Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Ayushi Srivastava
DOI Link: https://doi.org/10.22214/ijraset.2022.46621
Certificate: View Certificate
To give physically handicapped and disabled persons a platform where they may set up a safe, personal account that only they can access. This method would make it possible for people with motor limitations to communicate with technology, and it would also boost authentication somewhat over typing in a code. This concept offers a catchphrase and lessens the use of modern hardware sensors. The primary goal of this initiative is to prevent fraud from occurring in government or bank zones. Comparatively speaking, eye trackers offer more security than any biometric identification. Eye trackers are the tools used to gauge visual activity. Users who are physically impaired may now use their eyes to communicate with computers thanks to this. This method aims to offer an authentication procedure that includes physically challenged individuals for everyone, including children and the elder people.
I. INTRODUCTION
In the fields of pattern recognition and computer vision, face identification has been a hot topic for research. It has a wide range of possible uses, including security, credit cards, surveillance, and passports. Several techniques have been put forth in recent years. The complexity of facial pictures in the field of face recognition necessitates a significant amount of computation time for categorization. By lowering the visual data's size, classification and subsequent recognition time may be slashed.
As is well known, the 21st century has seen significant support for advancements in authentication and authorisation technologies. Since the late 1990s, personal identification numbers (PINs) have been utilised extensively for user authentication and security. We prefer to use a different strategy these days because PIN codes are so simple to hack. On the other side, PIN authentication using hands-free gaze-based PIN input techniques leaves no physical traces and so provides a more secure password entering alternative.
The term "gaze-based authentication" refers to locating the eyes across successive frames of a picture and monitoring their centres over time. Morse code will be used for password authentication, with dots and dashes serving as the representation of integers. With the use of a smart camera, this model shows a real-time application for gaze-based PIN entering as well as eye recognition and tracking for PIN identification.
The main objective of this project is to create a secure system to authenticate users who are not partially blind and to create a secure password authentication system which uses Morse code and to ensure that the required parts of the face are recognized accurately by the system. The user's user id and password are required to log in after registration. The PIN is input via a webcam and is converted to Morse with the help of this. In the backend, the entered PIN is checked with the stored PIN which was entered into the database by the user while registering. If the entered PIN isn't correct, its exits the screen. If the entered PIN is correct, it displays successful authentication.
II. LITERATURE SURVEY
It suggests a Smart Eye monitoring device that is intended for the elderly and persons with impairments. The idea behind this study is to use eye movement to communicate with caregivers and operate wheelchairs and appliances. The image processing module[5], wheelchair control module, appliance control module, and SMS management module are the four parts that make up this system. The eye movement picture is taken and sent to the Raspberry Pi microcontroller for processing using OpenCV[4] in order to determine the coordinate of the eyeball. It presents a study that seeks to quickly recognise eye-ball movement patterns using the brain's brain machine interface (BMI)[1], which is thought to be an artefact of electroencephalograms (EEGs). We looked at the repeatability of eye movement ERP and the qualities that include constant, high voltage, and a 50ms quick response. This study suggests three techniques for extracting and identifying distinctive patterns brought on by various directional ocular motions as an ERP pattern discriminator.
We recently constructed a robot that can move in accordance with the motions of the eyeballs and can be activated with specific actions based on the eye blinks through the description of some of the projects. It finds measurements of a real master tennis player's and a novice tennis player's eye movements are suggested. The players' recorded eye movements are contrasted and examined. An eye-tracker is used to record the eye movements[7]. The main finding of this research is that newcomers have a propensity to momentarily pursue the tennis ball.
It suggests that many children with ADHD exhibit low academic performance. Due to their lack of focus and poor interpersonal skills, they also struggle in their social lives, which frequently lasts into adulthood.
This concept is interesting and uses less of the modern hardware sensors than usual. Here, in order to strengthen security, we employ gaze-based authentication and a mouse click to turn numbers or alphabets into source code[18]. It suggests that many children with ADHD exhibit low academic performance. Due to their lack of focus and poor interpersonal skills, they also struggle in their social lives, which frequently lasts into adulthood. This research proposes a solution to the issue by introducing and showcasing the advantages of a novel kind of therapy[10]: an eye-contact game that effectively makes use of mixed reality technology. The technique is based on the signs of Haar, a collection of variously shaped black and white rectangular masks. The method sums the brightness of each pixel in the picture that is covered by the black and white portions of the mask before calculating the difference between these values. Any machine-learning technique may be used to assess the effectiveness of neural networks and can solve the issues brought on by more challenging data sets. One of the security criteria of general terminal authentication systems is that they be simple, quick, and dependable since people are most comfortable with the face authentication techniques that they use on a regular basis utilising traditional knowledge approaches like passwords.
