Open Access Open Access  Restricted Access Subscription or Fee Access

Soft Biometrics Based on Continuous Authentication for Standalone Workstation

G. Keerthana, P. Mahalakshmi, M. Nandhini, B. Devendar Rao

Abstract


The conventional authentication system only requests the user to provide the authorized account and password to log into the system once they start to use a computer or a terminal. However, under this authentication framework, the machine can only recognize the user’s identity from the login information. It lacks the information to know who is using it. The common drawback of the one-time authentication system, which people use in the daily life, is that when the user leaves the seat for a short break, i.e., to get some documents or have a drink, anyone can sneak up to the computer and pretend to be the authorized user to access their data, or do anything under a fake identity. Later on, nobody will know who used the computer. This kind of security defect is not acceptable in some applications with the sensitive data, for example, the banking financial record or the customer personal information, the military industry, and the business confidentiality. To avoid this disadvantage soft biometrics is used. Hence the project suggests the use of Soft biometrics for user identification .Only an authorized user can login, user id and password is used in the computer application.  As soon as the login process is completed soft biometrics start functioning. In soft biometrics a webcam is used that functions in the background. A webcam continuously takes the image of the person in real time and segregates the face from the whole image. Once the face is identified it keeps track of the face. Viola Jones algorithm is used to detect the face with various postures such as movement of face, etc.  The identification can also be done even with spectacles and beard and mustaches. This greatly improves the authentication process. Whenever a person moves away from his place the soft biometrics fails and looks for face. If it’s not able to find face within a short time it immediately locks the computer.


Keywords


Continuous Authentication (CA), Viola Jones Algorithm, Face Detection,

Full Text:

PDF

References


Raja JeyaSekhra, Palaiyappan ,’A Block Based Novel Digital Video watermarking Scheme Using DCT’, IOSR journal of Electronics and Communication Engineering, volume 5 issue 2 (March – April 2013), pp. 34-44, 2013.

Sonjoy Deb Roy, Xin Li, Yonatan Shoshan, Alexander fish, Orlyyadid-Pischt,’Hardware Implementation of Digital watermarking system for Video authentication’, IEEE Transactions on Circuits and System for Video Technology, volume 23, number 02, February 2013.

Shaalini, C.Shanmugam, International Journal of Advanced Research in ComputerScience and Software Engineering 3(12), Volume 3, Issue 12 December- 2013, pp. 1070-1077.

Shih - Chia Huang An Advanced Motion Detection Algorithm with VideoQuality Analysis for Video Surveillance Systems in the IEEE Transactions onCircuits and Systems for Video Technology, Vol. 21,No.1, January 2011.

T.Deepika , Dr.P.Srinivasa Babu,Motion Detection In Real-Time Video Surveillance with Movement Frame Capture And Auto Record in International Journal of Innovative Research in Science, Engineering and Technology An ISO 3297: 2007 Certified Organization, Volume 3, Special Issue 1, January 2014

Nishu Singla Motion Detection Based on Frame Difference Method in International Journal of Information and Computation Technology ISSN 0974-2239Volume 4, Number 15 (2014), pp. 1559-1565.

Hezbollah Mohammadian, Elaheh Esfandiarijahromi, Leili Esmailani, OptimizationReal-Time Tracking of Moving Objects Based on Differential and Active Blob in International Conference on Intelligent Systems (ICIS’2012)Penang (Malaysia) May 19-20, 2012.

A. Altinok and M. Turk, “Temporal integration for continuous multimodal biometrics,” in Proc. Workshop on Multimodal User Authentication, 2003, pp. 131–137.

T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous verificationusing multimodal biometrics,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 687–700, Apr. 2007.

A. Azzini, S. Marrara, R. Sassi, and F. Scotti, “A fuzzy approach tomultimodal biometric continuous authentication,” Fuzzy Optimal DecisionMaking, vol. 7, pp. 243–256, 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.