One is a human's face.
● The second is the labels of an integer for each face.
In data gathering (Fig. 4), the face is detected in the
stored video which is downloaded from the S3 storage
provided by the AWS services. Then, 30 images of that
detected face are captured, which will get used for training
the model.
All the 30 images will get stored in the dataset
folder with a unique user number and will get uploaded in
the database.
In the face dataset module (Fig. 3), the process of
data gathering is explained which will be required for
creating a face dataset.
Figure 3 [21] - Face dataset module
The steps to create the data set are:
1. Read all the videos from the AWS bucket.
2. Extract unique user ID and also images of the
person containing the unique user ID.
3. Read all the person's images, and apply face
detection to each of them.
4. Add each face-to-face vector with the unique user
ID of the corresponding individual.
The data gathering figure (Fig. 4) depicts how the
face is detected and how the unique user id is used to store
the face dataset.
Figure 4 - Data gathering
30 images are captured from the video (Fig. 5). and
this is how the face dataset can get stored in the specific
user dataset folder, respectively.
Figure 5 - Images captured from video
In the AWS bucket (Fig. 6), after the dataset folder
is created, the entire folder is uploaded to the bucket under
the images' folder.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3536
Figure 6 - AWS Bucket
2.2.2 Face training: -
OpenCV uses a different type of face recognition
method, they are: -
1. Eigenface
2. Fisherface
3. Local binary pattern Histogram (LBPH)
In this project, the local binary pattern histogram
(LBPH) method has been used.
The images which are stored in the dataset folder
are then used to train the model which can detect that
particular person.
In the face training module (Fig. 7), the trainer will
get the dataset and the assigned user id for training and
storing the data in the trainer.yml file.
Figure 7 [21] - Face training module
Once the face dataset module is initialized, the
Haar cascade trainer will get used to training our model.
The training facial dataset (Fig. 8) depicts the
process of training, which takes a few seconds to get
trained. The time to train depends on the number of images
present in the database.
Figure 8 - Training facial dataset
2.2.3 Face Recognition: -
In the face recognition module (Fig. 9), the system
detects the face to check whether the face is detected or
not.
Then, the system takes the help of the trained
model (trainer.yml file) to check from the database
whether the person is recognized or not.
Figure 9 [21] - Face recognition module
In the recognition accuracy figure (Fig. 10), after
using the given face dataset, gathered from the uploaded
video and trained dataset file, we got the recognition
accuracy of 70% from the webcam. The recognition
accuracy will increase for higher quality cameras.
Figure 10 - 70% Recognition Accuracy
The integrated module workflow figure (Fig. 11)
shows how all the integrated modules will work together,
right from the data gathering of the face dataset to the
facial recognition of the person.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3537
Figure 11[21] - Integrated module workflow
The table for factors affecting the recognition
accuracy (Table 1) shows us about the performance
evaluation of our proposed video-based method.
Table 1 - Table of factors affecting the recognition
accuracy.
No. of
test
images
No. of
recognize
d images
Accuracy Remark
Dataset1
(30)
30 100%
Due to the usage of
a higher camera
quality.
Dataset2
(30)
26 86%
Due to lower image
quality captured
from a general
webcam.
Dataset 3
(30)
24 80%
Due to different
illumination
conditions captured
from a general
webcam.
Dataset 4
(30)
21 70%
Due to different face
orientation & lower
image quality
condition captured
from a general
webcam.
The pie chart for the recognition rate (Fig. 12) is
the representation of the average the recognition accuracy
rate from Table 1.
Here, we get a false rate of 14% on an average
because of the low camera quality as well as varying
illumination conditions. However, we would easily be able
to achieve a false rate of 5% or less with superior camera
quality.
Figure 12 - Pie chart for the Recognition Rate
The bar graph (Fig. 13) is a graphical
representation of the factors that affect the recognition
accuracy that can be observed in Table 1.
Figure 13 - Bar Graph for factors affecting the
recognition accuracy
3. CONCLUSION
Face authentication technologies have traditionally
been associated with extremely expensive, top-secure
applications. The core technologies have advanced today
and due to innovation and rising processing power, the cost
of equipment is dropping dramatically. Many face
authentication technology implementations are now cost-
effective, dependable, and highly accurate.
