Free Essay

Kinect-Based Gesture Password Recognition

In: Computers and Technology

Submitted By neuralnetwox
Words 3290
Pages 14
Australian Journal of Basic and Applied Sciences, 6(8): 492-499, 2012 ISSN 1991-8178

Kinect-based Gesture Password Recognition
Mohd Afizi Mohd Shukran, Mohd Suhaili Bin Ariffin Faculty of Science and Defence Technology, Universiti Pertahanan Nasional Malaysia, Aras 6, Bangunan Bistari, Kem Sungai Besi, 57000 Kuala Lumpur.
Abstract: Hand gesture password might be the most natural and intuitive way to communicate between people and machines, since it closely mimics how human interact with each other. Its intuitiveness and naturalness have spawned many applications in exploring large and complex data, computer games, virtual reality, health care, etc. Although the market for hand gesture password is huge, building a robust hand gesture recognition system remains a challenging problem for traditional vision-based approaches, which are greatly limited by the quality of the input from optical sensors. In this paper, we use their gesture in order to login or authenticate to the system. And then we introduce a novel method to create a gesture pattern that act as a password. This hand gesture recognition system performs robustly despite variations in hand orientation, scale or articulation. Moreover, it works well in uncontrolled environments with background clusters. Key words: Password Recognition, Authentication, Gesture password INTRODUCTION The advent of relatively cheap image and depth sensors has spurred research in the field of object tracking and gesture recognition. One of the more popular devices used to do this type of research is Microsoft’s Kinect, which has sensors that capture both rgb and depth data. Using similar data, researchers have developed algorithms that not only identify humans in a scene, but perform full body tracking; they can infer a person’s skeletal structure in real-time, allowing for the recognition and classification of a set of full body actions (Wei Qu, A., 2007). Kinect-based Gesture Password Recognition will require user to capture the gestures by point up and moving up the fingers or hand in front of the Kinect sensor without need to use a keyboard or mouse to key in password and the gesture itself as password. One of the known techniques to acquire gesture from a device or sensor is gesture recognition. For Kinect-based games and applications, the most natural way to interact with the system is to recognize the gesture of a user. However, the Kinect camera is designed to detect the body pose and not hand gestures which required more precise algorithms (Michael H. Lin, 2004). This project will focus on testing efficient and accurate algorithms in detecting the fingers as a replacement for a password. Gesture recognition is the mathematical interpretation of a human motion by a computing device. Gesture recognition, along with facial recognition, voice recognition, eye tracking and lip movement recognition are components of what developers refer to as a perceptual user interface (PUI). The goal of PUI is to enhance the efficiency and ease of use for the underlying logical design of a stored program, a design discipline known as usability. In personal computing, gestures are most often used for input commands. Recognizing gestures as input allows computers to be more accessible for the physically-impaired and makes interaction more natural in a gaming or 3-D virtual world environment. Hand and body gestures can be amplified by a controller that contains accelerometers and gyroscopes to sense tilting, rotation and acceleration of movement -- or the computing device can be outfitted with a camera so that software in the device can recognize and interpret specific gestures (Jesús Martínez del Rincón, 2011). A wave of the hand, for instance, might terminate the program.

Fig. 2.1: Microsoft Kinect.
Corresponding Author: Mohd Afizi Mohd Shukran, Faculty of Science and Defence Technology, Universiti Pertahanan Nasional Malaysia, Aras 6, Bangunan Bistari, Kem Sungai Besi, 57000 Kuala Lumpur. E-mail:


Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

Using a Kinect, a user enters a combination of symbols by using a finger. The dimensions used to represent the password are the shape of each symbol, and the time taken when doing each of the traces. Using this representation, the user is forced to think of and memorize passwords in a more qualitative manner, and is also prevented from using bad habits such as storing passwords in text files. Kinect based password recognition system consists of using user finger to enter a pattern into a grid. This mechanism is far more to defend from key logger threat or brute force attack and man in the middle attack. Credit cards number, bank account’s number, password or anything that key in with keyboard are being capture as typing text. The log will be used by third party to steal money, frauding and more control that cause loses to the victim (Leonid Raskin, 2011). In this mechanism, password is so called kept in the gesture pattern. There is no password disclosure from user. In other words, there is no typing text info are being capture by key logger. In the other hand, this proposed system will avoid user from forget their created password. Gesture based password are widely used in mobile phone and tablet such as iPhone, iPad and Android. For Windows 8, Microsoft is a preparing a new way to log in to tablet PCs by letting users performs gestures on the screen instead of typing in letters and numbers. A user will choose a photo with some personal meaning to them, and create a sequence of taps, lines, and circles which must be performed in the right order to unlock the computer. The obvious question is whether such a system is as secure as typing a password on a keyboard. Given the kinds of simple passwords many users rely upon, the gesture-based system could well be more secure for numerous people. Microsoft acknowledges that smudges on the screen or recording devices could theoretically allow the gesture password to be compromised, but says the risk is very low. MATERIALS AND METHODS Kinect-based Gesture Password Recognition need user to use their gesture in order to login or authenticate to the system via Microsoft Kinect. Microsoft is a medium to capture the user’s gesture in order to gain access to the system (Huazhong Ning, 2009). In this mechanism the password will be replaced by the gesture that have been created or captured.

Fig. 5.1: Microsoft Kinect’s Components.


Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

Fig. 5.2: Microsoft Kinect’s Camera. Recognizing gestures as input allows computers to be more accessible for the physically-impaired and makes interaction more natural in a gaming or 3-D virtual world environment. Hand and body gestures can be amplified by a controller that contains accelerometers and gyroscopes to sense tilting, rotation and acceleration of movement -- or the computing device can be outfitted with a camera so that software in the device can recognize and interpret specific gestures (Olivier Bernier, 2009). A wave of the hand, for instance, might be the password. With Kinect Based Gesture Password Recognition, system’s user will require to create a gesture pattern that act as a password. When user capture and draw a gesture pattern, the database will request for matching the gesture pattern for authenticate. A complete image of this flow can be referring to figure 5.3. Gesture Types: In computer interfaces, two types of gestures are distinguished: We consider online gestures, which can also be regarded as direct manipulations like scaling and rotating. In contrast, offline gestures are usually processed after the interaction is finished; e. g. a circle is drawn to activate a context menu (Xiaoqin Zhang, 2011). Offline gestures: Those gestures that are processed after the user interaction with the object. An example is the gesture to activate a menu. Online gestures: Direct manipulation gestures. They are used to scale or rotate a tangible object. Gesture Implementation: Gesture recognition is useful for processing information from humans which is not conveyed through speech or type. As well, there are various types of gestures which can be identified by computers (Shaobo Hou, 2007).  Sign language recognition. Just as speech recognition can transcribe speech to text, certain types of gesture recognition software can transcribe the symbols represented through sign language into text.  For socially assistive robotics. By using proper sensors (accelerometers and gyros) worn on the body of a patient and by reading the values from those sensors, robots can assist in patient rehabilitation. The best example can be stroke rehabilitation.  Directional indication through pointing. Pointing has a very specific purpose in our society, to reference an object or location based on its position relative to ourselves. The use of gesture recognition to determine where a person is pointing is useful for identifying the context of statements or instructions. This application is of particular interest in the field of robotics.  Control through facial gestures. Controlling a computer through facial gestures is a useful application of gesture recognition for users who may not physically be able to use a mouse or keyboard. Eye tracking in particular may be of use for controlling cursor motion or focusing on elements of a display.


Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

 Alternative computer interfaces. Foregoing the traditional keyboard and mouse setup to interact with a computer, strong gesture recognition could allow users to accomplish frequent or common tasks using hand or face gestures to a camera.  Immersive game technology. Gestures can be used to control interactions within video games to try and make the game player's experience more interactive or immersive.  Virtual controllers. For systems where the act of finding or acquiring a physical controller could require too much time, gestures can be used as an alternative control mechanism. Controlling secondary devices in a car, or controlling a television set are examples of such usage.  Affective computing. In affective computing, gesture recognition is used in the process of identifying emotional expression through computer systems.  Remote control. Through the use of gesture recognition, "remote control with the wave of a hand" of various devices is possible. The signal must not only indicate the desired response, but also which device to be controlled.

