Banking locker security using Image processing
-
Upload
arpana-shree -
Category
Technology
-
view
283 -
download
0
description
Transcript of Banking locker security using Image processing
![Page 1: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/1.jpg)
Banking Locker Security
Arpana Shree
Department of MCA
Mount Carmel College
Bangalore
![Page 2: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/2.jpg)
Agenda
• Draw back of current technology
• Problem analysis model
• About hidden image scanner
• Algorithm overview
• Conclusion
![Page 3: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/3.jpg)
What goes wrong???
• Theft can take variety of forms
- Insider
- Outsider
![Page 4: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/4.jpg)
AnalysisAnalysis
Problem Analysis Model
Problem DomainProblem Domain
SolutionSolution
![Page 5: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/5.jpg)
Problem Domain
• Draw Back of alarm & CCTV technology- Locker not secured
• Draw Back of RFID technology- Passwords Hacking
![Page 6: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/6.jpg)
SolutionSolution
Problem DomainProblem Domain
Analysis
AnalysisAnalysis
![Page 7: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/7.jpg)
Analyzing the problem
• Usage of security tokens– Hardware/software
• Usage of 2FA
• Image scanning technology - Current trend being implemented
![Page 8: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/8.jpg)
SolutionSolution
Problem DomainProblem Domain AnalysisAnalysis
Solution
![Page 9: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/9.jpg)
Image scanning technology
• Uses a scanner
• Hidden scanner is being fixed
• Theft may not be aware of the hidden Scanner
• Face detection algorithm is used
![Page 10: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/10.jpg)
Example
Tiger
![Page 11: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/11.jpg)
Face detection algorithm
Cb Part of the input image (fig-1)
Cr Part of the input image (fig-2)
![Page 12: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/12.jpg)
The likely hood of the skin regions (fig-3)
Likelihood=exp[-0.5(X-M) c^-1 (X-M)]
whereX=P(r,b)^T
M=Mean value of X C=Covariance of X
![Page 13: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/13.jpg)
Image after thresholding
(fig-4)
Using adaptive threshold the Skin regions are highlighted effectively
![Page 14: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/14.jpg)
Template face used to verify the existence of face in skin region (fig-5)
Face boundary for the given image (fig-6)
![Page 15: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/15.jpg)
Continued
• The detected face is given as a input as a dimension 100X100 to Eigen face recognition system.
• The output will be of the dimension 100X1
![Page 16: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/16.jpg)
Conclusion
• Image scanner implementation in banking locker security reduces 75% of hacking
• One of the emerging trend in IT industry
• Implemented in abroad Countries
![Page 17: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/17.jpg)
Government website navigation page
www.clerk.house.gov/member_info/cong.aspx
![Page 18: Banking locker security using Image processing](https://reader036.fdocuments.in/reader036/viewer/2022062319/5552ed5bb4c90587048b47d5/html5/thumbnails/18.jpg)
THANK YOU!!!