SlideShare a Scribd company logo
1 of 3
Download to read offline
Prasad Tanaji Satpute et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.82-84
www.ijera.com 82 | P a g e
A Survey on Security for Server Using Spontaneous Face
Detection
1,
Prof. Priya Khune, 2,
Prasad Tanaji Satpute, 3
Sagar Sanjay Deshmukh,
4,
Pranav Manoj Biyani
1(Asst. Prof. Dept. of Computer Engineering, Savitribai Phule Pune University, India)
2(Student, Dept. of Computer Engineering, Savitribai Phule Pune University, India)
3(Student, Dept. of Computer Engineering, Savitribai Phule Pune University, India)
4(Student, Dept. of Computer Engineering, Savitribai Phule Pune University, India)
Abstract
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day.
So the protection of software and data in our computers has become very important. For this purpose we are
developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP,
SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized
person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For
this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a
random string & then Shutting-Down the computer remotely. By using java programming we can create such
applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from
this software so this will definitely helpful to make them fool.
Keywords: Image processing, Spontaneous facial expression, Eigen face, Principal Component Analysis
(PCA).
I. INTRODUCTION
Face recognition has several benefits over other
bio metric techniques, some of which are outlined
here: All technologies require some or other action
by an user, that is the user place his hand on a
scanner for finger printing or hand detection and for
iris or retina identification person has to stand in a
static position in front of a camera. Bio metric
systems are beneficial for security. Retina and Iris
detection need costly equipment and are much too
sensitive to any body motion. Voice recognition is
affected by noise that is present in background in
public places. Voice Signatures are modifiable or can
be forgotten. Facial images can easily be captured
using cameras. Face recognition is totally non-
intrusive and does not have any health risks.
Now-a-day’s people are aware of capacity of
computers. They a number of times use computers
for storing confidential information or huge servers
are maintained to store large Database of any
organization. With the increase in use of these
servers, frauds or abused actions are also bringing
boost, with which is the peril to such giant servers.
So security of such system is so important.
We are basically working in security domain.
We are developing an intrusion detection system that
makes use of Image processing concept for intrusion
detection and it is named as Security for Server Using
Spontaneous Face Detection. It detects the intrusion
by matching user’s image with administrator image.
But if image does not match, then it informs it to
administrator so that quick actions can take place.
With intrusion detection, our proposed system also
gives information (Image) of Novice User who tried
to access administrator’s system, so that he can be
tracked easily. We are creating such applications
which will help us to stop the cyber crime. It is not
visible to novice user which means he is unaware of
this software so this will definitely helpful to make
them fool. So Security for Server Using Spontaneous
Face Detection will be such a powerful intrusion
detection system which provides image based
detection. There are two general classes of attacks
which intrusion detection technologies attempt to
identify Anomaly detection and Misuse detection. So
our System covers both detection.
1.1 WHAT IS SERVER SECURITY SYSTEM?
In our project we are developing a System such
that we can get the image of the unauthorized person.
For this we are using a webcam. We send a mail on
the users E-mail id with the help of GPRS activated
phone for this we are using Sony Ericsson mobile. In
the reverse we are changing the password by random
string generation & then Shut Down the computer
remotely. Using java programming we can create
such applications which will help us to stop the cyber
crime. It is not visible to new user so that he/she is
RESEARCH ARTICLE OPEN ACCESS
Prasad Tanaji Satpute et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.82-84
www.ijera.com 83 | P a g e
unaware about this software so this will definitely
helpful to overcome unauthorized access and provide
security for our data and various software.
1.2 PROJECT OBJECTIVE
Our project aims at developing an application
using Java Technology. So If any unauthorized person
is trying to access the data on machine having
confidential data then to stop them we can develop the
software to stop them. When the user on that machine
login then by using mouse click we can differentiate
between authorized and unauthorized person. On that
mouse click the unauthorized person is trapped. The
image of that person is captured, and then the Email
