EYE Blinking For Password Authentication
EYE Blinking For Password Authentication
EYE Blinking For Password Authentication
https://doi.org/10.22214/ijraset.2022.44434
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
Abstract: Personal identification numbers area unit used for user authentication and security. word verification exploitation
PINs requires users to enter a physical PIN, which may be vulnerable to word breakage or hacking via shoulder water sport or
thermal chase. PIN authentication with eye blinks entry techniques, doesn't leave any quite physical footprints behind and
therefore provide a safer word entry possibility. This project presents a time period application to avoid. The personal
identification numbers (PINS) is a common user authentication method for many applications, such as money transaction is
online banking application and automatic teller machine(ATMs).unlocking personal devices ,event centers, shopping malls,
Medical centers, schools/collages and opening Doors.
I. INTRODUCTION
Today, the net has entered into our daily life and all the services are stirred on-line. on the far side reading the news, trying to find
info, and different threat free task, we have conjointly become acquainted with different risk-related work, such as paying
victimization credit cards, checking/composing emails, on-line banking, and so on. whereas we have a tendency to appreciate its
benefits, we have a tendency to square measure putting ourselvesin danger. Eye trailing is that the method of police investigation the
attention location across video frame. The motion of the attention relative to the pinnacle may also be additional interest. Eye
trailing is vital for development and analysis areas like visual systems, psychological analysis, scientific discipline and products
style. An eye trailing system is associate integration of a group of devices and associated programs for mensuration eye positions and
movement, and correlating the results to a similar eye across images non inheritable consecutive over time.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2758
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
D. Title: Drag-and-Type: A New Method for Typing with Virtual Keyboards on Small Touch screens
Author: Taekyoung Kwon, Sarang Na,and Sang-ho Park Some users are experiencing difficulties and also many errors in typing
alphanumeric keys with their thumb. Because small touch screens are widely used in consumer electronics, such as smart phones
and mobile electronic devices. However, typing on the small touch screen is still worth studying. In fact, smart phone users are
experiencing difficulties and also many errors in typing alphanumeric keys with their thumbs because a small virtual keyboard even
with the reduced set of touchable keys can only provide tiny size keys to the users. This paper studies a new style of typing method
called Drag and-Type, which leverages the dragging action instead of direct tapping on the touch screen to ease more accurate
typing on the small virtual keyboard virtual keyboard can only provide tiny size keys. Drag-and- Type, which provides the dragging
action instead of direct tapping on the touchscreen. In existing system we are using keyboard from which the attacker can easily
accessible the password by using shoulder-surfing and thermal attacks. Proposed method could be used for secure and accurate
password entry.
B. Methodology
1) HARR Cascade Face Detection: Haar Cascade is a machine learning object detection algorithm used to identify objects in an
image or video and based on the concept of features proposed by Paul Viola and Michael Jones in their paper "Rapid Object
Detection using a Boosted Cascade of Simple Features" in2001. It is a machine learning based approach where a cascade
function is trained from a lot of positive and negative images. It is then used to detect objects in other images.
2) Creating Integral Images: Integral Images are used to make this super fast.
3) Adaboost Training: Among all these features we calculated, most of them are irrelevant. For example, consider the image
below. Top row shows two good features. The first feature selected seems to focus on the property that the region of the
eyes is often darker than the region of the nose and cheeks. The second feature selected relies on the property that the eyes are
darker than the bridge of the nose. But the same windows applying on cheeks or any other place is irrelevant.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2759
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
So how do we select the best features out of 160000+ features? This is accomplished using a concept called Adaboost which both
selects the best features and trains the classifiers that use them. This algorithm constructs a “strong” classifier as a linear
combination of weighted simple “weak” classifiers.
4) Cascading Classifiers
The cascade classifier consists of a collection of stages, where each stage is an ensemble of weak learners. The weak learners are
simple classifiers called decision stumps. Each stage is trained using a technique called boosting. Boosting provides the ability to
train a highly accurate classifier by taking a weighted average of the decisions made by the weak learners. Each stage of the
classifier labels the region defined by the current location of the sliding window as either positive or negative. Positive indicates that
an object was found and negative indicates no objects were found. If the label is negative, the classification of this region is
complete, and the detector slides the window to the next location. If the label is positive, the classifier passes the region to the next
stage. The detector reports an object found at the current window location when the final stage classifies the region as positive. The
stages are designed to reject negative samples as fast as possible. The assumption is that the vast majority of windows do not
contain the object of interest. Conversely, true positives are rare and worth taking the time to verify.
A true positive occurs when a positive sample is correctlyclassified.
A false positive occurs when a negative sample is mistakenlyclassified as positive.
A false negative occurs when a positive sample is mistakenlyclassified as negative.
To work well, each stage in the cascade must have a low false negative rate. If a stage incorrectly labels an object as negative, the
classification stops, and you cannot correct the mistake. However, each stage can have a high false positive rate. Even if the detector
incorrectly labels a nonobject as positive, you can correct the mistake in subsequent stages. Adding more stages reduces the overall
false positive rate, but it also reduces the overall true positive rate. Cascade classifier training requires a set of positive samples and
a set of negative images. we must provide a set of positive images with regions of interest specified to be used as positive samples.
we can use the Image Labeler to label objects of interest with bounding boxes. The Image Labeler outputs a table to use for positive
samples. we also must provide a set of negative images from which the function generates negative samples automatically. To
achieve acceptable detector accuracy, set the number of stages, feature type, and other function parameters.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2760
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
5) LBPH Face Reorganization: Local Binary Patterns Histogram algorithm was proposed in 2006. It is based on local binary
operator. It is widely used in facial recognition due to its computational simplicity and discriminative power.
