Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Dr. Ankita Karale, Aman Tiwari, Anay Wadkar, Aditi Patil, Diptesh Waghulde
DOI Link: https://doi.org/10.22214/ijraset.2022.44214
Certificate: View Certificate
The growing development of the e-commerce market is of great significance in the world. In this online shopping process, the security of personal information and debit card or credit card information increases the popularity of e-commerce and is an important part. This paper provides limited information and is necessary for transferring money by online transactions by securing data and trust of customers. Facial recognition technology identifies a person\'s information through a digital image. It is automatically determined. It is mainly used in security systems. It matches facial recognition from different angles. It is mainly used in airports. It will recognize the face and we can avoid some unwanted fraud by using the facial recognition system. The fundamental gain of face popularity is used for fraud restrict and crime controlling motive due to the fact face pictures which have been archived and recorded, on the way to assist us to perceive someone later. Facial recognition identifies each distinct skin tone on the surface of a human face, such as curves on cheeks, eyes and nostrils, and more. The technology can also be used in very dark conditions and prevent identity theft.
I. INTRODUCTION
In today's technologically advanced world, it's easy to hackers to get personal information of users so some People are afraid to use online transactions. This makes Security as an important factor in the digital age Payments. Therefore, we propose a system to enhance security Transact online by providing a very crucial verification process: OTP verification or by facial recognition.
During the transaction process the system will first verify the users face, if it matches then the transaction will be successfully completed and in case if the users face does not match then an otp will be sent to the user in order to successfully complete the transaction. The system, which we are able to propose, will try and lessen the variety of assaults on the time of creating virtual payments. Online transactions become vulnerable to loss or theft card, account theft, card forgery, fraud applications, multiple footprints and collusion merchants. In the case of account takeover, a card holder unknowingly offers his banking info to a fraudster and the fraudster then makes a replica card with the one’s info. Among the colluding merchants, the employees of Merchants work with scammers. Suggestion system succeed in reducing all these frauds by capturing and verifying Real-time image of the cardholder. Biometric authentication is attracting a lot of attention due to unique to each individual. Several different biometric data authentication is fingerprint, hand geometry, iris, face and Palm. In this paper, we are using face recognition as it’s the most popular, easily usable and widely acceptable. This system uses a computer system, a bank account to perform transactions and identify users. They provide PINs for security purposes. Use the right pin for access. But purchaser now no longer use right pin then now no longer be verified. In many cases, debit or credit cards are lost when unauthorized users can access personal information such as passwords, phone numbers, shared birthday numbers. They easily guess the PIN. So we need to improve security such as strong passwords. But the authorized person easily use the password at that time by facial recognition technology to enhance the security and the user's information is authenticated.
A. What is Face Recognition?
Facial recognition is a technology capable of recognizing or verifying a subject through an image, video or any audio visual element on their face. Generally, this identifier is used to access an application, system or service. This is a method of biometric identification that uses these body measurements, in this case face and head, to verify a person's identity through a pattern and facial biometric data. surname. The technology collects a unique set of biometric data from each person linked to their face and facial expressions to identify, verify and/or authenticate a person. Facial recognition systems are currently used by governments and private companies worldwide.
II. LITERATURE REVIEW
III. METHODOLOGY
In this module, we'll create a dataset that will hold photos of the user alongside the information they've provided. This module makes use of a number of libraries, including cv2 for computer vision, numpy for image arrays, and sqlite3 for database dataset creation. All of the photographs are stored in array format, which means that the pixels of the image are stored as an array. Account.db will be used to store the information. The name of image stored will have id and the name details that are given by the user to the system in its first run.
The module will use the haar cascade algorithm to save the user's photographs using the cascade classifier function of the cv2 module. In this module the picture is taken as input using camera and stored in grayscale which is the format on which LBPH algorithm works on.
When the module is activated, the system will ask the user for their name and ID number. Further using cv2function the module will take input from camera, create a block where it detects face structure using harr cascade algorithm. When a face is detected, a block is created around it, which is subsequently saved in grayscale in the database. This module's code specifies the number of photos to be stored, which is currently set at 51.
This lesson involves training the dataset established in the previous module and exporting the trained data as a.yml file. This modules also uses a lot of libraries which includes cv2 for image processing, os for accessing paths, numpy to modify and classify pixels of images that are stored in the form of an array. Other library used is pil which is Python Imaging Library.
To recognise the image, this module uses a local binary pattern histogram.
In this module, the images in the dataset are trained using the LBPH algorithm, which compares the light and dark contrast of image pixels and then labels them to construct a boundary for all objects in the image.
This is the main module which the client will use actually to get output. In this module, we use the cv2 library to access the real-time input stream from the camera, as well as the numpy library to manipulate the image's array of pixels. The local binary pattern histogram is also used by this module to match the face in the input image.
Local Binary Pattern (LBP) is a very simple and effective texture operator which helps in labelling the pixels in an image by comparing the features of pixels present the neighbour of the pixel we are labelling and if similarities are found then the pixels belong to the same label. In LBPH, labels are made out of binary numbers. To create a prediction, this module now compares the trained LBPH with the real-time image from the camera.
This module delivers two values: the confidence value and the person's id, which the user provided in the first module. It will also provide a confidence value, which will indicate how accurate the machine prediction is by comparing the similarity between the trained image and the person's real-time input image. When a person is recognised and goes to payment, an OTP is given to the registered email id, which must be entered in order for the transaction to be completed successfully. This OTP verification process with pin is used to make payment secure and robust.
IV. SYSTEM ARCHITECTURE
A. Techniques Used
2. Haar Cascade Algorithm (From paper 11): Instead of drawing virtual lines in the picture, this technique creates wavelets. To use this technique on a photograph, it must first be converted to grayscale. In order to create a wave pattern on a single sheet, dark and light hues are taken from various images. When these patterns are combined, a haar wavelet is created, which is used to determine face structure and aid recognition.
