A Study on Techniques of facial recognition and IOT Cam vulnerabilities: A survey

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    There is a best call for brilliant association Survey best in cameras everywhere throughout the cities. Where up to biased investigation cameras are were not favored by the residents of cities since cameras under-mine so of the security of basic subjects. Be that of the content it may, the protection is by the clue of all accounts overruled by the machinesecurity. As of now the content video film of cameras should be are broke down after the forceful, criminal acts. There could be aprerequisite for being continuousformulation to match and catch criminals or not be long after the criminal offense act. Face must be discover in vital an initial phase in of the confront acknowledgment some frameworks with knowledge confining and to be detaching the many face area from the background. Malware like vireoMIRAI is presently to be part utilized to production of extensive bottlenecks  which can be utilized as a part of D-DOS assaults where could be up to (1.2) Terabytes data of systems shield movement is produced by each second. We make about the dangers said when there could be tradeoff of an IOT gadget's must be secure and give anappropriatesecond analysis of an IP camera. We go additionally provide cover parts may be have how and why present day bemight be malware said to be targets IOT gadgets and devices predominantly. We are up to last mark about the novel significance sign of securing IOTdevices and give the basic fundamental security gone practices to alleviating same gadget abuse.

     

     


  • Keywords


    Face Recognition; Internet of Things ; Surveillance Cameras security; vulnerability; Wire-Shark n-map.

  • References


      ] Leon Rothkrantz, "Person Identification by Smart Cameras" Smart Cities Symposium Prague 2017

      [2] M. Sharif, S. Mohsen, M. Youmans Jived, “A Survey: Face Recognition Techniques”, Research Journal of Applied Sciences, Engineering and Technology, 4(23): 4979-4990, 2012.

      [3] M. Morata, M. Sharif, M. Raza, J. Hussain Shah, “Analysis of Face Recognition under Varying Facial Expression: A Survey.” The International Arab Journal of Information Technology, Vol. 10, No. 4, July 2013.

      [4] M. M. Kasur, D. Bhattacharyya, Tai-hood Kim, “Face Recognition Using Neural Network: A Review.” International Journal of Security and Its Applications, Vol. 10, No. 3 (2016), pp.81-100.

      [5] M. Chihuahua, A. Elke, W. Belly, Chore Ben Amar, “A Survey of 2D Face Recognition Techniques.” Computers, 2016.

      [6] M. H. Yang, D. Krieg man, N. Ahuja, "Detecting Faces in Images: ASurvey," IEEE Transactions on Pattern Analysis and Machin Intelligence (PAMI), vol. 24, no. 1, pp. 34-58, 2002.

      [7] M. Saitek, “Quasi-Non-Ergodic Probabilistic Systems and Wave Probabilistic Functions,” Neural Network World, 3/2009, pp.307-320, 2009.

      [8] M. Saitek, “Towards complex system theory, Tutorial,” Neural Network World, vol.25, no.1, pp. 5-33, 2015.[1] Brain Krebs, KrebsOnSecurity Hit with Record DDOS, Sept 2016,

      [9] Igal Zeifman, Ben Herzberg, and Dima Bekerman Breaking Down MIRAI: An IOTDDOS Botnet Analysis, Oct 2016.

      [10] Grant Hernandez, Orlando Arias, Daniel Buentello, and Yier Jin Smart Nest Thermostat: A Smart Spy in Your Home, BlackHat conference, 2014.

      [11] Craig Heffner, Exploiting Surveillance Cameras, Black Hat conference, Feb 2013.

      [12] Yogeesh Seralathan*, Tae (Tom) Oh**, Suyash Jadhav**, Jonathan Myers**, Jaehoon (Paul) Jeong+, Young Ho Kim^, and Jeong Neyo Kim^, "IOT Security Vulnerability: A Case Study of a Web Camera", International Conference on Advanced Communications Technology (ICACT)

      [13] Arun Agrawal, Ranjana Sikarwar, "A Survey: Face Recognition Techniques" Arun Agrawal et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7252-7256.

      [14] Manisha M. Kasar1, Debnath Bhattacharyya1 and Tai-hoon Kim2.*, "Face Recognition Using Neural Network: A Review", International Journal of Security and Its Applications Vol. 10, No. 3 (2016).


 

View

Download

Article ID: 20240
 
DOI: 10.14419/ijet.v7i4.6.20240




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.