web based facial
web based facial
(DEEMED TO BE UNIVERSITY)
Accredited A+ Grade by NAAC
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY
(A Constituent College of SSAHE)
KUNIGAL ROAD, MARALURU, TUMAKURU-572105
Submitted by:
CHANDAN C S 22IS019
CHANDAN K 22IS020
AY – 2024 -25
ABSTRACT
Facial recognition system for user authentication. This software is widely used in exam proctoring
systems, KYC processing systems, or even in simple mobile devices. The system already has records of
the intended user’s photographs. These records can either be public or narrowed down to a specific set of
users. After the camera permission is granted, the face is detected. The 2D-based image is matched with
images in its database. The software reads the geometry of your face such as the distance between eyes,
depth of eye sockets, distance from forehead to chin, the shape of cheekbones, lips, ears, chin, nose, etc.
This data is converted into a set of digital information that is a numerical code called faceprint. The data
is then matched with the existing faceprints in the system and a result is generated
Table of Contents
Sl.No. Contents
1 Introduction 01
2 Problem Statement 02
3 Proposed Solution 03
4 System Architecture 04
I. Introduction
Information and Communication Technology us age has witnessed rapid growth in the past decade
decade all around the world. A bigger percentage of the population has laptops, personal computers, and
smart phones making it easy to access the internet and thus changing lives of millions of people [1]. All
web-based systems that have users and store personal information about the users require a mech anism
to keep track of their users’ information. Most 1Corresponding author. [email protected] Rodrick
Calvin Wamala Dept. of Electrical and Computer Engineering Makerere University
[email protected] * Andrew Katumba Dept. of Electrical and Computer Engineering Makerere
University [email protected] commonly every user of the system is assigned an instance in the
database that represents them (their identity). To protect the user identity, an authentication and
authorization mechanism is im plemented to control access to certain information. The most common
method in web-based systems is authentication using passwords. Users regularly provide a combination
of their username and password through a form to access a remote account [9]. Passwords have well-
known disadvantages in both usability and security. This leads to promo tion of biometric-based
authentication. The primary motivation of biometric authentication is usability: users are not required to
remember the passwords, there is nothing for them to carry, biometric systems are generally easy to use,
and scalable in terms of the burden exerted onto the users. Biometric tech nology can be used to control
the risk of sharing, forgetting, losing, and embezzlement of passwords
Security Vulnerabilities: Traditional authentication methods like passwords are prone to breaches,
phishing attacks, and unauthorized access, increasing the risk of identity theft.
Weak Passwords: Many users use weak or reused passwords, which heightens security risks and
makes systems more susceptible to hacking.
Inefficient Recovery Processes: Password recovery methods are often insecure, complex, and
inconvenient for users, leading to frustration and security gaps.
Lack of Secure Remote Authentication: Existing systems do not offer reliable and user-friendly
ways to securely authenticate users remotely for sensitive online activities like exams or financial
transactions.
Need for Biometric Authentication: There is a growing demand for contactless, accurate, and secure
methods like facial recognition to replace traditional login methods, ensuring both security and
convenience.