This system can be used efficiently to provide safe
and reliable protection. It can, therefore, be used in many
organizations as a key to security solutions, as it can
recognize and convey people's identities. Hence, this
rectifies the drawbacks of the existing systems.
This paper has portrayed a survey related to face
authentication. Here, we have surveyed the paper related
to existing face authentication systems and their
drawbacks. Therefore, there is a need for an efficient
security system for facial authentication based on the cons
of the existing systems.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3538
REFERENCES
[1] A Real-Time Framework for Human Face Detection
and Recognition in CCTV Images by Rehmat Ullah,
Hassan Hayat, Afsah Abid Siddiqui, Uzma Abid
Siddiqui, Jebran Khan, Farman Ullah, Shoaib
Hassan, Laiq Hasan, Waleed Albattah, Muhammad
Islam, and Ghulam Mohammad Karami in 2022.
[2] Face Detection and Recognition Algorithm in
Digital Image Based on Computer Vision Sensor by
Di Lu and Limin Yan in 2021.
[3] Face Recognition and Identification using Deep
Learning Approach by KH Teoh, RC Ismail, SZM
Naziri, R Hussin, MNM Isa, and MSSM Basir in
2021.
[4] Identity authentication on mobile devices using
face verification and ID image recognition by Xing
Wua, Jianxing Xua , Jianjia Wanga , Yufeng Lia ,
Weimin Lia and Yike Guo in 2019.
[5] A novel optical two-factor face authentication
scheme by Gaurav Verma, Dajiang Lu in 2019.
[6] Face Authentication method by Julien Doublet and
Jean Beaudet in 2018.
[7] Face authentication device having database with
small storage capacity by Takayuki Kase in 2018.
[8] A face recognition Approach Using Deep
Reinforcement Learning Approach for User
Authentication by Ping Wang, Wen-Hui Lin, Kuo-
Ming Chao and Chi-Chun Lo in 2017.
[9] An overview of various Authentication Methods
and Protocols by Dwiti Pandya, Khushboo Ram
Narayan and Sneha Thakkar in 2015
[10] An Automate System for Unconstrained Video-
Based Face Recognition by Jingxiao Zheng, Rajeev
Ranjan, Ching-hui Chen, Jun-cheng chen, CArols D.
Castillo and Rama Chellappa in 2019
[11] A video database of moving face and people by A. J.
O’Toole, J. Harns, S. L. Snow, D. R. Hust, M. R.
Pappas, J. H. Ayyad and H. Abdi in 2005
[12] “IJB-S: IARPA Janus Surveillance Video
Benchmark,” by N. D. Kalka, B. Maze, J. A. Duncan,
K. J. O'Connor, S. Elliott, K. Hebert, J. Bryan, and A.
K. Jain in 2018.
[13] “An all-in-one convolutional neural network for
face analysis,” byR. Ranjan, S. Sankaranarayanan, C.
D. Castillo, and R. Chellappa, in 12th IEEE FG, vol.
00, May 2017
[14] “Deep face recognition,” by O. M. Parkhi, A.
Vedaldi, and A. Zisserman in BMVC, 2015.
[15] “Unconstrained face verification using deep CNN
features,” by J. C. Chen, V. M. Patel, and R.
Chellappa, in WACV, March 2016.
[16] “Video Based face association and identification,”
byC.-H. Chen, J.-C. Chen, C. D. Castillo, and R.
Chellappa, 12th FG, 2017.
[17] “Neural aggregation network for video face
recognition,” J. Yang, P. Ren, D. Zhang, D. Chen, F.
Wen, H. Li, and G. Hua, in CVPR, 2017.
[18] “Trunk-branch ensemble convolutional neural
networks for video-based face recognition,” by C.
Ding and D. Tao in CoRR, 2016.
[19] “Face recognition in unconstrained videos with
matched background similarity,” by L. Wolf, T.
Hassner, and I. Maoz in CVPR, 2011.
[20] Face Recognition Based attendance System by
Nandhini R, Duraimurugan and S.P.Chokkalingam
in 2019.
[21] Real-Time Face Recognition: An End-To-End
Project by Marcelo Rovai in 2018.
[22] IoE-Enabled Smart Embedded System: An
Innovative Way of Learning by Rathod A., Ayare P.,
Bobhate R., Sachdeo R., Sarode S., Malhotra J. in
Information and Communication Technology for
Sustainable Development. Advances in Intelligent
Systems and Computing, vol 933, pp. 659-668,
Springer, Singapore in 2020.
[23] Redefining smartness in township with Internet of
Things & Artificial Intelligence: Dholera city by
Raghav B., Manish P., Vasu G., Vishal K., Jyoti
M. and Sambhaji S., in 6th International Conference
on Energy and City of the Future (EVF’2019), E3S
Web of Conferences 170, 06001 IN 2020.
[24] Reliable and Prioritized Data Transmission
Protocol for Wireless Sensor Networks by S.
Sarode, J. Bakal and L. Malik in Proceedings of the
International Congress on Information and
Communication Technology, Volume 439 of the
series Advances in Intelligent Systems and
Computing pp 535-544, June 2016.
[25] Survey paper on cloud computing security by
Nimit Kaura and Abhishek Lal in 2017
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3539
[26] A Survey Paper on Security in Cloud Computing: A
Bibliographic Analysis by Krutika K Shah, Rutvij H
Jhaveri and Vahida U Vadiya in 2016.
[27] A Survey Paper on Data security in Cloud
Computing by Vijay Ghorpade, Vishvajit Dalimbkar
and Rajani Sajjan in 2016.
[28] A Comprehensive Survey on Security in Cloud
Computing by Gururaj Ramachandra Mohsin
Iftikhar and Farrukh Aslam Khan in 2017.
[29] Face Recognition: Understanding LBPH Algorithm
by Kelvin Salton do Prado in 2017.
[30] https://opencv.org/about/
[31] OpenCV Face Recognition by Adrian Rosebrock in
2018.
[32] Cyber Security and the Internet of Things:
Vulnerabilities, Threats, Intruders and Attacks by
Mohamed Abomhara and Geir M. Køien in 2015.

Weitere ähnliche Inhalte

Ähnlich wie Dynamic Based face authentication using Video-Based Method

Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentIRJET Journal
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud? ijcisjournal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...IRJET Journal
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceIRJET Journal
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 

Ähnlich wie Dynamic Based face authentication using Video-Based Method (20)

Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud?
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 

Kürzlich hochgeladen (20)

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 

Dynamic Based face authentication using Video-Based Method

  • 1. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3532 Dynamic Based face authentication using Video-Based Method Srikar Banka1, Smit Parikh2, Isha Gupta3, Sambhaji Sarode4 1 ,2,3 Student & Dept.of Computer Science and Engineering, MIT-ADT University, Pune Maharashtra, India 4 Professor & Dept.of Computer Science and Engineering, MIT-ADT University, Pune Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: A system of facial recognition is a computer program for a person to automatically recognize or verify from a digital image or a video source. This can be done by comparing selected face characteristics from the picture and the face database. Face recognition is one of the most important biometric methods. The recognition function is performed by obtaining the facial features from an image of the user’s face. However, the current facial authentication system, for instance, the attendance system that uses an image-based approach, has a few drawbacks especially by hacking and granting access to an unauthorized person who does not work in that industry. The proposed system would build a video-based mechanism based on the drawbacks of the current existing system by establishing a dynamic face authentication system. During the user verification, it will be checked by video instead of checking photos in this proposed system. As a result, this system will be more secure for access control. This system can be used in industries, residential, and many more. Keywords: Face Authentication, Dynamic System, Video- Based Approach. 1. INTRODUCTION The level of security implemented in any project management software [32] determines how secure the project is going to be. This includes the privacy and confidentiality of our data, as well as infrastructure security, and network stability. We need to understand the risks and what cyber-criminals are searching for, to understand security better. While ransomware (encrypting files and demanding money to get them back) and major frauds dominate the headlines, something far and less apparent is what most companies face. The offenders simply want to steal our data as well as our business and personal information. Hackers and scammers will open us up if there is too little security. But too much security can limit our own team's access to the data that they need. Only when security is regularly addressed and referred to at any stage of the planning and implementation of a project, then only can the awareness increase. Facial recognition limits and restricts access to information to those who own it. It made authentication fairly simpler, with nothing much to be fitted and lots of information within minutes to reach. The facial authentication program has been used in the top