Face recognition for e-commerce security

被引:0
|
作者
Wang, W [1 ]
Hui, SC [1 ]
Gao, Y [1 ]
Leung, MKH [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
来源
IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II | 2001年
关键词
face recognition; e-commerce; Internet security; LEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In electronic commerce, it is difficult to verify the buyers identity as his signature cannot be produced on demand. Furthermore, it is easy to impersonate anothers identity by using a stolen credit card number ii-hen making, online payments. Credit card frauds have been reported all over the world. In this paper, we propose a FaceID system to support user verification over the Internet using a face recognition technique, known as the Line Edge Map (LEM). In any e-commerce transactions, the buyers credit card number and face image data captured by a video camera located on the PC are encoded, encrypted and transmitted via the Internet to the FaceID server for verification, At the FaceID server, the face image code associated with the credit card number is retrieved from the face image code database and then matched with the received face image code captured from the buyer using the LEM algorithm. A positive verification gives the go ahead for the intended transaction. The verification results will then be transmitted to the seller for completing the transaction.
引用
收藏
页码:904 / 907
页数:4
相关论文
共 50 条
  • [31] A framework for analyzing e-commerce security
    Kesh, Someswar
    Ramanujan, Sam
    Nerur, Sridhar
    Information Management and Computer Security, 2002, 10 (04): : 149 - 158
  • [32] Study on Security Framework in E-Commerce
    Tao, Lu
    Xue, Lei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3541 - 3544
  • [33] Security: important issue in e-commerce
    Zahra, Ahmadi-Brooghani
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 23 - +
  • [34] E-commerce Security: Classifications and Arts
    Raheem, Osamah Adil
    2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 1 - 3
  • [35] Security issues in e-commerce: An overview
    Ahmadi-Brooghani, Zhara
    International Review on Computers and Software, 2010, 5 (05) : 575 - 580
  • [36] Research on E-Commerce Security Issues
    Wen, Yuanqiao
    Zhou, Chunhui
    Ma, Juan
    Liu, Kezhong
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 186 - +
  • [37] Sicherheitstechnologien für E-Commerce 2000Security technologies for e-commerce 2000
    R. Fleck
    e&i Elektrotechnik und Informationstechnik, 2000, 117 (6) : 411 - 416
  • [38] Study on the Security and Trust Issues of E-commerce
    Wen, Xiaosen
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 191 - 194
  • [39] Integrated e-commerce security model for websites
    Alfadli, Ibrahim
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (04): : 106 - 113
  • [40] Study on the Information Security based on E-Commerce
    Meng, Yu-qiao
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 437 - 439