Face recognition for e-commerce security

被引:0
|
作者
Wang, W [1 ]
Hui, SC [1 ]
Gao, Y [1 ]
Leung, MKH [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
face recognition; e-commerce; Internet security; LEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In electronic commerce, it is difficult to verify the buyers identity as his signature cannot be produced on demand. Furthermore, it is easy to impersonate anothers identity by using a stolen credit card number ii-hen making, online payments. Credit card frauds have been reported all over the world. In this paper, we propose a FaceID system to support user verification over the Internet using a face recognition technique, known as the Line Edge Map (LEM). In any e-commerce transactions, the buyers credit card number and face image data captured by a video camera located on the PC are encoded, encrypted and transmitted via the Internet to the FaceID server for verification, At the FaceID server, the face image code associated with the credit card number is retrieved from the face image code database and then matched with the received face image code captured from the buyer using the LEM algorithm. A positive verification gives the go ahead for the intended transaction. The verification results will then be transmitted to the seller for completing the transaction.
引用
收藏
页码:904 / 907
页数:4
相关论文
共 50 条
  • [11] A Survey of E-Commerce Security
    QIN Zhiguang
    JournalofElectronicScienceandTechnologyofChina, 2004, (03) : 173 - 176
  • [12] E-Commerce security issues
    Salehnia, A
    Pournaghshband, H
    ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, 2002, : 705 - 708
  • [13] Application Research of Voiceprint Recognition Technology in Mobile E-commerce Security
    Wu, Zhenkun
    Peng, Zhenlong
    Yu, Ting
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ECONOMIC DEVELOPMENT AND EDUCATION MANAGEMENT (ICEDEM 2018), 2018, 290 : 483 - 486
  • [14] Research on the Security and Credit of E-commerce
    Gu Guifang
    He Youshi
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 92 - 96
  • [15] Research of E-Commerce Security Technology
    Hong, Xie
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3548 - 3552
  • [16] The Security and Prevention of E-Commerce in China
    Qiu, Jianlin
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 162 - 165
  • [17] Security analysis on mobile E-commerce
    Wang, SM
    Tao, R
    Wang, Y
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 1, 2004, : 642 - 647
  • [18] Security Perceptions of e-Commerce Users
    Schmidt, Mark
    Chen, Jim
    Phan, Dien
    Arnett, Kirk
    JOURNAL OF INTERNET COMMERCE, 2009, 8 (1-2) : 44 - 57
  • [19] Mobile E-Commerce Security Architecture
    Wang, Zhuo
    Hu, Ran
    Xu, JianFeng
    2009 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING ( GRC 2009), 2009, : 576 - 579
  • [20] Research on Security Architecture of E-Commerce
    Shen-Zihao
    Wang-Hui
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 185 - 188