Online Biometric Identification with Face Analysis in Web Applications

  • Gerasimos ArvanitisEmail author
  • Konstantinos Moustakas
  • Nikos Fakotakis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9811)


Internet security is an important issue that concerns everyone who uses it without exception. Over the past few years, there has been a significant improvement in internet security but little attention has been paid to protect careless users. This paper introduces a user-based security application that could replace the classic login frame on websites in order to offer an extra security level that allows a biometric identification of the user that prevents unauthorized login to his personal page.


Face recognition Biometric identification Online safety User-based security 


  1. 1.
  2. 2.
    Bartlett, M.S., Movellan, J.R., Sejnowski, T.J.: Face recognition by independent component analysis. IEEE Trans. Neural Netw. 13(6), 1450–1464 (2002)CrossRefGoogle Scholar
  3. 3.
    Fan, X., Verma, B.: A comparative experimental analysis of separate and combined facial features for ga-ann based technique. In: Sixth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2005), pp. 279–284. IEEE (2005)Google Scholar
  4. 4.
    Jensen, O.H.: Implementing the Viola-Jones face detection algorithm. Ph.D. thesis, Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark (2008)Google Scholar
  5. 5.
    Križaj, J., Štruc, V., Pavešić, N.: Adaptation of SIFT features for robust face recognition. In: Campilho, A., Kamel, M. (eds.) ICIAR 2010. LNCS, vol. 6111, pp. 394–404. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  6. 6.
    Lu, H., Plataniotis, K.N., Venetsanopoulos, A.N.: Multilinear principal component analysis of tensor objects for recognition. In: 18th International Conference on Pattern Recognition (ICPR 2006), vol. 2, pp. 776–779. IEEE (2006)Google Scholar
  7. 7.
    Abdullah, M., Wazzan, M., Bo-saeed, S.: Optimizing face recognition using PCA. Int. J. Artif. Intell. Appl. (IJAIA), 3(2) (2012)Google Scholar
  8. 8.
    Martínez, A.M., Kak, A.C.: PCA versus LDA. IEEE Trans. Pattern Anal. Mach. Intell. 23(2), 228–233 (2001)CrossRefGoogle Scholar
  9. 9.
    Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosc. 3(1), 71–86 (1991)CrossRefGoogle Scholar
  10. 10.
    Upadhayay, R., Yadav, R.K.: Kernel principle component analysis in face recognition system: a survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(6), 348–353 (2013)Google Scholar
  11. 11.
    Viola, P., Jones, M.: Robust real-time object detection. Int. J. Comput. Vis. 4, 34–47 (2001)Google Scholar
  12. 12.
    Yang, M.H., Ahuja, N., Kriegman, D.: Face recognition using kernel eigenfaces. In: 2000 Proceedings International Conference on Image Processing, vol. 1, pp. 37–40. IEEE (2000)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Gerasimos Arvanitis
    • 1
    Email author
  • Konstantinos Moustakas
    • 1
  • Nikos Fakotakis
    • 1
  1. 1.Electrical and Computer Engineering DepartmentUniversity of PatrasPatrasGreece

Personalised recommendations