A facial presence monitoring system for information security

Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural characteristics, the technology has been used to verify the identity of computer or network users. Given today's heightened security requirements of military as well as other applications such as banking, health care, etc., it is becoming critical to be able to monitor the presence of the authenticated user throughout a session. This paper presents a prototype system that uses facial recognition technology to monitor the authenticated user. The objective is to ensure that the user who is using the computer is the same person that logged onto the system. A neural network-based algorithm is implemented to carry out face detection, and an eigenface method is employed to perform facial recognition. A graphical user interface (GUI) has been developed which allows the performance of face detection and facial recognition to be monitored at run time. The experimental results demonstrate the feasibility of near-real-time continuous user verification for high-level security information systems.

[1]  John Chirillo,et al.  Implementing Biometric Security , 2003 .

[2]  Richard E. Smith,et al.  Authentication: From Passwords to Public Keys , 2001 .

[3]  Qinghan Xiao,et al.  Technology review - Biometrics-Technology, Application, Challenge, and Computational Intelligence Solutions , 2007, IEEE Computational Intelligence Magazine.

[4]  P. Jonathon Phillips,et al.  Face Recognition Vendor Test 2002: Technical Appendices , 2003 .

[5]  Kongqiao Wang,et al.  A hierarchical multiscale and multiangle system for human face detection in a complex background using gravity-center template , 1999, Pattern Recognit..

[6]  P. Jonathon Phillips,et al.  Face recognition vendor test 2002 , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).

[7]  Sandeep Kumar,et al.  Using Continuous Face Verification to Improve Desktop Security , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.

[8]  Václav Matyás,et al.  Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..

[9]  Matthew Turk,et al.  Continuous Multimodal Authentication Using Dynamic Bayesian Networks , 2006 .

[10]  Gary R. Bradski,et al.  Real time face and object tracking as a component of a perceptual user interface , 1998, Proceedings Fourth IEEE Workshop on Applications of Computer Vision. WACV'98 (Cat. No.98EX201).

[11]  Stan Z. Li,et al.  Face recognition using the nearest feature line method , 1999, IEEE Trans. Neural Networks.

[12]  Richard Dosselmann,et al.  Automatically Log Off Upon Disappearance of Facial Image , 2005 .

[13]  R. Ramnath,et al.  Physical Access Protection using Continuous Authentication , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[14]  Roberto Sassi,et al.  A fuzzy approach to multimodal biometric continuous authentication , 2008, Fuzzy Optim. Decis. Mak..

[15]  Narendra Ahuja,et al.  Detecting Faces in Images: A Survey , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Paul Reid,et al.  Biometrics for Network Security , 2003 .

[17]  Thomas S. Huang,et al.  Human face detection in a complex background , 1994, Pattern Recognit..

[18]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[19]  Bernadette Dorizzi,et al.  PSO versus AdaBoost for feature selection in multimodal biometrics , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[20]  S. J. Shepherd Continuous authentication by analysis of keyboard typing characteristics , 1995 .

[21]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[22]  Ioannis Pitas,et al.  Rule-based face detection in frontal views , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[23]  Saad Ahmed Sirohey,et al.  Human Face Segmentation and Identification , 1998 .