logo

Use of Viola-Jones Face Detection Algorithm and Image Logging to Enhance Mobile Security

   

Added on  2024-06-25

4 Pages1092 Words124 Views
 | 
 | 
 | 
Writing Proposal Sample for ITC571
Student Name and ID
Project area Security
Project name Use of Viola-Jones face detection algorithm and image logging to enhance mobile security
Keywords Video Frame-based face detection, Lib face detection, Deep learning, Gaussian Mixture Model
Research Type Theoretical and Practical
1. Introduction Background
Information,
Issues, and
Current Solutions
1. Mobile security is the protection of portable computing device from threats and vulnerabilities to
minimize the level of frauds. It is known that image recording is a type of artificial intelligence
technology which emerges as a crucial tool in day to day life. The demand for uncovering and
identification is higher accuracy and advanced speed for the mobile security. The mobile security
faces attacks due to poor coding which creates loopholes. Communication network attacks and OS
attacks which create vulnerabilities. Basically, here an abnormal face defines that which is partly
obstructed by certain irrelevant objects as face cover or others. As it can also bring us some potential
risks, particularly in the mobile security area. Current technologies include lip-based, iris biometric
identification, and smart video frame based detection system is intended for developing a good safety
protection in identifying the ordinary and irregular face in the domain of enhancing mobile security.
Shortcomings/
limitations in the
current /existing
solutions
2. The existing solution includes biometric identification related to face detection which manages
mobile vulnerabilities. But it faces issues related to image error which impact the identification of
the face to maintain security. Illumination issue in an image which impacts identification due to
change in lightface appears differently and pose variation impacts recognition.
The problem of humiliation will occur when the complexity of the neural network will increase. This
technology basically does not predict the user effectively as any of the customers can make a fake
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
Use of Viola-Jones Face Detection Algorithm and Image Logging to Enhance Mobile Security_1

image to unlock the mobile phone.
Importance of
solving this
problem
3. With the presence of Viola face detection algorithm in image logging, early face recognition can
be done. As this will assist in managing the mobile security effectively and efficiently. For this Open
CV can be used for detecting whether the image contains faces which include Harr classifier based
on the Viola-Jones framework. The image logging technique is used for providing high image
resolution with the Borehole image logs, optical image, and KGS- geological image logging. This
face detection outline can easily be used for the mobile security.
2. The Main aims of
this research
1. Aims and purposes of this research project are listed below:
To design an image logging system using the Viola-Jones face detection algorithm for maintaining security
To analyze the mobile characteristic for predicting its security issues effectively and efficiently.
To propose Viola Jones detection algorithm and techniques for improving the mobile security.
3. A Brief Description
of Your Proposal
In this research project, the effective and efficient application of the Viola-Jones faces detection framework for evaluating
the security issues in the mobile phone will be proposed. The role and application of Viola-Jones framework will be
discussed in an effective way. In the basic framework for detection gray-scale processing is used in the image, the lib face
detection will be performed for the face detection.
4. The Processor
Methodology of Your
Project
1) Data gathering and analysis
Identification of security issues in mobile device
The stated topic will be analyzed for identification of issues and problems faced due to the mobile security
issues
Understanding of project methodologies for predicting mobile security issue
2) Data collection and analysis
A literature review will be presented for the current best solution for the identification of the issue
Determining the current best solution
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
Use of Viola-Jones Face Detection Algorithm and Image Logging to Enhance Mobile Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Machine Learning for Face Recognition
|13
|2712
|68

Biometric Authentication Based Scanning for Image-Guided Information Security Through Door Access
|4
|854
|221

Smart Home Automation by Biometrics Assessment 2022
|14
|798
|8

Advanced Computer Science Masters Project
|9
|2174
|50

Privacy and Security Assessment of Automated Facial Recognition System for License Application or Renewal
|8
|1861
|71

ASSIGNMENT | FACIAL RECOGNITION SYSTEMS
|1
|845
|16