06158786
TRANSCRIPT
-
8/13/2019 06158786
1/5
2012 (2012), . 10 12, 2012, ,
Abstract: -A technique of online face authentication has
been proposed which may be used for the user
identification. Pre processing of acquired image has been
accomplished through consecutive steps viz. image
reading and subsequent adjustment of illumination level
and feature extraction from a certain portion of the
clipped image to form a template. Provision for automatic
uploading of the template through internet to remote
server by the client background service has been made.
Eigen values of the clipped block of image, i.e. template
have been calculated and compared with those of alreadysaved image in the remote server in order to authenticate
the received image along with the password of the user.
The present work based on person based authentication
is expected to be less prone to be cracked by the hackers
and has provided a higher recognition rate of the
transmitted images from the client side.
Keywords - Face recognition system, online, SQL
server, ASP, User Identification.
I. INTRODUCTION
Authentication is a significant issue in system control
in computer based communication. Traditional accountbased authentication does not guarantee the identity of
the exact person of the account. This process has the
drawback that it is prone to be easily guessed by an
undesired person. One efficient way of overcome this
problem is to identify the person willing to access on
the basis of face based account. Human facerecognition is an important branch of biometric
verification and has been widely used in many
applications, such as video monitor system, human-
computer interaction, and door control system and
network security. The stand-alone version of face
based system has some application limitations. This
paper presents a design and realization of the online
face based identifying system. Whole system iscontrolled automatically uploads the local face image
to the
back ground face information will be
verified by MatLab code. After client pre-
processing, the client background service
remote server, then, the server background service
starts the recognition task and sends the recognition
result back to the client.
With the development of computer networking
systems, demand of automatic face recognition
system has been increasing rapidly for various
applications such as security and identification, and it
has become an active research area in bio-
informatics. Various methods of online face
recognition [1-3] have been proposed and applied inthe network security [4-6] and the criminal face
image retrieval [7].
Quanbin Li et al. [1] described and validated an
implementation scheme of online face recognition
system. They have used self database and ASP as
front end with illumination compensation, SMQT,
Delphi Algorithm. Hwangjun Song et al. [2] has
presented an online face recognition system through
the Internet. One unique feature has been proposed
by them and the system was based on multiple
frames while other face algorithms use only anoriginal image. Guo-Dong Guo et al [4] has proposed
the AdaBoost algorithm for face recognition. But nostudy on Online Face Authentication based on face
recognition and user identification is not available in
published literature.
An online face recognition system proposed by the
present authors consists of a server and network-
connected clients. The online face recognition system
can be defined as follows. It is a system pre-
processed input face images of the client are
automatically uploaded to the remote server through
the Internet by client background service. Then, the
server background service starts the recognition
process and sends the recognition result back to the
client using certain dynamic web page technology(e.g. ASP). It includes four main aspects viz. face
images acquisition and pre-processing of the data
collected from client; high-speed and reliable
transmission system through the Internet.
Capture
(Preprocessing) Compare Make Decision
Fig. 1: The Biometric Process steps proposed in the present work.
A Proposed Technique of Online Face Authentication to
Be Used For the User IdentificationDibyendu Ghoshal
Electronics and Instrumentation Engineering Department
National Institute of Technology, Agartala, IndiaE-mail: [email protected]
9781457715839/ 12/ $26.00 2012
-
8/13/2019 06158786
2/5
2012 (2012), . 10 12, 2012, ,
Face Detection
We have proposed the Face Based Authentication
System (FBAS). FBAS conducts the authentication
depends on both face image and password. FBAS has
several advantages. First, the account factors of
account based authentication are replaced by face
images. Hence, the identity of the accessing person is
expected to become more secured. Secondly, in the
proposed method, only the face images are not enough
to login, the passwords will also be needed. Thirdly,
the owner of account can be identified by some other
means, but the face images cannot be easily fabricated.
Finally, it has been established
NoFigure 2: Proposed System Ove
that, the password can be utilized to enhance the
authentication rate.
II. SYSTEM OVERVIEW
Fig. 2 represents the system overview of the
proposed scheme of research. It is observed from the
scheme that when a user will sign up to the systemfor the first time, his face will be captured by the
camera which will be processed by Matlab codes in
the background. In case, Matlab codes are able to
recognise a human face, it will extract the region of
face and store it to the face database
Fig 2: Proposed System Overview.