institutions and workplaces as a test of securities to ensure there is no space for vandalism. This type of software leaves no room for human error at all and is a big helping hand. Authentication is the method of deciding whether someone is really who or what they believe themselves to be. The authentication method gives control of system access by checking if the user data matches the credentials throughout the authenticated user database or authentication server program. Authentication is important because it allows businesses to safeguard their networks by allowing only authenticated users or processes to access their protected resources, which can involve computer systems, networks, databases, websites, and other software or services based upon the network. The password-based vulnerabilities in authentication are sometimes solved with smarter usernames and password rules such as minimum length and difficulty stipulations, such as capitals and symbols. Password-based authentication and authentication based on knowledge are more vulnerable than systems that need multiple separate methodologies. In paper [9], there are different types of authentications such as Two-factor authentication, Multi- factor authentication, One Time Password authentication, API authentication, Public-key Cryptography, and biometrics authentication. In Biometric authentication, there are many types such as: - 1) Signature Dynamics, 2) Eye Scans, 3) Fingerprint Recognition, 4) Hand or palm geometry, 5) Voice Recognition, and 6) Facial Recognition. Some other authentication types are: 1. Email Authentication 2. Database Authentication In paper [25], cloud computing has an on-demand delivery over the online platform of wages-as-you-go IT service providers, which increase costs. Rather than procure, own as well as operate physical cloud servers, a cloud service like Amazon Web Services (AWS) can acquire internet services including computing, storage, and database systems, as required. There are some benefits to this. We could swiftly change resources from service providers like processing, storing, as well as database systems to the IOTs, machine learning, data lakes, as well as for analytics, and much more, and hence, it provides agility. With cloud services, to International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3533 interact with future access levels of corporate tasks, we will not have to excessively-provide resources upside. To expand and shrink capability as the business needs shift, we will instantly reduce the operating costs of those tools thereby providing us elasticity. Cloud computing enables us to swap capital expenditure economic costs (like data centers and physical servers), and charge for using its services for a lower amount. Hence, it is cost-saving. In most of the existing solutions [14], the face authentication system is static and image-based. When a person comes in front of the camera, the face of that person gets captured, and it gets checked with the face image that is uploaded to the database; if the person is verified, then the person is allowed to enter and if the person is not verified, then the person is not allowed to enter. Here, the image processing method is used for face authentication. The drawback of the existing system [20] is that it is not secure, even with additional security in the system. A hacker can easily hack the system and then upload a fake profile of a person that he or she desires, who could be a criminal. Once the profile is uploaded, then that person could enter the building and no one would know that the person is unauthorized. However, the video stream processing of facial images has already been gaining growing attention in biometric technology. A possible outcome of using data integrity that’s present in the video frames to focus on improving still picture systems is an instant advantage when using video data. While a substantial amount of study has been performed in comparing still facial photos, the use of face detection videos is much less investigated. The very first stage of video-based face recognition (VFR) is to conduct identification, where a gathering of videos is jump- matched to identify the possible suspect in all occurrences. In common, VFR methods [16] can be divided into two groups depending on how we exploit the wide range of information present in a video frame: sequence-based, and (ii) set-based, then at a top standard, what separates these different objectives is not whether they use temporal features. So, by using this method, the system will be able to check the AWS bucket where the video is stored so that the person who is at the gate is granted access or is rejected accordingly. Based on the above reading, we proposed a face authentication system dynamically using the video-based method. 2. PROPOSED SYSTEM Figure 1 - Working of the Security Protocol ● From this system (Fig, 1), a safer way to facial authentication can be offered to industries, offices, buildings, and residential apartments. ● In the existing system [4], the user’s picture is captured by the camera at the entrance. Then the system checks if the user is registered or not by checking his/her picture from the database. This method is proven to compromise security at times. ● In the working of the security protocol (Fig. 1) when a user reaches the entrance, the camera at the entrance will capture the user’s face to allow his/her entry. A video-based approach is used in the proposed solution, in which a video is taken and saved into the AWS Bucket. Then, the video is checked frame by frame dynamically with the other existing videos present inside the AWS bucket. And this footage is picked up directly from
