Biometric Authentication System on Mobile Personal Devices
#1

[attachment=11799]
Biometric Authentication System on Mobile Personal Devices
ABSTRACT

• We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network.
• The system consists of the following five key modules:
1. face detection;
2. face registration;
3. illumination normalization;
4. face verification; and
5. information fusion.
• For the complicated face authentication task on the devices with limited resources, the emphasis is largely on the reliability and applicability of the system.
INTRODUCTION
• In a modern world, there are more and more occasions in which our identity must be reliably proved.
• But what is our identity?
• Most often, it is a password, a passport, or a social security number. The page link between such measures and a person, however, can be weak as they are constantly under the risk of being lost, stolen, or forged.
• Biometrics, the unique biological or behavioral characteristics of a person, e.g., face, fingerprint, iris, speech, etc., is one of the most popular and promising alternatives to solve this problem.
• In this project, we study the biometric authentication problem on a personal mobile device (MPD) in the context of secure communication in a personal network (PN).
• A PN is a user centric ambient communication environment for unlimited communication between the user and the personal electronic devices.
• And also, we developed a secure, convenient, and low cost biometric authentication system on the MPD for the PN.
• The biometric that we chose is the 2-D face image, taken by the low-end camera on the MPD.
• The only requirement in using this system is that the user presents his or her face in a more or less frontal way within the capture range of the camera.
• User in the PN
REQUIREMENTS
• Three requirements of the biometric authentication system:
1. security;
2. convenience; and
3. complexity
BIOMETRIC AUTHENTICATION
• Growing interest in biometric authentication
• National ID cards, Airport security, Surveillance, Site access.
• Face recognition offers several advantages over other biometrics:
• Can be used without subjects knowledge.
• Human readable media.
• No association with crime, as with fingerprints.
• Data required is easily obtained and readily available.
AUTHENTICATION TYPES
• There are two types of authentication in the MPD scenarios:
1. Authentication at logon time and
2. Authentication at run time.
• In addition to logon time authentication, run time authentication is also important because it can prevent unauthorized users from taking an MPD in operation and accessing confidential user information from the PN.
AUTHENTICATION STEPS
• There are 5 steps in the authentication process:
1. Face detection
2. Face registration
3. Illumination normalization
4. Face verification
5. Information fusion
• Diagram of the biometric authentication system on the MPD
FACE DETECTION METHODS
• Face detection methods can be categorized into the following two large groups:
1. Heuristic-based methods and
2. Classification-based methods.
• Exhaustive set of candidates at any location and scale of the input image, where x is the basic classification unit to be classified
• (Left) Typical face images taken from ordinary handheld PDA , with the size 320 × 240. (Right) Downscaled face images with the size 100 × 75. Equally good face detection results can be obtained in both the original and the downscaled images
• Comparison of the false acceptance models.
(a) Original detections.
(b) Conventional probabilistic model.
© Proposed model with errors
• Original images from data base for illumination normalisation
• Histogram-equalized images
• Images filtered by the original LBP
• Images filtered by the simplified LBP
• Distributions of the two classes for the face detection case and the face verification case
• Limitations
• Comparison of the ROCs using different illumination normalization methods
• Output
ADVANTAGE
• Cost is low for hardware and software requirements.
APPLICATIONS
• It is widely used in the security applications like:
1. National ID cards,
2. Airport security,
3. Surveillance, and
4. Site access
CONCLUSION
• Face verification on the MPD provides a secure page link between the user and the PN.
• The series of solutions to the five modules proves to be efficient and robust. In addition, the different modules collaborate with each other in a systematic manner.
• The final system achieves an equal error rate of 2%, under challenging testing protocols.
Reply
#2
Smile 
Here is the ppt for first review :-)
Reply
#3



To get more information about the topic " Biometric Authentication System on Mobile Personal Devices" please refer the page link below
http://studentbank.in/report-biometric-a...al-devices
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: face verification for mobile personal devices ppt, pdf seminar report on biometric authentication, mpd 85404 19288, ppt on mobile eeg based biometric authentication, mobile eeg based biometric authentication system ppt, biometric authentication locker system ppt, biometric authentication seminar paper,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  biometric voting system ajukrishnan 10 16,281 25-04-2016, 11:45 AM
Last Post: dhanabhagya
  Home appliance & pc Cursor control by mobile phone (DTMF) smart paper boy 3 3,553 21-05-2015, 03:16 PM
Last Post: seminar report asees
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 66 34,340 01-08-2014, 09:47 PM
Last Post: seminar report asees
  advanced mobile phone signal jammer for gsm cdma and 3g networks with prescheduled ti shilpa16 1 1,678 28-10-2013, 12:17 PM
Last Post: ShayneThill
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,356 20-09-2013, 10:52 AM
Last Post: computer topic
  Android Mobile Security – An Issue of Future computer girl 2 2,390 24-08-2013, 10:26 AM
Last Post: computer topic
  SOLAR AUTOMATIC MOBILE CHARGER WITH PAY SYSTEM seminar class 13 11,129 12-07-2013, 11:28 AM
Last Post: computer topic
  MOBILE NUMBER PORTABILITY pavan457 38 30,772 29-04-2013, 10:36 AM
Last Post: computer topic
  mobile fraud detection full report project topics 7 7,285 03-03-2013, 02:22 PM
Last Post: Guest
  mobile phone cloning full report project topics 19 31,972 08-02-2013, 09:40 PM
Last Post: Guest

Forum Jump: