Mobile Phone Security using Automatic Lip Reading

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 944

فایل این مقاله در 5 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ECDC09_058

تاریخ نمایه سازی: 25 بهمن 1394

چکیده مقاله:

During the recent years mobile phones’ usage and their application in the everyday life has increased dramatically. Therefore the modern methods of security in mobile phone applications are highly regarded especially in mobile banking applications. In this paper, a novel security method is introduced in which a password is received using visual information processing from the user’s lips. Phone Camera can provide the ability to track user’s lip motion using lip reading algorithms to recognize the security words like passwords. Mobility in mobile phones has led to a change in ambient light. In this research, a method has been proposed to solve light change challenges in mobile phones. Finally an m-commerce android application is designed and implemented using this technique. The application recognizes passwords using automatic lip reading and checks whether the password is correct or not. If password is correct, the user can open his/her bank application. The reliability of this method is evaluated comparing with the traditional method of password protection in mobile phones.

نویسندگان

Fatemeh Sadat Lesani

PhD student in Qom university, Department of Information Technology and Computer Engineering University of Qom Qom, Iran

Rouhollah Dianat

Department of Information Technology and Computer Engineering University of Qom Qom, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • L. Lamport, "Password Authentication with Insecure C ommunication", In: Comm. ...
  • Longyan Gong, Jingxin Pan, Beibei Liu, Shengmei Zhao, "A novel ...
  • Mikhail Khitrov, Talking passwords: voice biometrics for data acces and ...
  • Dhamija, R., Perrig, A., 2000. Deja vu: "A user study ...
  • Brostoff, S., Sasse, M.A., 2000. "Are passfaces more usable than ...
  • _ _ _ _ Human-C omputer Interaction International (HCII) ...
  • Jansen, W.A., 2003. "Authenticating users on handheld devices". In: Canadian ...
  • Jansen, W.A, 2004. "Authenticating mobile device users through image selection". ...
  • _ _ _ System Sciences [1]Dave G, Chao, X., & ...
  • De Santos Sierra. A, C. Sanchez Avila, A. M endazaOrmaza, ...
  • _ _ _ Heidelberg, Networked Digit ...
  • Matthews, et al., "Extraction of visual features for lip reading". ...
  • Lee, N., et al., "Facial Landmark Extraction for Lip Tracking ...
  • Young-Un, K., K. Sun-Kyung, and J. Sung-Tae. "Design and implementation ...
  • نمایش کامل مراجع