  • 3. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3534 CCTV cameras present in the industry, office, etc. for a more secure system. ● If the user is registered, then he will be granted access to enter the premises. And if the user is not registered, an alert will get generated to the security team that he/she is not authorized or not registered. The alert will get generated on a web portal for the Security Team to keep track of the security. ● So, the security team determines whether to allow a person inside or not after the alert is witnessed. If the individual is allowed, then a new user with a new ID is created and the video is saved inside the AWS bucket [25][26]. ● If an unregistered user comes to visit the premises after the working hours, the user will not be allowed inside. The video of the user that is captured will get deleted. However, his/her picture will be captured and the name and the time of the visit will get stored in the database for security purposes Figure 2 - Video-based Approach ● In the video-based approach figure (Fig. 2), the video is checked frame by frame dynamically with the other existing videos present inside the AWS bucket. And this footage is picked up directly from CCTV cameras present in the industry, office, etc. for a more secure system. ● In the existing systems [5], static facial authentication methods are being used. However, a dynamic facial authentication method will be used in the proposed system. 2.1 Mathematical Model Local Binary Pattern (LBP) [29] is a fast and convenient way operator that identifies the pixels in the image by thresholding almost every pixel's neighbourhood as well as considers the outcome as a binary number Algorithm description of LBP: - A more normal description of LBP can be written as: - with the help of xc and yc as central pixel with intensity ip and ic of the neighbour pixel S is sign function defined as: - This definition helps you to capture an image with very fine-grained descriptions. The authors were able to compete for texture classification with state-of-the-art tests. It was noted soon after the operator was written that a fixed neighbourhood fails to encode information that varies in size. Therefore, the operator has been generalized in [AHP04] to use a variable neighbourhood. The idea is to match an arbitrary number of nearest neighbours with a variable radius on a circle, which allows the following neighbourhoods to be captured: For a given point xc and yc, the position neighbour xc, yc, pϵP can be calculated by: - International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3535 where R is the radius of the circle and P is the number of sample points. The LBP operator is by default robust against monotonous gray-scale transformation. By looking at the LBP picture of a digitally transformed image, we can easily notice how an LBP image looks like. 2.2 Results 2.2.1 Face Data set: - OpenCV (Open-Source Computer Vision Library) [30] is also an open-source computer vision and application library for machine-learning. OpenCV was designed to provide a shared computer vision platform and to promote its use of machine perception in commercial applications. As a BSD-licensed software, OpenCV [30] allows the use and modification of the code for companies. OpenCV face recognizer [31] accepts information in a given format to know which face belongs to which person. It has two vectors to it: ● One is a human's face. ● The second is the labels of an integer for each face. In data gathering (Fig. 4), the face is detected in the stored video which is downloaded from the S3 storage provided by the AWS services. Then, 30 images of that detected face are captured, which will get used for training the model. All the 30 images will get stored in the dataset folder with a unique user number and will get uploaded in the database. In the face dataset module (Fig. 3), the process of data gathering is explained which will be required for creating a face dataset. Figure 3 [21] - Face dataset module The steps to create the data set are: 1. Read all the videos from the AWS bucket. 2. Extract unique user ID and also images of the person containing the unique user ID. 3. Read all the person's images, and apply face detection to each of them. 4. Add each face-to-face vector with the unique user ID of the corresponding individual. The data gathering figure (Fig. 4) depicts how the face is detected and how the unique user id is used to store the face dataset. Figure 4 - Data gathering 30 images are captured from the video (Fig. 5). and this is how the face dataset can get stored in the specific user dataset folder, respectively. Figure 5 - Images captured from video In the AWS bucket (Fig. 6), after the dataset folder is created, the entire folder is uploaded to the bucket under the images' folder.
