Facial Periocular Region based Unique ID Generation and One to One Verification for Security Documents

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.
Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django

Abstract—Security documents like certificates, hall tickets, passport, license etc. need protection from impersonation. Nevertheless such valuable documents contains individual’s name, address and in some cases a photo as a means of personal identification, criminal impersonation is an easy task. Hence it demands a system which authenticates the owner of the document using his or her personal biometric features. Though Fingerprint is considered to be the most cost effective method for personal identification, the credibility of such technology has been questioned due to the easily reproducible attacks. This paper proposes a novel cost effective and efficient method of creating a unique ID based on the feature points extracted from the facial periocular region of an individual. The unique ID thus generated is converted to QR code and it is printed in the security documents for one to one verification. The developed method is analyzed for finding out the typical performance parameters

3 years ago


DOWNLOAD


Related Topics

ALZHEIMER’S DISEASE DIAGNOSTICS BY ADAPTATION OF 3D CONVOLUTIONAL NETWORK

ABSTRACT :Early diagnosis, playing an important role in preventing progress and treating the Alzheimer’s disease (AD), is based on classi?cation of features extracted from brain images. The features have to accurately capture main AD-related variations of anatomical brain structures, such as, e.g...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Laravel
  • Django
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation

Abstract—Personalized recommendation is crucial to help users ?nd pertinent information. It often relies on a large collection of user data, in particular users’ online activity (e.g., tagging/rating/checking-in) on social media, to mine user preference. However, releasing such user activity data...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Laravel
  • Django
Proposed Anonymous Authentication Scheme for Academic Service in the University

Abstract— The paper discusses about anonymous authentication system for academic service in the university. The anonymous authentication system is proposed to apply in the university to protect the students’ identity when they report academic misconduct in the university system. Generally the sys...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Laravel
  • Django
  • Android
Student Learning Context Analysis by Emotional Intelligence with Data Mining Tools

The emotions of human in every part of a life are usual and unavoidable. The emotions uplift or cast down a person facing different situations in each moment. The main objective of this research work is to provide learning with emotional-based approach and to analyze the result using data mining ...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Laravel
  • Django
  • Android
Complementary Aspect-based Opinion Mining

Abstract—Aspect-based opinion mining is ?nding elaborate opinions towards a subject such as a product or an event. With explosive growth of opinionated texts on the Web, mining aspect-level opinions has become a promising means for online public opinion analysis. In particular, the boom of variou...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Laravel
  • Django
  • Android