This approach has been offered as a two-layered safety security framework to safeguard PIN number[11]s, where users may input the password with the appropriate eye points using Morse code. However, these techniques are not secure since malevolent observers can watch them. Eye blinking-based safety systems offer a potential system safety and usability solution since eye blinking is a natural manner of engagement. PINs are often used in many different contexts, such as ATMs, the authorization of electronic transactions, and the opening of doors and personal devices. Even when PIN authentication is employed, such as in financial systems and gateway management, authentication is frequently a problem[13]. It enabling those who are physically disadvantaged or disabled to create a secure, personal account that only they can access. It alludes to the widely used computer solutions[14]. The two biggest misunderstandings around cloud technology are data protection and privacy protection. Different strategies have been used to provide dependable data security in the cloud[12]. Morse code was one of the original forms of communication, but due to mobile communications, it is now seldom used. Perhaps none of us are more familiar with this gaze-based technique than someone who can tap Morse codes with his fingers.
III. PROPOSED METHODOLOGY
The model comprises of a back database and an interface. The user may interact with the system thanks to the GUI. In order to create it, Pygame or OpenCV are used. The user initially had to register in the frontend by giving their preferred user ID, a password (PIN), and a keyword. The user's user id and password are required to log in after registration. The PIN is input via a webcam and is converted to Morse with the help of this. In the backend, the entered PIN is checked with the stored PIN which was entered into the database by the user while registering. If the entered PIN isn't correct, its exits the screen. If the entered PIN is correct, it displays successful authentication . If the user has forgotten his password then he can use the keyword to authenticate and update the prevailing password with a replacement one. Gaze-based authentication refers to finding the eye location across sequential image frames, and tracking eye center over time. Password authentication will done using Morse code, where numbers will be represented in dots and dashes. This model presents a real-time application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a smart camera.
A. Facial Landmark detection
The landmark detection method identifies important regions in a picture of a human face. We have demonstrated the detection of emotion through facial movements, gaze direction, face alteration (facial swap), graphical face increase, and puppeteering of virtual characters. To do this, you must locate several places on the landmark detector's face, including the corners of the lips, eyes, jaws, and many more. OpenCV has a large number of designed and implemented algorithms.
The landmark detection method identifies important regions in a picture of a human face. We have demonstrated the detection of emotion through facial movements, gaze direction, face alteration (facial swap), graphical face increase, and puppeteering of virtual characters.
To do this, you must locate several places on the landmark detector's face, including the corners of the lips, eyes, jaws, and many more. OpenCV has a large number of designed and implemented algorithms.
B. Applications
C. HAAR Cascade Detection
According to Paul Viola and Michael Jones' work "Recent purchases utilising the Cascade of Enlarged Artefacts," the purchase using the Haar-Platform is a useful technique for item discovery. In a machine learning process, Cascade's work is taught by several positives and negatives. Then, items are discovered in other images. The algorithm first needs a lot of positive photos (facial photographs) and negative photos (faceless pictures). Then, we must draw out its functions. Now, numerous functions are computed using all kernel sizes and locations. To compute each component, we must get the total of the pixels beneath the black and white squares. They provided an essential solution in their illustration, however many of the traits we have described are ineffective. According to Paul Viola and Michael Jones' work "Recent purchases utilising the Cascade of Enlarged Artefacts," the purchase using the Haar-Platform is a useful technique for item discovery.
IV. IMPLEMENTATION
A. Proposed Algorithm
In essence, our project offers two factors for authentication. Essentially, two authentication factors offer two security levels to safeguard a system or account. In order to strengthen security, we employ gaze-based authentication and click mouse to transform numbers or alphabets into source code. Additionally, this effort aids disabled individuals in self-authentification. People of all ages who have a rudimentary understanding of Morse code can utilise this approach. We attempt to incorporate facial recognition for every user with the Morse Virtual Keyboard eye- blink to input the password as a further advancement.