  • 5. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3536 Figure 6 - AWS Bucket 2.2.2 Face training: - OpenCV uses a different type of face recognition method, they are: - 1. Eigenface 2. Fisherface 3. Local binary pattern Histogram (LBPH) In this project, the local binary pattern histogram (LBPH) method has been used. The images which are stored in the dataset folder are then used to train the model which can detect that particular person. In the face training module (Fig. 7), the trainer will get the dataset and the assigned user id for training and storing the data in the trainer.yml file. Figure 7 [21] - Face training module Once the face dataset module is initialized, the Haar cascade trainer will get used to training our model. The training facial dataset (Fig. 8) depicts the process of training, which takes a few seconds to get trained. The time to train depends on the number of images present in the database. Figure 8 - Training facial dataset 2.2.3 Face Recognition: - In the face recognition module (Fig. 9), the system detects the face to check whether the face is detected or not. Then, the system takes the help of the trained model (trainer.yml file) to check from the database whether the person is recognized or not. Figure 9 [21] - Face recognition module In the recognition accuracy figure (Fig. 10), after using the given face dataset, gathered from the uploaded video and trained dataset file, we got the recognition accuracy of 70% from the webcam. The recognition accuracy will increase for higher quality cameras. Figure 10 - 70% Recognition Accuracy The integrated module workflow figure (Fig. 11) shows how all the integrated modules will work together, right from the data gathering of the face dataset to the facial recognition of the person. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3537 Figure 11[21] - Integrated module workflow The table for factors affecting the recognition accuracy (Table 1) shows us about the performance evaluation of our proposed video-based method. Table 1 - Table of factors affecting the recognition accuracy. No. of test images No. of recognize d images Accuracy Remark Dataset1 (30) 30 100% Due to the usage of a higher camera quality. Dataset2 (30) 26 86% Due to lower image quality captured from a general webcam. Dataset 3 (30) 24 80% Due to different illumination conditions captured from a general webcam. Dataset 4 (30) 21 70% Due to different face orientation & lower image quality condition captured from a general webcam. The pie chart for the recognition rate (Fig. 12) is the representation of the average the recognition accuracy rate from Table 1. Here, we get a false rate of 14% on an average because of the low camera quality as well as varying illumination conditions. However, we would easily be able to achieve a false rate of 5% or less with superior camera quality. Figure 12 - Pie chart for the Recognition Rate The bar graph (Fig. 13) is a graphical representation of the factors that affect the recognition accuracy that can be observed in Table 1. Figure 13 - Bar Graph for factors affecting the recognition accuracy 3. CONCLUSION Face authentication technologies have traditionally been associated with extremely expensive, top-secure applications. The core technologies have advanced today and due to innovation and rising processing power, the cost of equipment is dropping dramatically. Many face authentication technology implementations are now cost- effective, dependable, and highly accurate. This system can be used efficiently to provide safe and reliable protection. It can, therefore, be used in many organizations as a key to security solutions, as it can recognize and convey people's identities. Hence, this rectifies the drawbacks of the existing systems. This paper has portrayed a survey related to face authentication. Here, we have surveyed the paper related to existing face authentication systems and their drawbacks. Therefore, there is a need for an efficient security system for facial authentication based on the cons of the existing systems.