Fig 3: The structure of the proposed online face recognition system.
()()
()()
-
8/13/2019 06158786
3/5
2012 (2012), . 10 12, 2012, ,
as its login identifier along with the password of the
person willing to access. Next time, when the same
user would try to login the system, his face would be
utilised by the server as his login identity. During this
process, his face will be captured and this will be sent
to the server. Then the server would compare the
existing face images already stored in the database
with that of the accessing user and at the same timeusers password would be tried to be matched by the
server. If it is found to be matched with existing
records of the database, the user will be permitted to
login.
III. SYSTEM DESIGN
Fig. 3 shows that the proposed system is fully based on
client server architecture. Client captures several
images, detects the face area of the images, resize and
compress the images if situation demands, and
transmits the resultant image thus obtained through the
Internet. The recognition process is done at server, and
extracted face image is stored in the servers databasefor future reference, and then it sends back the
recognition result to the client.
A. Face Information Databases Design
TABLE 1: IT IS THE TABLE SHOWING THE COMBINATIONOF USER ID AND PASSWORDS.
Face information database on the remote server
mainly contains information as shown in Table 1.
B. Client Design Process
In order to improve transmission efficiency and the
correct recognition rate, the pre-processing comprisesthree steps: first, read the image and subsequent
adjustment of the illumination on the image. Secondly,
the face region would be undergone detection process
and a follow-up clipping operation. Thirdly, the
clipped block of the image thus obtained would be
temporarily stored in the server for any future use.
After pre-processing, Eigen values of the clipped block
of the image will be calculated and compared with the
Eigen values of already saved face images in thedatabase.
In the present study, the background service on the
client/ server are developed based on Delphi
algorithm [11] the execution process of the client
service is given below
// the execution process of the client service
//start service through browser in client side
Detect and start capturing images through web
camera of the client side:
Begin
//Pre-process the captured image and extract face
image
//calculate the eigen value of the captured face
image and compared with eigen values of existing
faces in the database.
//If eigen value does not matched with existing
ones, upload the new face image to remote server
end;
C. Face Authentication on the Server
The PCA (Principal Component Analysis) method
for completing authentication process in the server
has been used in the present work.
C.1: PCA (Principal Component Analysis)
PCA method has been widely used in applications
such as face recognition and image compression.
PCA is a common technique for finding patterns indata, and expressing the data as eigenvector to
highlight the similarities and differences between
different data. The following steps summarize the
PCA process.
1. Let {D1,D2,DM} be the training data set. The
averageAvg is defined by:
2. Each element in the training data set differs from
Avg by the vector Yi=Di-Avg. The covariance matrix
Cov is obtained as:
3. Choose M significant eigenvectors of Cov as
EKs, and compute the weight vectors Wik for each
element in the training data set, where k varies from
1 to M.
Sl. no 1 2
User id
Password 1234 3456
Flags True True
-
8/13/2019 06158786
4/5
2012 (2012), . 10 12, 2012, ,
Using PCA algorithm the following authentication
steps would be followed in the server:
Begin:
// start service through browser in client side.
Detect and start capturing images through web camera
of the client side for login to the system// Pre-process the captured image and extract face
image and calculate the eigen value of the captured
face image and compared with eigen values of existing
faces in the database
// If eigen value does not match with existing ones,
login is failed.
// If eigen value is matched then the system will
check the corresponding password of the user, as the
combination of the user id and password are found
matched then login successfully done otherwise login
would failed.
end;
IV. EXPERIMENT
Experiments have been carried out by the present
authors with the help of the 100 face images collectedfrom the data base provided by the client side. Some
sample face images from the database are shown in
Fig. 4.
Fig. 4: Sample Faces stored in server.
The acquired new images from the client side would be
pre-processed on the client side itself, and the pre-
processing result has been shown in Fig. 5
(a) (b) (c)
Fig. 5: Pre-processing method
(a) original image
(b) marked portion of face region
(c) segment of face
region.