[1] P.K.Paul and M.K.Ghose, “Cloud computing: possibilities, challenges and opportunities with special reference to its emerging need in the academic and working area of Information Science,” In Procedia Engineering, vol. (23), pp.2222-2227, Jan 2012. [2] Kandukuri, Balachandra Reddy, and Atanu Rakshit, “Cloud security issues,” InServices Computing, 2009. SCC\'09. IEEE International Conference on IEEE, pp. 517-520, Sep 2009. [3] L. Adleman, “Molecular computation of solutions to combinational problems”.American Association for the Advancement of Science, pp.1021-1024, 1994. [4] Rachna.A, and Anshu.P, “Maintaining Data Confidentiality and Security over Cloud: An Overview”, International Journal of Engineering Research and Applications (IJERA), Vol. (4), pp.1922-1926, July 2013. [5] D. Sureshraj and Dr. V.Murali Bhaskaran, Automatic DNA Sequence Generation for Secured Effective Multi-Cloud Storage, Journal of Computer Engineering (IOSR-JCE), vol.15, pp. 86-94, Nov-Dec 2013. [6] Ito, T., Shinji, T., Sumiya, H., Baba, M. “Eye movement-related EEG potential pattern recognition for real-time BMI”, Ibaraki Univ., Hitachi, Japan, IEEE,2010. [7] Seongki Kim, JinHo Ryu, Youngchyul,Choi, YooSeokKang, HongleLi, Kibum Kim, “Eye- Contact Game Using Mixed Reality for the Treatment of Children With Attention Deficit Hyperactivity Disorder”, South Korea ,IEEE,March 2020. [8] A. G. Rassadin, A. S. Gruzdev, and A. V. Savchenko, “Group-level emotion recognition using transfer learning from face identification,” arXiv preprint arXiv:1709.01688, 2017. [9] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 815–823. [10] D. Wang, C. Otto, and A. K. Jain, “Face search at scale,” IEEE transactions on pattern analysis and machine intelligence, vol. 39, no. 6, 2017, pp. 1122– 1136. [11] C.-H. Yang, L.-Y. Chuang, C.-H. Yang, and C.-H. Luo, “Morse code application for wireless environmental control systems for severely disabled individuals,” IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 11, no. 4, pp. 463–469, Dec 2003. [12] J. Weaver, k. Mock and b. Hoanca, “gaze-based password authentication through automatic clustering of gaze points,” proc. 2011 ieee conf. On systems, man and cybernetics, oct. 2011. (doi: 10.1109/icsmc.2011.6084072). [13] C.-H. Luo and C.-H. Shih, “Adaptive morse-coded single-switch communication system for the disabled,” International Journal of BioMedical Computing, vol. 41, no. 2, pp. 99–106, 1996. [14] C. P. Ravikumar and M. Dathi, “A fuzzy-logic based morse code entry system with a touch- pad interface for physically disabled persons,” in Proceedings of the IEEE Annual India Conference (INDICON), Dec 2016. [15] K. Mowery, s. Meiklejohn and s. Savage, “heat of the moment: characterizing the efficacy of thermal camera-based attacks,” woot ’11, pp. 1-8, august 2011. [16] Mukherjee, K., & Chatterjee, D. (2015, January). “Augmentative and Alternative Communication device based on eye-blink detection and conversion to Morse-code to aid paralyzed individuals”. In 2015 International Conference on Communication, Information & Computing Technology (ICCICT) (pp. 1-5). IEEE. [17] G. N. Aly and A. M. Sameh, “Evolution of recurrent cascade correlation networks with distributed collaborative species,” in Proceedings of the First IEEE Symposium on Combinations of Evolutionary Computation and Neural Networks, 2000, pp. 240– 249. [18] J. Liu, Y. Deng, T. Bai, Z. Wei, and C. Huang, “Targeting ultimate accuracy: Face recognition via deepembedding,” arXiv preprint arXiv:1506.07310, 2015. [19] R. Li, M. Nguyen, and W. Q. Yan, “Morse codes enter using finger gesture recognition,” in Proceedings of the International Conference on Digital Image Computing: Techniques and Applications (DICTA), Nov 2017. [20] R. Revathy and R. Bama, “advanced safe pin-entry against human shoulder-surfing,” iosr journal of computer engineering, vol 17, issue 4, ver. Ii, pp. 9- 15, july-aug. 2015.
Copyright © 2022 Ayushi Srivastava. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET46621
Publish Date : 2022-09-04
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here