3. Neural Network (From paper 13): A neural network is a network or circuit of biological neurons, and in the modern sense, an artificial neural network composed of artificial neurons or nodes. Therefore, a neural network is either a biological neural network composed of biological neurons, or an artificial neural network for solving artificial intelligence (AI) problems.
V. EXISTING SYSTEM
A basic multi-factor authentication setup consists of asking a user for their login and password (which they already know) and then verifying their identity with a second factor, such as an SMS message sent to their phone (something they have). That covers two authentication factors, but adding photo recognition to the mix offers an extra layer of protection without making the login procedure too complex or annoying for authorised users. Many banks employ picture recognition as part of their multi-factor authentication procedure so that their clients may securely access their accounts and authorise different financial activities. On the web, picture recognition authentication is great for combating phishing attempts in which a website imitates your bank's look and feel.
VI. PRPOSED SYSTEM
Figure 3. Data Flow Diagram
A data flow diagram (DFD) depicts the flow of data across an information system graphically. A DFD provides a high-level overview of the system without getting into too much detail.
The system's flow is as follows:
VII. RESULTS
A. Learning Rate (0.0001)
Learning rate is the training parameter that controls the size of weight and bias changes during learning.
In the below graph x-axis stands for images whereas y-axis stands for IOU.
After conducting the above experiments with respect to training parameter Iterations, the optimal value was found to be- Number of training iterations:800000 For training below 800000 iterations, the network was found to predict fewer bounding boxes with less accuracy. Hence, the optimal number of training iterations was concluded to be as 800000.
VIII. ACKNOWLEDGMENTS
We would like to express my special thanks of gratitude to my Project guide “Dr. Ankita Karale” for her guidance and support that he gave to us for completing this projects. The insights provided to us by her were very useful in successful completion of this project. I would also like to thank all the panel members for their thoughts and help they gave during reviews for improvement in the project.
The project was created to make payment more convenient. The project is based on the Python programming language\'s OpenCv module. In this project we have successfully created a database of face images of user and the details of user’s account and registered phone number, trained it using LBPH algorithm and Haar cascade classifier. For the payment process, an OTP is sent to the registered email id after the machine recognizes the user. For further security OTP is backed by pin verification.
[1] Savvides, Marios, BVK Vijaya Kumar, and Pradeep K. Khosla. \"Cancelable biometric filters for face recognition.\" Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on. Vol. 3. IEEE, 2004. [2] Q. Yin, X. Tang, and J. Sun, “An associate predict model for face recognition,” in IEEE Conference on Computer Vision and Pattern Recognition, June 2011, pp. 497–504. [3] R.S.Choras. “Facial feature detection for face authentication,” in the Proceeding of IEEE Conference on Cybernetics and Intelligent Systems., 2013, pp.112-116. [4] S.Liao, A. K. Jain, and S. Z. Li, “Partial face recognition: Alignment free approach,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. [5] pp. 1193–1205,2013.5. ICIIBMS 2015, Track1: Signal Processing, Computer Networks and Telecommunications, Okinawa, Japan 978-1-4799-8562-3/15/$31.00 ©2015 IEEE Enhancing User Authentication of Online Credit Card Payment using Face Image Comparison with MPEG7-EdgeHistogram Descriptor. [6] 2016 Online International Conference on Green Engineering and Technologies (IC-GET). A Robust and secure authentication mechanism in online banking. [7] Proc. of the 2017 IEEE Region 10 Conference (TENCON), Malaysia, November 5-8, 2017.Credit Card Fraud Detection Based on Transaction Behavior. [8] 2017 IEEE: Fast and Efficient Implementation of Convolutional Neural Networks on FPGA Abhinav Podili, Chi Zhang, Viktor Prasanna. [9] 2017 20th International Conference of Computer and Information Technology (ICCIT), 22-24 December, 2017 Convolutional Neural Network Approach for Vision Based Student Recognition System. [10] 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications Facial Expression Recognition via Deep Learning. [11] Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication. Real time Implementation of Face Recognition System, Authors: Neel Ramakant Borkar; Sonia Kuwelkar. [12] 2017 IEEE 2nd International Conference on Signal and Image Processing A Real-time Face Recognition System Based on the Improved LBPH Algorithm. Xue Mei Zhao, ChengBingWei. [13] Research on face recognition using deep learning, Authors: Xiao Han; Qingdong Du .IEEE2018. [14] IEEE Access 2020. A Review of Face Recognition Techniques, Authors: Lixiang Li; Xiao hui Mu; Siying Li; Haipeng Peng. [15] International Conference on Communication and Signal Processing, July 28 - 30, 2020,India. Study on Face Recognition Techniques, Authors: Madhusmita Sahu; Rasmita Dash. [16] Proceedings of the Second International Conference on Innovative Mechanisms for Industry Applications (ICIMIA 2020) . Face Detection and Recognition System Using Digital Image Processing, Authors: Gurlove Singh; Amit Kumar Goel. [17] Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020) IEEE . LBPH Algorithm for Frontal and Side Profile Face Recognition on GPU. [18] Y. Lee & D. Son, “The Effect of Reliability and Innovation Resistance on the Switching Value of Fintech Service”, The Journal of Internet Electronic Commerce Research, (2019), Vol. 19, No. 6, pp.75-88. [19] H. Jang, “A Study on Personal Authentication Technology Using Multiple Biometrics method”, Dankook University Graduate School, (2019).
Copyright © 2022 Dr. Ankita Karale, Aman Tiwari, Anay Wadkar, Aditi Patil, Diptesh Waghulde. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET44214
Publish Date : 2022-06-13
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here