facial recognition for authentication on websites - Project Ideas | Grossarchive.com

Explore Project Topics on: facial recognition for authentication on websites

Related Works

PREFACE This write up tries to review what the theme power Tussle means, this happens mostly every day somewhere, someplace in the word. It can be tussling in who will be in control and this sometime ends up in bloody conflict. This project discussed on balance of power tussle which I represented with two aggressive postures tussling in order to... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 Background of the study Face powder is a cosmetic powder applied to the face to set a foundation after application. It can also be reapplied throughout the day to minimize shininess caused by oily skin. There is translucent sheer powder, and there is pigmented powder. Certain... Continue Reading
FACIAL EXPRESSION IN POWER TUSSLE IN ENUGU STATE (AN ADAPTATION OF CASTING AND METAL CONSTRUCTION TECHNIQUE) PREFACE This write up tries to review what the theme power Tussle means, this happens mostly every day somewhere, someplace in the word. It can be tussling in who will be in control and this sometime ends up in bloody conflict. This project... Continue Reading
ABSTRACT In this project, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on the... Continue Reading
ABSTRACT In this project, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on... Continue Reading
ABSTRACT The offline optical character recognition (OCR) system for different languages has been developed over the recent years. Since 1965, the US postal service has been using this system for automating their services. The range of the applications under this area is increasing day by day, due to its utility in almost major areas of government... Continue Reading
ABSTRACT The offline optical character recognition (OCR) system for different languages has been developed over the recent years. Since 1965, the US postal service has been using this system for automating their services. The range of the applications under this area is increasing day by day, due to its utility in almost major areas of government... Continue Reading
ABSTRACT The offline optical character recognition (OCR) system for different languages has been developed over the recent years. Since 1965, the US postal service has been using this system for automating their services. The range of the applications under this area is increasing day by day, due to its utility in almost major areas of government... Continue Reading
ABSTACT Palmprint recognition has been investigated over ten year years. Palmprint is proven to be distinguishable from other features because of number of attributes. These attributes include color, clarity, position, continuity, length and variation in thickness. Lines are represented in a very efficient way and it needs low storage and... Continue Reading
TABLE OF CONTENTS DECLARATION..........................................................................................................ii ACKNOWLEDGEMENTS............................................................................................. iii... Continue Reading
Abstract Human Computer Interaction now focuses more on being able to relate to human emotions. Recognizing human emotions from speech is an area that a lot of research is being done into with the rise of robots and Virtual reality. In this paper, emotion recognition from speech is done in MATLAB. Feature extraction is done based on the pitch and... Continue Reading
  CHAPTER TWO LITERATURE REVIEW 2.0   INTRODUCTION International Financial Reporting Standards (IFRS) are designed as a common global language for business affairs so that company accounts are understandable and comparable across international boundaries. They are a consequence of growing... Continue Reading
ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and... Continue Reading
ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and... Continue Reading
CHAPTER ONE INTRODUCTION 1.1       Background of the Study A biometric system is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature vector from the acquired data, comparing this feature vector from the... Continue Reading
Counterfeiting is the concern of everyone – the consumers and the manufacturers alike. Drugs counterfeiting has been on the increased, the market is not sought for and the income is on the high side but to the detriment of both the consumers, suppliers and manufacturers. Technology can be of utmost importance in this area via the development of... Continue Reading
ABSTRACT Face recognition and detection is one of the most important fields of the modern applications.  Face recognition system uses two sub-systems named face detection system and image database system.  Face recognition can be of feature based and image based.  Feature based method uses features like skin color, eyes, nose and mouth to... Continue Reading
Counterfeiting is the concern of everyone – the consumers and the manufacturers alike. Drugs counterfeiting has been on the increased, the market is not sought for and the income is on the high side but to the detriment of both the consumers, suppliers and manufacturers. Technology can be of utmost importance in this area via the development of... Continue Reading
NEURAL NETWORK FOR UNICODE OPTICAL CHARACTER RECOGNITION  (CASE STUDY OF DHL, ENUGU) ABSTRACT Optical character Recognition (OCR) refers to the process of converting printed tamil text documents into software translated Unicode tamil text. The printed documents available in the form of books, projects, magazines etc are scanned using standard... Continue Reading
DESIGN AND IMPLEMENTATION OF A COMPUTERISED FACE  DETECTION AND RECOGNITION SYSTEM ABSTRACT A society with accurate and updated database of her citizens will face less crime. Imagine a society where citizens know that their faces and personal details are kept somewhere by the police or other relevant security agencies. The individual will... Continue Reading
ABSTRACT Most ATMs employ one means of authentication (single factor authentication) by using the PIN. These kinds of ATMs are vulnerable to ATM frauds like Card Skimming: where a device placed at the slot for the ATM Card copies all the information stored in ATM cards including the PINs and then copies of the original cards will be made,... Continue Reading
C HAPTER ONE INTRODUCTION          1.1   Background to the Study In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The customers have to form a queue which ends up consuming a lot of consumer’s time and is... Continue Reading
CHAPTER ONE INTRODUCTION 1.1    Background of Study Massive integration of information technology into all aspects of modern life caused demand for processing vehicles as conceptual resources in information systems. Because a standalone information system without any... Continue Reading
ABSTRACT The goal of a network-based IDS is to identify malicious behavior that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network is known as graphical modeling tool used to model decision... Continue Reading
Abstract Android platform has gained popularity in recent years in terms of market share and number of available applications. Android operating system is built on a modified Linux kernel with built-in services such as email, web browser, and map applications. In this paper, automatic number plate recognition (ANPR) was designed and implemented on... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ELECTRONIC VOTING SYSTEM WITH FINGERPRINT AUTHENTICATION CHAPTER ONE BACKGROUND OF STUDY 1.0       Background of the Study Voting theory formally began in the 18th century and ever since, many proposal has been made towards using electronic technologies to improve elections (Sobia, Ummer, Ayesha, Usman, and... Continue Reading
Abstract Individuals on the Autism Spectrum experience some difficult in recognizing and expressing emotions using their faces. This affects their ability to form long-term relationships and leaves them ostracized from others in our society. This project seeks to develop an application that helps children with autism recognise emotions in order to... Continue Reading
ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered... Continue Reading
BIO METRIC  AUTHENTICATION OF AN AUTOMATIC TELLER MACHINE USING FINGERPRINT AND PASSWORD   CHAPTER ONE INTRODUCTION          1.1  Background to the Study In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The... Continue Reading
ABSTRACT Focusing on methods that are used to implement strong user authentication for online-consumer identities, this article aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution... Continue Reading
whatsappWhatsApp Us