System for Devices mobile based in recognition facial
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency and was implemented in iOS platform. The cell phone is used for a host of activities is therefore necessary maintain secure information. One of the ways is through the recognition and fingerprint biometric facial features, etc. We propose not only the recognition of patterns biometrics; also added recognition of basic emotional states. Thereby providing a new form security for access to cell is achieved.
Authors and Affiliations
Rodolfo Romero Herrera , Jesus Yalja Montiel Perez , Laura Mendez Segundo
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
Analysis of Tolerance and Sleep Time in Sleep Mode Scheduling Energy Saving Technique in Time Division Multiplexing Passive Optical Networks
Huge energy resources (electricity) are consumed by the telecom-equipments in broadband enable access technologies. There is current need to minimize the energy consumption in access network technologies especially in pa...
Comparative Analysis of Digital Image Watermarking Techniques - SVD based Algorithms in Different Wavelet Domains
The aim of digital watermarking is to hide some secret information or logo into the multimedia content for protecting the content from unauthorized access or illegal use. Digital image watermarking is a promising domain...
Query Optimization in Object-Oriented Database Management Systems: A short review
Object-oriented database systems began developing in the mid-80’s out of a necessity to meet the requirements of applications beyond the data processing applications which were [are] served by relational database systems...