with attachment of that image is sending on the
owners account with the help of network connection.
Then a random password is generated and we can
change the password of that machine. After changing
the password the machine is turning off.
II. Challenges Faced By Face Recognition
Face recognition is a specific and hard case of
object recognition. The complexity of this problem
evolves from the fact that in their most common
form (i.e., the frontal view) faces appear to be
roughly alike and the differences between them are
quite few. Consequently, frontal face images form a
very dense cluster in image space which makes it
virtually impossible for traditional pattern
recognition techniques to accurately discriminate
among them with a high degree of success.
Whereas the human face is not a unique, constant
image. There are many factors that cause the
appearance of the face to vary. The cradles of
changes in the facial views can be categorized into
two groups: intrinsic factors and extrinsic ones.
These factors can be further divided into two
classes: intrapersonal and interpersonal.
Intrapersonal factors are responsible for varying the
facial appearance of the similar user, some
examples being facial expression, age, facial hair,
glasses, cosmetics, etc.. Interpersonal factors are
responsible for the differentiation in the facial
appearance of different people, some factors way of
living and sexual category have confirmed that
different age groups, brightness changes and pose
variations are three major problems plaguing
current face recognition system
III. WORKING
Figure 1 Working of Server Security system
In proposed system we are contains more security
from unauthorized user. In system this after
welcome screen the system will have another
authentication system. If hackers will try to use
the system then system will automatically get
known that the person is unauthorized, So
suddenly the system will take snapshot of the
person and it will send mail to administrator
with photo of the person. A SMS will be sent
from machine to the administrator containing new
random password generated by machine.
Remotely Shutdown option for administrator is
provided. New password after every illegal access is
generated. High Security is provided. And it is able
to provide 3 layer securities.
Prasad Tanaji Satpute et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.82-84
www.ijera.com 84 | P a g e
Required Modules:
 Send Message
 PC Shut down
 Read Message (Mobile)
 Image Capture (web Camera)
 Send Mail
 Random String
Send Message Module:
The System will send an Alert Message to
administrator. Message contains general information
which we have set in system. Whenever a particular
action is sensed by a system the alert is sent to
administrator. It makes the administrator alert. As
per the administrator reply the system will carry out
further process.
Image Capture and Mail Module:
When user presses “No” button then an image is
captured. This Image is stored in hard drive with
.bmp format. An Email is sent to admin with the
snapshot of the user who is using machine.
Shut Down/Read Message Module:
Machine can be switched off, Log off or Restart
as per the instruction of admin. Machine is shut
down within 20 sec. All the tasks are killed and
Machine is forced to turn off and new windows
password is generated.
Random String Module:
A random password is generated. Whenever user
press “No” button then this module starts working.
The password which is created is stored in PC in a
text file and this text file is sent to admin via SMS
and Mail. This password is assigned to system when
it is restarted. A new password is assigned to
windows after a restart.
IV. FUTURE SCOPE
 If we are going to use this software in
big organization then we may use SMS
Server for sending messages in large
quantity.
 Hidden Cameras can be used (CCTV).
 Face recognition techniques can be used.
V. CONCLUSION
In this paper we have presented our scrutiny
related to Server Security which is an Intrusion
Detection System in which a Security System for
Server Computer using Spontaneous Face detection
with SMS Notification and E-Mail support sending
unauthorized user’s image and random password to
Administrator. This system can also be implemented
on Personal Computers.
REFERENCES
[1.] Zhaoyu Wang , Guobing Wu , Peijia Shan
,Shan He , Xufa Wang “Analyses of a
Multimodal Spontaneous Facial Expression
Database”, IEEE Transactions On Affective
Computing, Vol 4, No. 1, January- March
2013
[2.] Proyecto Fin de Carrera“Face Recognition
Algorithms”, Proyecto Fin de Carrera, June
16, 2010
[3.] Rabia Jafri and Hamid R. Arabnia“A
Survey of Face Recognition Techniques”,
Journal of Information Processing Systems,
Vol.5 No.2, June 2010
[4.] Srinivasulu Asadi , Dr.Ch.D.V.Subba Rao ,
V.Saikrishna ,“A Comparative study of Face
Recognition with Principal Component
Analysis and Cross-Correlation Technique”,
International Journal of Computer
Applications (0975-8887) Volume 10-No 8,
November 2009

