{"title":"基于局部二值模式直方图的Web人脸认证系统","authors":"","doi":"10.46632/daai/3/1/21","DOIUrl":null,"url":null,"abstract":"The objective of the project is to Detect and Recognize Human Facial Features via a Camera. The basic concept of this project is:- To convert the input image to HSV format to extract the binary image and additionally remove the noise from binary image using morphological operations and finally then contours are used to segment out the region of interest and further the region is analyzed to get the final result. While biometric data is generally considered one of the most reliable authentication methods, it also carries significant risk. That’s because if someone’s credit card details are hacked, that person has the option to freeze their credit and take steps to change the personal information that was breached. What do you do if you lose your digital ‘face’? Around the world, biometric information is being captured, stored, and analyzed in increasing quantities, often by organizations and governments, with a mixed record on cybersecurity. A question increasingly being asked is, how safe is the infrastructure that holds and processes all this data? As facial recognition software is still in its relative infancy, the laws governing this area are evolving (and sometimes non-existent).","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Local Binary Pattern Histogram Based Web Facial Authentication System\",\"authors\":\"\",\"doi\":\"10.46632/daai/3/1/21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The objective of the project is to Detect and Recognize Human Facial Features via a Camera. The basic concept of this project is:- To convert the input image to HSV format to extract the binary image and additionally remove the noise from binary image using morphological operations and finally then contours are used to segment out the region of interest and further the region is analyzed to get the final result. While biometric data is generally considered one of the most reliable authentication methods, it also carries significant risk. That’s because if someone’s credit card details are hacked, that person has the option to freeze their credit and take steps to change the personal information that was breached. What do you do if you lose your digital ‘face’? Around the world, biometric information is being captured, stored, and analyzed in increasing quantities, often by organizations and governments, with a mixed record on cybersecurity. A question increasingly being asked is, how safe is the infrastructure that holds and processes all this data? As facial recognition software is still in its relative infancy, the laws governing this area are evolving (and sometimes non-existent).\",\"PeriodicalId\":226827,\"journal\":{\"name\":\"Data Analytics and Artificial Intelligence\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Data Analytics and Artificial Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.46632/daai/3/1/21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data Analytics and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46632/daai/3/1/21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Local Binary Pattern Histogram Based Web Facial Authentication System
The objective of the project is to Detect and Recognize Human Facial Features via a Camera. The basic concept of this project is:- To convert the input image to HSV format to extract the binary image and additionally remove the noise from binary image using morphological operations and finally then contours are used to segment out the region of interest and further the region is analyzed to get the final result. While biometric data is generally considered one of the most reliable authentication methods, it also carries significant risk. That’s because if someone’s credit card details are hacked, that person has the option to freeze their credit and take steps to change the personal information that was breached. What do you do if you lose your digital ‘face’? Around the world, biometric information is being captured, stored, and analyzed in increasing quantities, often by organizations and governments, with a mixed record on cybersecurity. A question increasingly being asked is, how safe is the infrastructure that holds and processes all this data? As facial recognition software is still in its relative infancy, the laws governing this area are evolving (and sometimes non-existent).