Face recognition for e-commerce security

被引:0
|
作者
Wang, W [1 ]
Hui, SC [1 ]
Gao, Y [1 ]
Leung, MKH [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
face recognition; e-commerce; Internet security; LEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In electronic commerce, it is difficult to verify the buyers identity as his signature cannot be produced on demand. Furthermore, it is easy to impersonate anothers identity by using a stolen credit card number ii-hen making, online payments. Credit card frauds have been reported all over the world. In this paper, we propose a FaceID system to support user verification over the Internet using a face recognition technique, known as the Line Edge Map (LEM). In any e-commerce transactions, the buyers credit card number and face image data captured by a video camera located on the PC are encoded, encrypted and transmitted via the Internet to the FaceID server for verification, At the FaceID server, the face image code associated with the credit card number is retrieved from the face image code database and then matched with the received face image code captured from the buyer using the LEM algorithm. A positive verification gives the go ahead for the intended transaction. The verification results will then be transmitted to the seller for completing the transaction.
引用
收藏
页码:904 / 907
页数:4
相关论文
共 50 条
  • [41] Study of security issues in E-commerce applications
    Hanumesh, V.J.
    Sunder, K.S.
    IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 2000, 17 (04): : 209 - 214
  • [42] e-commerce and security governance in developing countries
    Sanayei, Ali
    Rajabion, Lila
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 288 - +
  • [43] Security in e-commerce and the economics of immediate satisfaction
    Zhang, Min
    Jiang, Renguo
    Hu, Haiqing
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 588 - +
  • [44] The program is assessing the level of security of e-commerce
    Oladko, Vladlena S.
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2015, 33 (04): : 46 - 53
  • [45] Cryptography based E-commerce security: A review
    Yasin, Shazia
    Haseeb, Khalid
    Qureshi, Rashid Jalal
    International Journal of Computer Science Issues, 2012, 9 (02): : 132 - 137
  • [46] Privacy and security the drivers for growth of E-commerce
    Hinde, S
    COMPUTERS & SECURITY, 1998, 17 (06) : 475 - 478
  • [47] e-Commerce security - A life cycle approach
    Sengupta, A
    Mazumdar, C
    Barik, MS
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2005, 30 (2-3): : 119 - 140
  • [48] The Application of VMware in Teaching for E-commerce Security
    Dai, Jie-qiang
    Wu, Cui-hong
    INTERNATIONAL CONFERENCE ON MODERN EDUCATION AND INFORMATION TECHNOLOGY (MEIT 2017), 2017, : 278 - 281
  • [49] The Viewpoint of E-Commerce Security in the Digital Economy
    Priescu, Iustin
    Patriciu, Victor Valeriu
    Nicolaescu, Sebastian
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 431 - +
  • [50] Strategies for The Security of Online Payments in E-commerce
    Zhang, Chen
    Jiang, Shijie
    Huang, Bin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1149 - 1151