The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A 3D image can be used for the authentications as it gives more accuracy. We can also use the gestures for the authentication purpose. We can add multiple authentication levels together to make system more secure and login process more reliable. In our system we are going to provide three levels of authentication i.e. 1) Text Password:-This is first level in which user has to enter the text password...
3D reconstruction of human faces is of high importance in applications like forensics, facial features based human tracking and realistic reconstruction of human faces in virtual reality applications. The published algorithms so far require either a large number of views of a human face or a 3D facial reference model. This paper proposes a technique for 3D human face reconstruction using only five...
Light field cameras are emerging as powerful devices to capture rich scene representations that provide unique advantages for analysis and representation purposes. Some recent works have shown the power and usefulness of the richer information carried out by light field imaging, notably for face recognition. However, it is still difficult to fully assess how face recognition technology can benefit...
This paper presents a face recognition algorithm based on Local Binary Pattern (LBP) to be implemented in a Smartphone with Android operating system where the input image is obtained using the camera of such Smartphone. The LBP algorithm is used for Face characterization, due to its low complexity and its robustness light of this method is chosen to be applied in a Smartphone, this is because the...
360 Video has become popular in recent years, as commercial interests in deploying Virtual Reality (VR) applications rise. This type of video is usually captured using multi-camera arrays, such as the GoPro Omni camera rig. After separate video streams are captured from multiple cameras, image stitching is applied to obtain a spherical representation of the scene, which spans 360 degrees horizontally...
Spoofing is an act to impersonate a valid user of any biometric systems in order to gain access. In a face biometric system, an imposter might use some fake masks that mimic the real user face. Existing countermeasures against spoofing adopt face texture analysis, motion detection and surface reflection analysis. For the purpose of face anti-spoofing analysis, skin structure is a key factor in achieving...
Emotion recognition has many useful applications in daily lives. In this paper, we present a potential approach to detect human emotion in real time. For any face detected in camera, we extract the corresponding facial landmarks and examine different kinds of features and models for predicting human emotion. The experiments show that our proposed system can naturally detect human emotion in real time...
This work examines feature level fusion for protected biometric templates in a multi-biometric authentication system for smartphones. The modalities incorporated by the system are face and the left-right periocular region. The fusion methods considered are concatenation of the templates obtained from the three modalities, and combining the three templates using a simple XOR operation by varying the...
In this paper, we introduce an approach for robot head mechanism using a parallel mini-manipulator model to establish a highly efficient multiple angle view functionality for robot vision systems. In order to demonstrate the abilities of the structure, we implement the well-known Eigenfaces and Haarcascade algorithms for real-time tracking, localizing, and recognizing problems on human-robot interaction...
Recently we have present a simple, fast method for measuring pulse rate by using an embedded device with a basic webcam. Since that the Photoplethysmography(PPG) theory is more and more mature, we can apply independent component analysis (ICA) on the color channels in video recordings which can extract the blood volume pulse from the facial regions. We analyzed several factors that could influence...
Attendance automation has become one of the most important needs in educational institutions and work places across the world, since it saves time and accurate too. Face recognition system needs least human cooperation and is viable too. The system automatically detects the student's entry in the class and marks attendance for the particular student periodically. The data collected can be used by...
In this paper, a new method for mapping textures onto a 3D model produced by a multi-view reconstruction pipeline is proposed. A Markov Random Field (MRF) is constructed so as to define each triangle face as a node. An optimal labeling is estimated by globally minimizing an energy function defined on the MRF using graph cuts algorithms. This labeling assigns exactly one view to each triangle face...
To predict criminal acts and to assure more security, the biometric remote recognition of people has lately been getting much interest among researchers. We propose in this paper to use biometric modalities that may be acquired remotely, which are the gait and the face. The gait is explored at 11 different angles of view with different styles of clothes using the CASIA Gait Datasets A and B. For the...
In this paper, we propose a video-based indoor positioning system (VIPS) to provide centimeter-grade localization for the Internet of Things (IoT). The VIPS system integrates installed surveillance cameras with the IoT to provide highly-accurate positioning information to indoor people, which efficiently enables microlocation-aware IoT applications and services in smart environments. VIPS can estimate...
The goal of this project is to build an android based application for the mini-brain stroke victims to help them in detection and remediation of brain stroke. This application helps the user to recover from the after effects of the stroke which includes difficulties in speaking, upper limb movement and memory. The application also helps in the detection of brain stroke by automating the F.A.S.T technique...
This project implements a system that automatically evaluates a dance performance against a gold standard and provides a scorecard to the performer in the form of a graph with suggestions for improvement. The system acquires the motion of the performer via joint detection. A camera is used to capture the front view of the dancer. The video is then fed to the system that breaks it into frames. Eight...
Presentation attacks (a.k.a, direct attacks or spoofing attacks) against face recognition systems have emerged as a serious security threat. To mitigate these attacks on conventional face recognition systems, several Presentation Attack Detection (PAD) algorithms have been developed, which address various Presentation Attack Instruments (PAI) including 3D face masks, 2D photo, wrap photo and electronic...
The paper proposes an intelligent K-means segmentation algorithm that clearly segments foreground objects and completely occluded objects. When a person completely occludes an object while entering into the area of video surveillance, it is considered as an anomaly. The paper comes up with a robust technical solution to address this. The proposed algorithm chooses an optimal value for K and segments...
Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments...
In this work, we focused on liveness detection for facial recognition system's spoofing via fake face movement. We have developed a pupil direction observing system for anti-spoofing in face recognition systems using a basic hardware equipment. Firstly, eye area is being extracted from real time camera by using Haar-Cascade Classifier with specially trained classifier for eye region detection. Feature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.