The screenshot of the client side as obtained by the
present method has been shown in Fig. 6. In this
method, the password of the user has been integrated
with the image of the users face to improve the
Fig 6: The screenshot of the Client Side.
recognition rate i.e. to obtain a higher ratio of image
recognition with the total number of the images input
to the system. The acquired face images by the
camera on the client side, and then the individual
password have been sent simultaneously as inputdata to be transmitted through the channel and
ultimately to be processed by the server background
services. If combination of face and password
matches with the data already stored in the server,
then the user is permitted to login the system. The
integration between the recognised image and the
user password takes place at the final stage of login.
The integration process has become obvious from
Fig. 6.
TABLE 2: FACE RECOGNITION RATE (UNDERBALANCED ILLUMINATION, WHITE BACKGROUND ANDFIXED DISTANCE BETWEEN CAMERA AND USER)
Face Orientation Recognition rate
00 98.7 %
18 80.0 %
54 19.2 %
> 700 0 %
Table 2 has shown the variation of the face
recognition rate with respect to the orientation of the
faces. It has been seen that the recognition rate of the
face is maximum when the direction of the face is
perpendicular to the image acquisition system e.g. a
camera.
-
8/13/2019 06158786
5/5
2012 (2012), . 10 12, 2012, ,
V. CONCLUTION
A novel technique has been proposed to authenticate
an user willing to login an account on the basis of
image of the user as well as the password. The
technique has focussed on person based authentication
and has been found to have several advantages. The
factors of account based authentication are replaced by
face images. Hence, the genuine person will only be
allowed to login. In the proposed method only the face
images are not enough to login, the passwords are still
needed. Thus, the system cannot be easily cracked by
simply presenting or inserting a picture of the user in
front of camera. Further it has been shown that the
password is able to be utilized to enhance the
recognition rate significantly.
ACKNOWLEDGMENT
The authors gratefully acknowledge the kind
inspiration provided by the Prof. Dr. P K Bose,
Director National Institute of Technology, Agartala.
DEDICATION
The research work is dedicated to the everlasting
memory of late Ms. Sumita Ghoshal, the only sister of
D. Ghoshal, who herself was a gem of scholar with
unfathomable knowledge and wisdom, beauty and
simplicity.
REFERRENCES
[1] Quanbin Li and Jingao Liu Design and Realization of theOnline Face Recognition System 2009.
[2] Hwangjun Song, Sun Jae Chung, Kyoungwon Min and Hyeok-Koo Jung Online Face Recognition System through theInternet IEEE International Conference on Multimedia andExpo (ICME), pp 1207-1210, 2004.
[3] Yung-Wei Kao, Hui-Zhen Gu, and Shyan-Ming YuanPersonal based authentication by face recognition FourthInternational Conference on Networked Computing andAdvanced Information Management, pp 81-85, 2008.
[4] Guo-Dong Guo and Hong-Jiang Zhang Boosting for Fast FaceRecognisation 2001IEEE.
[5] E.Salvador G. L. Foresti Interactive Reception desk with facerecognition-based access control IEEE 2007.
[6] Ming Gu, Jing-Zhou, Jian-Zhong Li Online Face RecognitionAlgorithm Based On Fuzzy Art Seventh InternationalConference on Machine Learning and Cybernetics, Kunming,pp 556-560, 12-15 July 2008.
[7] ] Margarita Osadchy, Benny Pinkas, Ayman Jarrous, BoazMoskovich SCiFI A System for Secure Face IdentificationIEEE Symposium on Security and Privacy 239-254,2010.
[8] Zhujie, Y.L.Yu, Face Recognition with Eigenfaces, IEEEIntemational Conference on Industrial Technology, pp. 434 -
438, Dec. 1994.
[9] M.A. Turk , A.P. Pentland, Eigenfaces for recognition,Journal of cognitive neuroscience, Vo.3,No.l,1991.
[10] Y. Zhang, C. Liu, Face recognition using kemel principalcomponent analysis and genetic algorithms, IEEEWorkshop on Neural Networks for Signal Processing, 4-6Sept. 2002.
[11] L. Quanbin, H. Chang, and Z. Honggang, AutomaticWebpage Publish System Based on Delphi, ComputerStudy, pp. 6-7. June, 2005.
[12] M.H. Yang, N. Ahuja, and D. Kriegmao, Face recognitionusing kernel eigenfaces, IEEE International Conferenceon Image Processing, Vol.1, pp. 10-13, Sept. 2000.