Banking Locker Security
Arpana Shree
Department of MCA
Mount Carmel College
Bangalore
Agenda
• Draw back of current technology
• Problem analysis model
• About hidden image scanner
• Algorithm overview
• Conclusion
What goes wrong???
• Theft can take variety of forms
- Insider
- Outsider
AnalysisAnalysis
Problem Analysis Model
Problem DomainProblem Domain
SolutionSolution
Problem Domain
• Draw Back of alarm & CCTV technology- Locker not secured
• Draw Back of RFID technology- Passwords Hacking
SolutionSolution
Problem DomainProblem Domain
Analysis
AnalysisAnalysis
Analyzing the problem
• Usage of security tokens– Hardware/software
• Usage of 2FA
• Image scanning technology - Current trend being implemented
SolutionSolution
Problem DomainProblem Domain AnalysisAnalysis
Solution
Image scanning technology
• Uses a scanner
• Hidden scanner is being fixed
• Theft may not be aware of the hidden Scanner
• Face detection algorithm is used
Example
Tiger
Face detection algorithm
Cb Part of the input image (fig-1)
Cr Part of the input image (fig-2)
The likely hood of the skin regions (fig-3)
Likelihood=exp[-0.5(X-M) c^-1 (X-M)]
whereX=P(r,b)^T
M=Mean value of X C=Covariance of X
Image after thresholding
(fig-4)
Using adaptive threshold the Skin regions are highlighted effectively
Template face used to verify the existence of face in skin region (fig-5)
Face boundary for the given image (fig-6)
Continued
• The detected face is given as a input as a dimension 100X100 to Eigen face recognition system.
• The output will be of the dimension 100X1
Conclusion
• Image scanner implementation in banking locker security reduces 75% of hacking
• One of the emerging trend in IT industry
• Implemented in abroad Countries
Government website navigation page
www.clerk.house.gov/member_info/cong.aspx
THANK YOU!!!