• Local binary operator is used for every region. The LBPoperator is defined in window of 3x3.
being the intensity of the the neighbor pixel
Using median pixel value as threshold, it compares a pixel to its8 closest pixels.
• If the value of neighbor is greater than or equal to the central value it is set as 1 otherwise it is set as 0.
•Thus, we obtain a total of 8 binary values from the 8 neighbors.
• After combining these values we get a 8 bit binary number which is translated to decimal number for our convenience.
• This decimal number is called the pixel LBP value and itsrange is 0-255.
• Later it was noted that a fixed neighborhood fails to encode details varying in scale .The algorithm was improved to use different
number of radius and neighbors , now it was known as circular LBP.
• The idea here is to align an arbitrary number of neighbors on a circle with a variable radius.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2761
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
For a given point (Xc,Yc) the position of the neighbor (Xp,Yp), p belonging to P can be calculated.
here R is radius of the circle and P is the number ofsample points.
If a points coordinate on the circle doesn’t correspond to image coordinates, it get’s interpolated generally by bilinear
interpolation.
The LBP operator is robust against monotonic gray scaletransformations.
• After the generation of LBP value histogram of the region is created by counting the number of similar LBP values in the
region.
• After creation of histogram for each region all the histograms are merged to form a single histogram and this is known as
feature vector of the image.
• Now we compare the histograms of the test image and the images in the database and then we return the image with the closest
histogram. ( This can be done using many techniques likeEuclidean distance, chi-square, absolute value etc )
• The Euclidean distance is calculated by comparing the test image features with features stored in the dataset. The minimum
distance between test and original image gives the matching rate.
• As an output we get an ID of the image from the database if the test image is recognised.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2762
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
LBPH can recognise both side and front faces and it is not affected by illumination variations which means that it is more flexible
IV. COMPARISON
The method for entering passwords can be made safe enough using latest method that is eye blinking .User’s can enter the password
by blinking the eye at the suitable symbols in the appropriate order which will make the user’s is invulnerable to shoulder
surfing(observation of user while typing his/her password through the keyboard
A. Proposed System
We are going to propose the three layer security scheme to avoid the shoulder surfing and thermal tracking attacks. Our system
contains the three layers which are 1.Face reorganization, 2. Eye- blink verification, and 3.
OTP by combining all this layers we are going to implement our secure framework to avoid shoulder surfing and thermal tracking
attacks. In our frame works there is no physical entry of password so we are completely avoiding the shoulder surfing and thermal
tracking attacks. For the first layer security we are using Deep Learning algorithm., for the second layer we are using OpenCV.
V. FLOWCHARTS
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2763
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
VI. EXPERIMENT
Figure.6.1.User Registration
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2764
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
Figure.6.4.Identification of user’s face based on the information given while registering with this application
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2765
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
VII. CONCLUSION
A smart-camera based eye-blinking system has been incorporated into a new application for eyelid blinkbased PIN identification,
the PIN identification is accomplished after real- time eye-blinks and eye center computations and recording are completed.
Leakage of the passwords can be overcome by this method . A smart-camera based eye-blinking system has been incorporated into a
new application for eyelid blinkbased PIN identification. The system has been successfully tested with a nine-digit keypad, and can
be extended to character and digit combination password entry.. The stability of the user’s eye blink will affect the accuracy of the
detected pins.
REFERENCES
[1] R. Revathy and R. Bama, "Advanced Safe PIN-Entry Against Human Shoulder-Surfing," IOSR Journal ofComputer Engineering, vol 17, issue 4, ver. II.
pp. 9- 15,JulyAug.2015.(Available:http://www.iosrjournals.org/io sr-jee/papers/Vol17-issue4/Version2/B017420915.pdf) Based Attacks," WOOT '11, pp. 1-8,
August 2011.(Available:https://cseweb.ucsd.edu/kmowery/papers/thermadf)
[2] K. Mowery, S. Meiklejohn and S. Savage, "Heat of theMoment: Characterizing the Efficacy of Thermal Camera-
[3] M. Mehrubeoglu, E. Ortlieb, L.. McLauchlan, L. M.
[4] J. Weaver, K. Mock and B. Hoanca,”Gaze-Based Password Authentication through Automatic Clustering of Gaze Points,” proc.2011 IEEE Conf. on systems,
Man and Cybernetics, Oct 2011(DOI: 10.1109/1CSMC.2011.6084072).
[5] "ATM Fraud, ATM Black Box Attacks SpreadAcross Europe", European ATM SecurityTeam(E.A.S.T.), online, posted 11 April
2017.(Available:https://www.european-at security.eu/tag/atmfraud/) Pham, "Capturing reading patterns throughareal-time smart camera iris tracking
system," Proc. SPIE, vol. 8437, id. 843705,2012.(DOI:10.1117/12.922875).
[6] 2018 IEEE International Conference on Consumer Electronics, Mr Kaustubh.S.Sawant, Mr. Pange P.D has published "Real-time eye tracking for password
authenticationusing gaze based".
[7] Smart Cameras for Embedded Machine Vision,(product information) National Instruments(Available: http://www.ni.com/pdf/products/us/cat ni 1742.pdf).
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2766