EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 3

Automated Lip Reading Technique for Password Authentication

journal image
 Download
1725
  • Sharmila Sengupta and Arpita Bhattacharya and Pranita Desai and Aarti Gupta 2012. Automated Lip Reading Technique for Password Authentication. International Journal of Applied Information Systems. 4, 3 (September 2012), 18-24. DOI=http://dx.doi.org/10.5120/ijais450677
  • @article{10.5120/ijais2017451568,
    author = {Sharmila Sengupta and Arpita Bhattacharya and Pranita Desai and Aarti Gupta},
    title = {Automated Lip Reading Technique for Password Authentication},
    journal = {International Journal of Applied Information Systems},
    issue_date = {September 2012},
    volume = {4},
    number = {},
    month = {September},
    year = {2012},
    issn = {},
    pages = {18-24},
    numpages = {},
    url = {/archives/volume4/number3/281-0677},
    doi = { 10.5120/ijais12-450677},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450677
    %A Sharmila Sengupta
    %A Arpita Bhattacharya
    %A Pranita Desai
    %A Aarti Gupta
    %T Automated Lip Reading Technique for Password Authentication
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 18-24
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

As technology is starting to conquer every strata of the society, the war for protecting confidential data from being intercepted is growing intense by the hour. Biometric- security stands out as the most secure form of authentication in high security zones such as defense, space missions and research head-quarters. Today, forms of password-protection range from face-recognition to retina -scan. Here, we develop a system for recognizing and converting lip movement of an individual into a recognized pattern which is set as a password for the system using image-processing. This system is also a break-through for providing people with motor-disabilities a robust and easy way of protecting their data. By capturing and tracing the successive movement of lips during speech, the corresponding word can be detected. The captured images are represented as points on a two-dimensional flat manifold that enables us to efficiently define the pronunciation of each word and thereby analyze or synthesize the motion of the lips. The motion of lips helps us track the word syllable-by-syllable. With multiple levels of image processing, it becomes possible to set the matching parameters to a very close value, hence not allowing any brute-force or other infamous hacking techniques to break into the user's system. This lip reading technique also serves applications in areas where communication via direct speech is not possible.

References

  1. Jui-Cheng Yen and Jiun-In Guo, "A new image encryption algorithm and its VLSI architecture," in Proc. IEEE workshop Signal Processing Systems, 1999,pp. 430-437.
  2. I. Ozturk, I. Sogukpinar, "Analysis and comparison of image encryption algorithm," Journal of transactions on engineering, computing and technology December, vol. 3,2004,p. 38.
  3. M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS'02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vison System, 2002.
  4. S. S. Manicaam. , G. Nikolaos, and Bourbakis, "Lossless image compression and encryption using SCAN," Journal of Patterns Recognition, vol. 34, no. 6, 2001, pp. 1229-1245.
  5. S. Kumar, D. K. kumar, M. Alemu, and M. Burry, "EMG based voice recognition," In Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004.
  6. G. Gravier A. Garg G. Potamianos, C. Neti and A. W. Senior, "Recent Advances in the automatic recognition of audio-visual speech," Proc. Of the IEEE, vol. 91,2003.
  7. K. Otani, and T. Hasegawa, "The image input microphone- A new nonacoustic speech communication system by media conversion from oral motion images to speech," IEEE journal on Slected Areas in Communications, vol. 13,no. 1, pp. 42-48, January1995.
  8. Duchnowski, P. , Hunke, M. , Bsching, D. , Meier, U. , and Waibel,A. 1995. Toward movement-invariant automatic lipreading and speech recognition. In Proc. ICASSP'95, pp. 109–112.
  9. Michal Aharon, Ron Kimmel, Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction, International Journal of Computer Vision 67(3), 297–312, 2006.
  10. Mohammad Ali Bani Younes and Aman Jantan,Image Encryption Using Block-Base Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
  11. Bregler, C. , Hild, H. , Manke, S. , and Waible, A 1993. Improving connected letter recognition by lip reading. In proc. IEEE Int. Conf. on ASSP, pp. 557-560.
  12. Dinesh Kumar Jain N. ; Palaniswamy N, Raaja Sarabhoje, G. Enhanced Blowfish algorithm using bitmap image pixel plotting for security improvisation, 2nd International Conference on Education Technology and Computer (ICETC), 2010.

Keywords

Lip-reading, lip-contour, syllable tracking, silent-password, threshold analysis, image encryption

Index Terms

Computer Science
Information Sciences