Banking Locker
Security
Arpana Shree
Department of MCA
Mount Carmel College
Bangalore
Agenda
• Draw back of current technology
• Problem analysis model
• About hidden image scanner
• Algorithm overview
• Conclusion
What goes wrong???
• Theft can take variety of forms
- Insider
- Outsider
AnalysisAnalysis
Problem Analysis Model
Problem
Domain
Problem
Domain
SolutionSolution
Problem Domain
• Draw Back of alarm & CCTV technology
- Locker not secured
• Draw Back of RFID technology
- Passwords Hacking
SolutionSolution
Problem
Domain
Problem
Domain
Analysis
AnalysisAnalysis
Analyzing the problem
• Usage of security tokens
– Hardware/software
• Usage of 2FA
• Image scanning technology
- Current trend being implemented
SolutionSolution
Problem
Domain
Problem
Domain AnalysisAnalysis
Solution
Image scanning technology
• Uses a scanner
• Hidden scanner is being fixed
• Theft may not be aware of the hidden
Scanner
• Face detection algorithm is used
Example
Tiger
Face detection algorithm
Cb Part of the
input image
(fig-1)
Cr Part of the
input image
(fig-2)
The likely hood of
the skin regions
(fig-3)
Likelihood=exp[-0.5(X-M) c^-1
(X-M)]
where
X=P(r,b)^T
M=Mean value of X
C=Covariance of X
Image after
thresholding
(fig-4)
Using adaptive
threshold the Skin
regions are
highlighted
effectively
Template face used
to verify the
existence of face in
skin region
(fig-5)
Face boundary for
the given image
(fig-6)
Continued
• The detected face is given as a input
as a dimension 100X100 to Eigen
face recognition system.
• The output will be of the dimension
100X1
Conclusion
• Image scanner implementation in banking
locker security reduces 75% of hacking
• One of the emerging trend in IT industry
• Implemented in abroad Countries
Government website navigation page
www.clerk.house.gov/member_info/cong.as
px
THANK YOU!!!

Banking locker security using Image processing