User Identification Using Face Recognition System
MLA Style:Arti Deshmukh , Prof M.A.Pund"User Identification Using Face Recognition System" International Journal of Computer Trends and Technology 67.5 (2019):155-158.
APA Style: Arti Deshmukh , Prof M.A.Pund (2019) User Identification Using Face Recognition System International Journal of Computer Trends and Technology, 67(5), 155-158.
Abstract
Face Recognition is an important role within the field of applied science and Engineering. Face recognition presents a difficult drawback within the field of image process and pc vision, and in and of itself has received an excellent deal of attention over the previous few years owing to its several applications are present in various domains. lots of algorithms and techniques are planned for determination of face rec. Social Networking has become today’s way and anyone will simply receive data regarding everybody within the world. it’s terribly helpful if a private identity will be obtained from the any device and additionally connected to social networking. Cloud computing technique is a new technology in recent era within the IT trade. In that, characteristic approved user is a major drawback. The user need to access knowledge or services has to be registered and before each access to data or services; his/her identity should be register for authorization. There are many authentication techniques are available which have an various drawback to overcome these drawback we are using Face recognition system using cloud.
Reference
[1] Akshay A. Pawle, Vrushsen P. Pawar “Face Recognition System FRS) on Cloud Computing for User Authentication” International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-3, Issue-4, September 2013.
[2] Dr.S.HariGanesh, S.Ananthi,” Enhancing User Security in Cloud Computing using Colour Palette Scheme (CPS)”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 4 Issue 7, july2015.
[3] Parikshit Prasad, Badrinath Ojha, Rajeev Ranjan shahi, Ratan Lal“3 Dimensional Security in Cloud Computing”, IEEE 2011.
[4] Chenguang Wang and et al,”Study of Cloud Computing Security Based on Private Face Recognition”, IEEE 2010
[5] Cloud Computing FOR DUMMIES by Judith Hurwitz, RobinBloor, Marcia Kaufman, and Fern Halper. WILEY INDIAEDITION
[6] R.Prema1, P.Shanmugapriya2,” A Novel Method for User Authentication on Cloud Computing Using Face Recognition System” International Journal of Data Mining Techniques and Applications Volume 5, Issue 1, June 2016,
[7] Shafagat Mahmudova ,” Analysis of biometric authentication methods of users in clouds”
[8] International Journal of Advanced Engineering and Technology Volume 1; Issue 5; November 2017.
[9] Mrs. S. M. Barhate, Dr. M. P. Dhore ,” User Authentication Issues In Cloud Computing” IOSR Journal of Computer Engineering (IOSR-JCE)
[10] Seyed Milad Dejamfar, Sara Najafzadeh ,” Authentication Techniques in Cloud Computing: A Review” International Journal of Advanced Research in Computer Science and Software Engineering Volume 7, Issue 1, January 2017.
[11] Prajakta D. Patil Vaishali B. Bhagat Pravin D. Soni,Chetan J Shelke,” An Image Based Approach of IRIS Recognition for PersoIdentification usingSegmentation Algorithm”International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 4.
[12] John Canny. A computational approach to edge detection. Pattern Analysis Intelligence, IEEE Transactions on, PAMI-8(6):679–698, Nov. 1986.
[13] www.iosrjournals.org
Keywords
Cloud security, Face Recognition System approved Person.