0% found this document useful (0 votes)
4 views

web based facial

The document presents a mini project synopsis for a 'Web-Based Facial Authentication System' aimed at enhancing user authentication through facial recognition technology. It outlines the limitations of traditional password-based systems, including security vulnerabilities and user inconvenience, and proposes a solution that utilizes open-source facial recognition libraries for secure, contactless login. The system ensures data privacy and accessibility across various devices while eliminating the need for passwords.

Uploaded by

rockycs0611
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

web based facial

The document presents a mini project synopsis for a 'Web-Based Facial Authentication System' aimed at enhancing user authentication through facial recognition technology. It outlines the limitations of traditional password-based systems, including security vulnerabilities and user inconvenience, and proposes a solution that utilizes open-source facial recognition libraries for secure, contactless login. The system ensures data privacy and accessibility across various devices while eliminating the need for passwords.

Uploaded by

rockycs0611
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SRI SIDDHARTHA ACADEMY OF HIGHER EDUCATION

(DEEMED TO BE UNIVERSITY)
Accredited A+ Grade by NAAC
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY
(A Constituent College of SSAHE)
KUNIGAL ROAD, MARALURU, TUMAKURU-572105

Mini Project (22ISMP607)


Synopsis on
“Web-Based Facial Authentication System”

Submitted by:

CHANDAN C S 22IS019
CHANDAN K 22IS020

Under the guidance of:


RASHMI H C B.E,M.Tech,PhD

Assistant Professor, Dept. of ISE

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING


“Accredited by NBA, NEW DELHI 2022-25”

AY – 2024 -25
ABSTRACT
Facial recognition system for user authentication. This software is widely used in exam proctoring
systems, KYC processing systems, or even in simple mobile devices. The system already has records of
the intended user’s photographs. These records can either be public or narrowed down to a specific set of
users. After the camera permission is granted, the face is detected. The 2D-based image is matched with
images in its database. The software reads the geometry of your face such as the distance between eyes,
depth of eye sockets, distance from forehead to chin, the shape of cheekbones, lips, ears, chin, nose, etc.
This data is converted into a set of digital information that is a numerical code called faceprint. The data
is then matched with the existing faceprints in the system and a result is generated
Table of Contents

Sl.No. Contents
1 Introduction 01
2 Problem Statement 02
3 Proposed Solution 03
4 System Architecture 04

I. Introduction
Information and Communication Technology us age has witnessed rapid growth in the past decade
decade all around the world. A bigger percentage of the population has laptops, personal computers, and
smart phones making it easy to access the internet and thus changing lives of millions of people [1]. All
web-based systems that have users and store personal information about the users require a mech anism
to keep track of their users’ information. Most 1Corresponding author. [email protected] Rodrick
Calvin Wamala Dept. of Electrical and Computer Engineering Makerere University
[email protected] * Andrew Katumba Dept. of Electrical and Computer Engineering Makerere
University [email protected] commonly every user of the system is assigned an instance in the
database that represents them (their identity). To protect the user identity, an authentication and
authorization mechanism is im plemented to control access to certain information. The most common
method in web-based systems is authentication using passwords. Users regularly provide a combination
of their username and password through a form to access a remote account [9]. Passwords have well-
known disadvantages in both usability and security. This leads to promo tion of biometric-based
authentication. The primary motivation of biometric authentication is usability: users are not required to
remember the passwords, there is nothing for them to carry, biometric systems are generally easy to use,
and scalable in terms of the burden exerted onto the users. Biometric tech nology can be used to control
the risk of sharing, forgetting, losing, and embezzlement of passwords

II. Problem Statement


Traditional authentication methods, such as passwords and PINs, are increasingly vulnerable to security
breaches, phishing attacks, and unauthorized access. Users often choose weak passwords or reuse the
same credentials across multiple platforms, leading to a higher risk of data theft and identity fraud.
Additionally, password recovery processes can be cumbersome and insecure. In sensitive applications
like online exams, financial systems, or secure portals, it becomes crucial to verify the actual identity of
the user, not just their credentials. Existing systems lack a seamless, secure, and user-friendly way to
authenticate users remotely. There is a need for a reliable, web-based biometric authentication solution
that provides real-time, contactless, and accurate identity verification while ensuring data privacy and
ease of access. The Web-Based Facial Authentication System addresses these challenges by replacing
passwords with AI-powered facial recognition, enhancing both security and user experience.

 Security Vulnerabilities: Traditional authentication methods like passwords are prone to breaches,
phishing attacks, and unauthorized access, increasing the risk of identity theft.
 Weak Passwords: Many users use weak or reused passwords, which heightens security risks and
makes systems more susceptible to hacking.
 Inefficient Recovery Processes: Password recovery methods are often insecure, complex, and
inconvenient for users, leading to frustration and security gaps.
 Lack of Secure Remote Authentication: Existing systems do not offer reliable and user-friendly
ways to securely authenticate users remotely for sensitive online activities like exams or financial
transactions.
 Need for Biometric Authentication: There is a growing demand for contactless, accurate, and secure
methods like facial recognition to replace traditional login methods, ensuring both security and
convenience.

III. Proposed Solution


To address the limitations of traditional authentication methods, the proposed solution is to develop a
web-based facial authentication system that enables users to securely log in using facial recognition
technology. This system will utilize open-source facial recognition code available on GitHub, specifically
libraries like OpenCV, Dlib, or FaceNet, which provide efficient real-time face detection and recognition.
The facial recognition process will be conducted through a webcam or smartphone camera, capturing
the user’s face and comparing it to the stored biometric data for accurate identity verification. This will
eliminate the need for passwords and PINs, providing a safer and more user-friendly authentication
method.
Incorporating encryption algorithms, the system will ensure that all biometric data is securely stored
and transmitted, complying with data privacy regulations like GDPR. This will protect users’ sensitive
information from potential breaches.
The web-based platform will be accessible across different devices and browsers, ensuring scalability
and convenience for users in a variety of online environments, such as educational portals, financial
applications, or secure enterprise systems.
By leveraging open-source code, the project minimizes development time and integrates proven
technology, focusing on customizing it to fit the specific needs of secure, password-free user
authentication.

IV. System Architecture

You might also like