- Sharmila Sengupta and Arpita Bhattacharya and Pranita Desai and Aarti Gupta 2012. Automated Lip Reading Technique for Password Authentication. International Journal of Applied Information Systems. 4, 3 (September 2012), 18-24. DOI=http://dx.doi.org/10.5120/ijais450677
-
@article{10.5120/ijais2017451568, author = {Sharmila Sengupta and Arpita Bhattacharya and Pranita Desai and Aarti Gupta}, title = {Automated Lip Reading Technique for Password Authentication}, journal = {International Journal of Applied Information Systems}, issue_date = {September 2012}, volume = {4}, number = {}, month = {September}, year = {2012}, issn = {}, pages = {18-24}, numpages = {}, url = {/archives/volume4/number3/281-0677}, doi = { 10.5120/ijais12-450677}, publisher = { xA9 2010 by IJAIS Journal}, address = {} }
-
%1 450677 %A Sharmila Sengupta %A Arpita Bhattacharya %A Pranita Desai %A Aarti Gupta %T Automated Lip Reading Technique for Password Authentication %J International Journal of Applied Information Systems %@ %V 4 %N %P 18-24 %D 2012 %I xA9 2010 by IJAIS Journal
Abstract
As technology is starting to conquer every strata of the society, the war for protecting confidential data from being intercepted is growing intense by the hour. Biometric- security stands out as the most secure form of authentication in high security zones such as defense, space missions and research head-quarters. Today, forms of password-protection range from face-recognition to retina -scan. Here, we develop a system for recognizing and converting lip movement of an individual into a recognized pattern which is set as a password for the system using image-processing. This system is also a break-through for providing people with motor-disabilities a robust and easy way of protecting their data. By capturing and tracing the successive movement of lips during speech, the corresponding word can be detected. The captured images are represented as points on a two-dimensional flat manifold that enables us to efficiently define the pronunciation of each word and thereby analyze or synthesize the motion of the lips. The motion of lips helps us track the word syllable-by-syllable. With multiple levels of image processing, it becomes possible to set the matching parameters to a very close value, hence not allowing any brute-force or other infamous hacking techniques to break into the user's system. This lip reading technique also serves applications in areas where communication via direct speech is not possible.
References
- Jui-Cheng Yen and Jiun-In Guo, "A new image encryption algorithm and its VLSI architecture," in Proc. IEEE workshop Signal Processing Systems, 1999,pp. 430-437.
- I. Ozturk, I. Sogukpinar, "Analysis and comparison of image encryption algorithm," Journal of transactions on engineering, computing and technology December, vol. 3,2004,p. 38.
- M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS'02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vison System, 2002.
- S. S. Manicaam. , G. Nikolaos, and Bourbakis, "Lossless image compression and encryption using SCAN," Journal of Patterns Recognition, vol. 34, no. 6, 2001, pp. 1229-1245.
- S. Kumar, D. K. kumar, M. Alemu, and M. Burry, "EMG based voice recognition," In Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004.
- G. Gravier A. Garg G. Potamianos, C. Neti and A. W. Senior, "Recent Advances in the automatic recognition of audio-visual speech," Proc. Of the IEEE, vol. 91,2003.
- K. Otani, and T. Hasegawa, "The image input microphone- A new nonacoustic speech communication system by media conversion from oral motion images to speech," IEEE journal on Slected Areas in Communications, vol. 13,no. 1, pp. 42-48, January1995.
- Duchnowski, P. , Hunke, M. , Bsching, D. , Meier, U. , and Waibel,A. 1995. Toward movement-invariant automatic lipreading and speech recognition. In Proc. ICASSP'95, pp. 109–112.
- Michal Aharon, Ron Kimmel, Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction, International Journal of Computer Vision 67(3), 297–312, 2006.
- Mohammad Ali Bani Younes and Aman Jantan,Image Encryption Using Block-Base Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
- Bregler, C. , Hild, H. , Manke, S. , and Waible, A 1993. Improving connected letter recognition by lip reading. In proc. IEEE Int. Conf. on ASSP, pp. 557-560.
- Dinesh Kumar Jain N. ; Palaniswamy N, Raaja Sarabhoje, G. Enhanced Blowfish algorithm using bitmap image pixel plotting for security improvisation, 2nd International Conference on Education Technology and Computer (ICETC), 2010.
Keywords
Lip-reading, lip-contour, syllable tracking, silent-password, threshold analysis, image encryption