More Related Content

What's hot

Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyIRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniqueseSAT Journals
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET Journal
 
Media Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureMedia Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureIRJET Journal
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women SecurityIRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
IRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET Journal
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniqueseSAT Publishing House
 

What's hot (20)

Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
43 automatic
43 automatic43 automatic
43 automatic
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Media Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureMedia Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand Gesture
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
IRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNO
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 

Viewers also liked

Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...
Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...
Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...IJERA Editor
 
Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...
Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...
Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...MoreBriz
 
Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)
Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)
Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)anhanh3729771
 
Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...
Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...
Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...IJERA Editor
 
01 bagaimana membuat p&id
01 bagaimana membuat p&id01 bagaimana membuat p&id
01 bagaimana membuat p&idLeon Panjaitan
 
Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...
Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...
Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...IJERA Editor
 
Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...
Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...
Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...IJERA Editor
 
Growth Processes for a pulse of leptin in fasting human subjects
Growth Processes for a pulse of leptin in fasting human subjectsGrowth Processes for a pulse of leptin in fasting human subjects
Growth Processes for a pulse of leptin in fasting human subjectsIJERA Editor
 
The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...
The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...
The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...IJERA Editor
 
From gradient decent to CDN
From gradient decent to CDNFrom gradient decent to CDN
From gradient decent to CDNxiaoerxiaoer
 
Concrete Poetry and It’s Varieties in Persian Poetry
Concrete Poetry and It’s Varieties in Persian PoetryConcrete Poetry and It’s Varieties in Persian Poetry
Concrete Poetry and It’s Varieties in Persian PoetryIJERA Editor
 
Defining your-target-product-profile in-vitro-diagnostic-products
Defining your-target-product-profile in-vitro-diagnostic-productsDefining your-target-product-profile in-vitro-diagnostic-products
Defining your-target-product-profile in-vitro-diagnostic-productsNational Institute of Biologics
 
Survival function Of Realization process for Hemodynamic and hormonal effects...
Survival function Of Realization process for Hemodynamic and hormonal effects...Survival function Of Realization process for Hemodynamic and hormonal effects...
Survival function Of Realization process for Hemodynamic and hormonal effects...IJERA Editor
 
Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...
Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...
Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...IJERA Editor
 
Modeling and Fluid Flow Analysis of Wavy Fin Based Automotive Radiator
Modeling and Fluid Flow Analysis of Wavy Fin Based Automotive RadiatorModeling and Fluid Flow Analysis of Wavy Fin Based Automotive Radiator
Modeling and Fluid Flow Analysis of Wavy Fin Based Automotive RadiatorIJERA Editor
 
The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...
The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...
The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...IJERA Editor
 
Развитие современных методов контроля качества лекарстенных средств
Развитие современных методов контроля качества лекарстенных средствРазвитие современных методов контроля качества лекарстенных средств
Развитие современных методов контроля качества лекарстенных средствInfor-media
 

Viewers also liked (20)

Business dialogue
Business dialogueBusiness dialogue
Business dialogue
 
Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...
Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...
Optimal Duration of Submersible Pump Equipped Deep Water Borehole Project in ...
 
Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...
Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...
Дополнительная информация в бюджете Березовского ГО Кемеровской области 2015 ...
 
Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)
Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)
Thừa cân, béo bụng là nguyên nhân của các bệnh tim mạch, tiểu đường (1)
 
Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...
Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...
Effect of Nozzle Design and Processing Parameter on Characteristics of Glass/...
 
01 bagaimana membuat p&id
01 bagaimana membuat p&id01 bagaimana membuat p&id
01 bagaimana membuat p&id
 
Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...
Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...
Mathematical Modeling of Bingham Plastic Model of Blood Flow Through Stenotic...
 
Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...
Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...
Maximum Power Point Tracking Using Adaptive Fuzzy Logic control for Photovolt...
 
Growth Processes for a pulse of leptin in fasting human subjects
Growth Processes for a pulse of leptin in fasting human subjectsGrowth Processes for a pulse of leptin in fasting human subjects
Growth Processes for a pulse of leptin in fasting human subjects
 
The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...
The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...
The Investigation Of Utilizing Rapeseed Flowers Oil As A Reliable Feedstock T...
 
From gradient decent to CDN
From gradient decent to CDNFrom gradient decent to CDN
From gradient decent to CDN
 
IMPORTENT 3
IMPORTENT 3IMPORTENT 3
IMPORTENT 3
 
Meksika ulke raporu_2013
Meksika ulke raporu_2013Meksika ulke raporu_2013
Meksika ulke raporu_2013
 
Concrete Poetry and It’s Varieties in Persian Poetry
Concrete Poetry and It’s Varieties in Persian PoetryConcrete Poetry and It’s Varieties in Persian Poetry
Concrete Poetry and It’s Varieties in Persian Poetry
 
Defining your-target-product-profile in-vitro-diagnostic-products
Defining your-target-product-profile in-vitro-diagnostic-productsDefining your-target-product-profile in-vitro-diagnostic-products
Defining your-target-product-profile in-vitro-diagnostic-products
 
Survival function Of Realization process for Hemodynamic and hormonal effects...
Survival function Of Realization process for Hemodynamic and hormonal effects...Survival function Of Realization process for Hemodynamic and hormonal effects...
Survival function Of Realization process for Hemodynamic and hormonal effects...
 
Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...
Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...
Effects oftheExchange Interaction Parameter onthePhase Diagrams fortheTransve...
 
Modeling and Fluid Flow Analysis of Wavy Fin Based Automotive Radiator
Modeling and Fluid Flow Analysis of Wavy Fin Based Automotive RadiatorModeling and Fluid Flow Analysis of Wavy Fin Based Automotive Radiator
Modeling and Fluid Flow Analysis of Wavy Fin Based Automotive Radiator
 
The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...
The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...
The Inherent Reactor Kinetics for Transformation of Geniposidic Acid from Gen...
 
Развитие современных методов контроля качества лекарстенных средств
Развитие современных методов контроля качества лекарстенных средствРазвитие современных методов контроля качества лекарстенных средств
Развитие современных методов контроля качества лекарстенных средств
 

Similar to A Survey on Security for Server Using Spontaneous Face Detection

Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
SMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AISMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AIIRJET Journal
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx4934bk
 
Nivritti : web-based Real time face recognition
Nivritti : web-based Real time face recognitionNivritti : web-based Real time face recognition
Nivritti : web-based Real time face recognitionIRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 

Similar to A Survey on Security for Server Using Spontaneous Face Detection (20)

Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
SMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AISMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AI
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx
 
Nivritti : web-based Real time face recognition
Nivritti : web-based Real time face recognitionNivritti : web-based Real time face recognition
Nivritti : web-based Real time face recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

