Face recognition for e-commerce security

被引:0
|
作者
Wang, W [1 ]
Hui, SC [1 ]
Gao, Y [1 ]
Leung, MKH [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
来源
IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II | 2001年
关键词
face recognition; e-commerce; Internet security; LEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In electronic commerce, it is difficult to verify the buyers identity as his signature cannot be produced on demand. Furthermore, it is easy to impersonate anothers identity by using a stolen credit card number ii-hen making, online payments. Credit card frauds have been reported all over the world. In this paper, we propose a FaceID system to support user verification over the Internet using a face recognition technique, known as the Line Edge Map (LEM). In any e-commerce transactions, the buyers credit card number and face image data captured by a video camera located on the PC are encoded, encrypted and transmitted via the Internet to the FaceID server for verification, At the FaceID server, the face image code associated with the credit card number is retrieved from the face image code database and then matched with the received face image code captured from the buyer using the LEM algorithm. A positive verification gives the go ahead for the intended transaction. The verification results will then be transmitted to the seller for completing the transaction.
引用
收藏
页码:904 / 907
页数:4
相关论文
共 50 条
  • [21] Research on Security Architecture of E-Commerce
    Shen-Zihao
    Wang-Hui
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 185 - 188
  • [22] Mobile E-Commerce Security Architecture
    Wang, Zhuo
    Hu, Ran
    Xu, JianFeng
    2009 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING ( GRC 2009), 2009, : 576 - 579
  • [23] E-commerce security - it's not an Oxymoron !!
    Blanchfield, Dez
    Telecommunication Journal of Australia, 2000, 50 (04)
  • [24] Research on Pharmaceutical E-commerce and Security
    Xie, Ming
    Liao, Youlian
    ADVANCES IN ASIA-PACIFIC LOW CARBON ECONOMY, 2010, : 493 - 496
  • [25] DSP application in E-commerce security
    Hu, JK
    Xi, ZP
    Jennings, A
    Lee, HYJ
    Wahyudi, D
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, : 1005 - 1008
  • [26] Piecemeal security threatens e-commerce
    Graham-Rowe, D
    NEW SCIENTIST, 2000, 165 (2231) : 18 - 18
  • [27] Lightweight security primitives for E-commerce
    Matias, Y
    Mayer, A
    Silberschatz, A
    PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, 1997, : 95 - 102
  • [28] Security and Disturbances in e-Commerce Systems
    Vymetal, Dominik
    Suchanek, Petr
    LIBEREC ECONOMIC FORUM 2011, 2011, : 580 - 589
  • [29] On the E-Commerce System Security Audit
    He Zhen
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2010, : 249 - 254
  • [30] E-commerce Security: a Technical Survey
    Tian, Zhaofu
    Xu, Ningning
    Peng, Wuliang
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 956 - 960