  • 7. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3538 REFERENCES [1] A Real-Time Framework for Human Face Detection and Recognition in CCTV Images by Rehmat Ullah, Hassan Hayat, Afsah Abid Siddiqui, Uzma Abid Siddiqui, Jebran Khan, Farman Ullah, Shoaib Hassan, Laiq Hasan, Waleed Albattah, Muhammad Islam, and Ghulam Mohammad Karami in 2022. [2] Face Detection and Recognition Algorithm in Digital Image Based on Computer Vision Sensor by Di Lu and Limin Yan in 2021. [3] Face Recognition and Identification using Deep Learning Approach by KH Teoh, RC Ismail, SZM Naziri, R Hussin, MNM Isa, and MSSM Basir in 2021. [4] Identity authentication on mobile devices using face verification and ID image recognition by Xing Wua, Jianxing Xua , Jianjia Wanga , Yufeng Lia , Weimin Lia and Yike Guo in 2019. [5] A novel optical two-factor face authentication scheme by Gaurav Verma, Dajiang Lu in 2019. [6] Face Authentication method by Julien Doublet and Jean Beaudet in 2018. [7] Face authentication device having database with small storage capacity by Takayuki Kase in 2018. [8] A face recognition Approach Using Deep Reinforcement Learning Approach for User Authentication by Ping Wang, Wen-Hui Lin, Kuo- Ming Chao and Chi-Chun Lo in 2017. [9] An overview of various Authentication Methods and Protocols by Dwiti Pandya, Khushboo Ram Narayan and Sneha Thakkar in 2015 [10] An Automate System for Unconstrained Video- Based Face Recognition by Jingxiao Zheng, Rajeev Ranjan, Ching-hui Chen, Jun-cheng chen, CArols D. Castillo and Rama Chellappa in 2019 [11] A video database of moving face and people by A. J. O’Toole, J. Harns, S. L. Snow, D. R. Hust, M. R. Pappas, J. H. Ayyad and H. Abdi in 2005 [12] “IJB-S: IARPA Janus Surveillance Video Benchmark,” by N. D. Kalka, B. Maze, J. A. Duncan, K. J. O'Connor, S. Elliott, K. Hebert, J. Bryan, and A. K. Jain in 2018. [13] “An all-in-one convolutional neural network for face analysis,” byR. Ranjan, S. Sankaranarayanan, C. D. Castillo, and R. Chellappa, in 12th IEEE FG, vol. 00, May 2017 [14] “Deep face recognition,” by O. M. Parkhi, A. Vedaldi, and A. Zisserman in BMVC, 2015. [15] “Unconstrained face verification using deep CNN features,” by J. C. Chen, V. M. Patel, and R. Chellappa, in WACV, March 2016. [16] “Video Based face association and identification,” byC.-H. Chen, J.-C. Chen, C. D. Castillo, and R. Chellappa, 12th FG, 2017. [17] “Neural aggregation network for video face recognition,” J. Yang, P. Ren, D. Zhang, D. Chen, F. Wen, H. Li, and G. Hua, in CVPR, 2017. [18] “Trunk-branch ensemble convolutional neural networks for video-based face recognition,” by C. Ding and D. Tao in CoRR, 2016. [19] “Face recognition in unconstrained videos with matched background similarity,” by L. Wolf, T. Hassner, and I. Maoz in CVPR, 2011. [20] Face Recognition Based attendance System by Nandhini R, Duraimurugan and S.P.Chokkalingam in 2019. [21] Real-Time Face Recognition: An End-To-End Project by Marcelo Rovai in 2018. [22] IoE-Enabled Smart Embedded System: An Innovative Way of Learning by Rathod A., Ayare P., Bobhate R., Sachdeo R., Sarode S., Malhotra J. in Information and Communication Technology for Sustainable Development. Advances in Intelligent Systems and Computing, vol 933, pp. 659-668, Springer, Singapore in 2020. [23] Redefining smartness in township with Internet of Things & Artificial Intelligence: Dholera city by Raghav B., Manish P., Vasu G., Vishal K., Jyoti M. and Sambhaji S., in 6th International Conference on Energy and City of the Future (EVF’2019), E3S Web of Conferences 170, 06001 IN 2020. [24] Reliable and Prioritized Data Transmission Protocol for Wireless Sensor Networks by S. Sarode, J. Bakal and L. Malik in Proceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing pp 535-544, June 2016. [25] Survey paper on cloud computing security by Nimit Kaura and Abhishek Lal in 2017 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | may 2022 www.irjet.net p-ISSN: 2395-0072
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3539 [26] A Survey Paper on Security in Cloud Computing: A Bibliographic Analysis by Krutika K Shah, Rutvij H Jhaveri and Vahida U Vadiya in 2016. [27] A Survey Paper on Data security in Cloud Computing by Vijay Ghorpade, Vishvajit Dalimbkar and Rajani Sajjan in 2016. [28] A Comprehensive Survey on Security in Cloud Computing by Gururaj Ramachandra Mohsin Iftikhar and Farrukh Aslam Khan in 2017. [29] Face Recognition: Understanding LBPH Algorithm by Kelvin Salton do Prado in 2017. [30] https://opencv.org/about/ [31] OpenCV Face Recognition by Adrian Rosebrock in 2018. [32] Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks by Mohamed Abomhara and Geir M. Køien in 2015.