A Survey on Security for Server Using Spontaneous Face Detection

  • 1. Prasad Tanaji Satpute et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.82-84 www.ijera.com 82 | P a g e A Survey on Security for Server Using Spontaneous Face Detection 1, Prof. Priya Khune, 2, Prasad Tanaji Satpute, 3 Sagar Sanjay Deshmukh, 4, Pranav Manoj Biyani 1(Asst. Prof. Dept. of Computer Engineering, Savitribai Phule Pune University, India) 2(Student, Dept. of Computer Engineering, Savitribai Phule Pune University, India) 3(Student, Dept. of Computer Engineering, Savitribai Phule Pune University, India) 4(Student, Dept. of Computer Engineering, Savitribai Phule Pune University, India) Abstract In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool. Keywords: Image processing, Spontaneous facial expression, Eigen face, Principal Component Analysis (PCA). I. INTRODUCTION Face recognition has several benefits over other bio metric techniques, some of which are outlined here: All technologies require some or other action by an user, that is the user place his hand on a scanner for finger printing or hand detection and for iris or retina identification person has to stand in a static position in front of a camera. Bio metric systems are beneficial for security. Retina and Iris detection need costly equipment and are much too sensitive to any body motion. Voice recognition is affected by noise that is present in background in public places. Voice Signatures are modifiable or can be forgotten. Facial images can easily be captured using cameras. Face recognition is totally non- intrusive and does not have any health risks. Now-a-day’s people are aware of capacity of computers. They a number of times use computers for storing confidential information or huge servers are maintained to store large Database of any organization. With the increase in use of these servers, frauds or abused actions are also bringing boost, with which is the peril to such giant servers. So security of such system is so important. We are basically working in security domain. We are developing an intrusion detection system that makes use of Image processing concept for intrusion detection and it is named as Security for Server Using Spontaneous Face Detection. It detects the intrusion by matching user’s image with administrator image. But if image does not match, then it informs it to administrator so that quick actions can take place. With intrusion detection, our proposed system also gives information (Image) of Novice User who tried to access administrator’s system, so that he can be tracked easily. We are creating such applications which will help us to stop the cyber crime. It is not visible to novice user which means he is unaware of this software so this will definitely helpful to make them fool. So Security for Server Using Spontaneous Face Detection will be such a powerful intrusion detection system which provides image based detection. There are two general classes of attacks which intrusion detection technologies attempt to identify Anomaly detection and Misuse detection. So our System covers both detection. 1.1 WHAT IS SERVER SECURITY SYSTEM? In our project we are developing a System such that we can get the image of the unauthorized person. For this we are using a webcam. We send a mail on the users E-mail id with the help of GPRS activated phone for this we are using Sony Ericsson mobile. In the reverse we are changing the password by random string generation & then Shut Down the computer remotely. Using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he/she is RESEARCH ARTICLE OPEN ACCESS
  • 2. Prasad Tanaji Satpute et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.82-84 www.ijera.com 83 | P a g e unaware about this software so this will definitely helpful to overcome unauthorized access and provide security for our data and various software. 1.2 PROJECT OBJECTIVE Our project aims at developing an application using Java Technology. So If any unauthorized person is trying to access the data on machine having confidential data then to stop them we can develop the software to stop them. When the user on that machine login then by using mouse click we can differentiate between authorized and unauthorized person. On that mouse click the unauthorized person is trapped. The image of that person is captured, and then the Email with attachment of that image is sending on the owners account with the help of network connection. Then a random password is generated and we can change the password of that machine. After changing the password the machine is turning off. II. Challenges Faced By Face Recognition Face recognition is a specific and hard case of object recognition. The complexity of this problem evolves from the fact that in their most common form (i.e., the frontal view) faces appear to be roughly alike and the differences between them are quite few. Consequently, frontal face images form a very dense cluster in image space which makes it virtually impossible for traditional pattern recognition techniques to accurately discriminate among them with a high degree of success. Whereas the human face is not a unique, constant image. There are many factors that cause the appearance of the face to vary. The cradles of changes in the facial views can be categorized into two groups: intrinsic factors and extrinsic ones. These factors can be further divided into two classes: intrapersonal and interpersonal. Intrapersonal factors are responsible for varying the facial appearance of the similar user, some examples being facial expression, age, facial hair, glasses, cosmetics, etc.. Interpersonal factors are responsible for the differentiation in the facial appearance of different people, some factors way of living and sexual category have confirmed that different age groups, brightness changes and pose variations are three major problems plaguing current face recognition system III. WORKING Figure 1 Working of Server Security system In proposed system we are contains more security from unauthorized user. In system this after welcome screen the system will have another authentication system. If hackers will try to use the system then system will automatically get known that the person is unauthorized, So suddenly the system will take snapshot of the person and it will send mail to administrator with photo of the person. A SMS will be sent from machine to the administrator containing new random password generated by machine. Remotely Shutdown option for administrator is provided. New password after every illegal access is generated. High Security is provided. And it is able to provide 3 layer securities.
  • 3. Prasad Tanaji Satpute et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.82-84 www.ijera.com 84 | P a g e Required Modules:  Send Message  PC Shut down  Read Message (Mobile)  Image Capture (web Camera)  Send Mail  Random String Send Message Module: The System will send an Alert Message to administrator. Message contains general information which we have set in system. Whenever a particular action is sensed by a system the alert is sent to administrator. It makes the administrator alert. As per the administrator reply the system will carry out further process. Image Capture and Mail Module: When user presses “No” button then an image is captured. This Image is stored in hard drive with .bmp format. An Email is sent to admin with the snapshot of the user who is using machine. Shut Down/Read Message Module: Machine can be switched off, Log off or Restart as per the instruction of admin. Machine is shut down within 20 sec. All the tasks are killed and Machine is forced to turn off and new windows password is generated. Random String Module: A random password is generated. Whenever user press “No” button then this module starts working. The password which is created is stored in PC in a text file and this text file is sent to admin via SMS and Mail. This password is assigned to system when it is restarted. A new password is assigned to windows after a restart. IV. FUTURE SCOPE  If we are going to use this software in big organization then we may use SMS Server for sending messages in large quantity.  Hidden Cameras can be used (CCTV).  Face recognition techniques can be used. V. CONCLUSION In this paper we have presented our scrutiny related to Server Security which is an Intrusion Detection System in which a Security System for Server Computer using Spontaneous Face detection with SMS Notification and E-Mail support sending unauthorized user’s image and random password to Administrator. This system can also be implemented on Personal Computers. REFERENCES [1.] Zhaoyu Wang , Guobing Wu , Peijia Shan ,Shan He , Xufa Wang “Analyses of a Multimodal Spontaneous Facial Expression Database”, IEEE Transactions On Affective Computing, Vol 4, No. 1, January- March 2013 [2.] Proyecto Fin de Carrera“Face Recognition Algorithms”, Proyecto Fin de Carrera, June 16, 2010 [3.] Rabia Jafri and Hamid R. Arabnia“A Survey of Face Recognition Techniques”, Journal of Information Processing Systems, Vol.5 No.2, June 2010 [4.] Srinivasulu Asadi , Dr.Ch.D.V.Subba Rao , V.Saikrishna ,“A Comparative study of Face Recognition with Principal Component Analysis and Cross-Correlation Technique”, International Journal of Computer Applications (0975-8887) Volume 10-No 8, November 2009