CFP last date
16 December 2024
Reseach Article

Automated Lip Reading Technique for Password Authentication

by Sharmila Sengupta, Arpita Bhattacharya, Pranita Desai, Aarti Gupta
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 3
Year of Publication: 2012
Authors: Sharmila Sengupta, Arpita Bhattacharya, Pranita Desai, Aarti Gupta
10.5120/ijais12-450677

Sharmila Sengupta, Arpita Bhattacharya, Pranita Desai, Aarti Gupta . Automated Lip Reading Technique for Password Authentication. International Journal of Applied Information Systems. 4, 3 ( September 2012), 18-24. DOI=10.5120/ijais12-450677

@article{ 10.5120/ijais12-450677,
author = { Sharmila Sengupta, Arpita Bhattacharya, Pranita Desai, Aarti Gupta },
title = { Automated Lip Reading Technique for Password Authentication },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2012 },
volume = { 4 },
number = { 3 },
month = { September },
year = { 2012 },
issn = { 2249-0868 },
pages = { 18-24 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number3/281-0677/ },
doi = { 10.5120/ijais12-450677 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:47:09.313881+05:30
%A Sharmila Sengupta
%A Arpita Bhattacharya
%A Pranita Desai
%A Aarti Gupta
%T Automated Lip Reading Technique for Password Authentication
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 3
%P 18-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As technology is starting to conquer every strata of the society, the war for protecting confidential data from being intercepted is growing intense by the hour. Biometric- security stands out as the most secure form of authentication in high security zones such as defense, space missions and research head-quarters. Today, forms of password-protection range from face-recognition to retina -scan. Here, we develop a system for recognizing and converting lip movement of an individual into a recognized pattern which is set as a password for the system using image-processing. This system is also a break-through for providing people with motor-disabilities a robust and easy way of protecting their data. By capturing and tracing the successive movement of lips during speech, the corresponding word can be detected. The captured images are represented as points on a two-dimensional flat manifold that enables us to efficiently define the pronunciation of each word and thereby analyze or synthesize the motion of the lips. The motion of lips helps us track the word syllable-by-syllable. With multiple levels of image processing, it becomes possible to set the matching parameters to a very close value, hence not allowing any brute-force or other infamous hacking techniques to break into the user's system. This lip reading technique also serves applications in areas where communication via direct speech is not possible.

References
  1. Jui-Cheng Yen and Jiun-In Guo, "A new image encryption algorithm and its VLSI architecture," in Proc. IEEE workshop Signal Processing Systems, 1999,pp. 430-437.
  2. I. Ozturk, I. Sogukpinar, "Analysis and comparison of image encryption algorithm," Journal of transactions on engineering, computing and technology December, vol. 3,2004,p. 38.
  3. M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS'02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vison System, 2002.
  4. S. S. Manicaam. , G. Nikolaos, and Bourbakis, "Lossless image compression and encryption using SCAN," Journal of Patterns Recognition, vol. 34, no. 6, 2001, pp. 1229-1245.
  5. S. Kumar, D. K. kumar, M. Alemu, and M. Burry, "EMG based voice recognition," In Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004.
  6. G. Gravier A. Garg G. Potamianos, C. Neti and A. W. Senior, "Recent Advances in the automatic recognition of audio-visual speech," Proc. Of the IEEE, vol. 91,2003.
  7. K. Otani, and T. Hasegawa, "The image input microphone- A new nonacoustic speech communication system by media conversion from oral motion images to speech," IEEE journal on Slected Areas in Communications, vol. 13,no. 1, pp. 42-48, January1995.
  8. Duchnowski, P. , Hunke, M. , Bsching, D. , Meier, U. , and Waibel,A. 1995. Toward movement-invariant automatic lipreading and speech recognition. In Proc. ICASSP'95, pp. 109–112.
  9. Michal Aharon, Ron Kimmel, Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction, International Journal of Computer Vision 67(3), 297–312, 2006.
  10. Mohammad Ali Bani Younes and Aman Jantan,Image Encryption Using Block-Base Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
  11. Bregler, C. , Hild, H. , Manke, S. , and Waible, A 1993. Improving connected letter recognition by lip reading. In proc. IEEE Int. Conf. on ASSP, pp. 557-560.
  12. Dinesh Kumar Jain N. ; Palaniswamy N, Raaja Sarabhoje, G. Enhanced Blowfish algorithm using bitmap image pixel plotting for security improvisation, 2nd International Conference on Education Technology and Computer (ICETC), 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Lip-reading lip-contour syllable tracking silent-password threshold analysis image encryption