Fig. 5.3: System Flow. 495

Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

Hand Gesture Algorithms: Depending on the type of the input data, the approach for interpreting a gesture could be done in different ways. However, most of the techniques rely on key pointers represented in a 3D coordinate system. Based on the relative motion of these, the gesture can be detected with a high accuracy, depending of the quality of the input and the algorithm’s approach. In order to interpret movements of the body, one has to classify them according to common properties and the message the movements may express. 3D Model-Based Algorithms:

The 3D model approach can use volumetric or skeletal models, or even a combination of the two. Volumetric approaches have been heavily used in computer animation industry and for computer vision purposes. The models are generally created of complicated 3D surfaces, like NURBS or polygon meshes (Rong Zhu and Zhaoying Zhou, 2004). The drawback of this method is that is very computational intensive, and systems for live analysis are still to be developed. For the moment, a more interesting approach would be to map simple primitive objects to the person’s most important body parts ( for example cylinders for the arms and neck, sphere for the head) and analyse the way these interact with each other. Furthermore, some abstract structures like super-quadrics and generalised cylinders may be even more suitable for approximating the body parts. Very exciting about this approach is that the parameters for these objects are quite simple. In order to better model the relation between these, we make use of constraints and hierarchies between our objects. Skeletal-Based Algorithms:

Instead of using intensive processing of the 3D models and dealing with a lot of parameters, one can just use a simplified version of joint angle parameters along with segment lengths. This is known as a skeletal representation of the body, where a virtual skeleton of the person is computed and parts of the body are mapped to certain segments (Ali Shahrokni, 2009). The analysis here is done using the position and orientation of these segments and the relation between each one of them( for example the angle between the joints and the relative position or orientation) Advantages of using skeletal models:  Algorithms are faster because only key parameters are analyzed.  Pattern matching against a template database is possible  Using key points allows the detection program to focus on the significant parts of the body


Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

Appearance-Based Models:

These models don’t use a spatial representation of the body anymore, because they derive the parameters directly from the images or videos using a template database. Some are based on the deformable 2D templates of the human parts of the body, particularly hands. Deformable templates are sets of points on the outline of an object, used as interpolation nodes for the object’s outline approximation (Rong Zhu and Zhaoying Zhou, 2004). One of the simplest interpolation function is linear, which performs an average shape from point sets, point variability parameters and external deformators. These template-based models are mostly used for handtracking, but could also be of use for simple gesture classification. A second approach in gesture detecting using appearance-based models uses image sequences as gesture templates. Parameters for this method are either the images themselves, or certain features derived from these. Most of the time, only one (monoscopic) or two (stereoscopic) views are used. Baum-Welch Algorithm: Determining whether a sequence of observations fits the model requires us to solve a couple of probability problems. The first can be expressed as the probability of a certain true state I at time step t given the data:

If we can compute this marginal probability at every time step in a sequence, we can predict the hidden states and determine to what degree the data fit our model of a gesture. Recall that our model is a Markov chain, or a sequence of “random” events, so we’re also interested in the transitions between states (Olivier Bernier, 2009). We can compute the marginal probabilities of the state being what it is (emission) and changing (transition) at every time step using a message-passing algorithm called the forward-backward algorithm where the messages are computed like:

The probability of the model being in a specific state I at time t and the probability of transition from state I to state j at time t can then be estimated:

Ultimately, our model is going to encode these probabilities in the transition matrix A and the emission matrix B. After we’ve computed the marginal probabilities at time t as above, we can re-estimate these model parameters using a compelling, easy-to-compute iterative optimization algorithm that was shown by Baum and Welch, the Baum-Welch algorithm, which consists of two update equations, alpha and beta: 497

Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

RESULTS AND DISCUSSION Kinect-based gesture password recognition provide secured alternative for the traditional password. This mechanism is more to protect from brute force attack, man in the middle attack, dictionary attack, keylogger etc. Since Microsoft Kinect only available in certain applications and games, but this mechanism can be applied in the current system. The Microsoft Kinect itself still under research in detecting hand gesture and finger gesture, but the password gesture can provide more secure for future gaming system. Kinect-based Gesture Password Recognition is another new approach to replacing password on log in mechanism. For decades, username and password are widely used for log in an account discovering major weakness that is passwords can often be stolen, accidentally revealed, or forgotten. For this reason, Internet business and many other transactions require a more stringent authentication process. No password or password less login mechanism will overcome a lot of password issue and bring much more benefits which are:  When a key pass transfer across the network without using conventional text format make cracking tools and method are unable to define the password.  Key logger is unable to capture typing text when there is no password key in involving.  Using gesture identification, much more easily to memorize than word phrase. Forgotten password issue will be reduce  Creating gesture module are replacing password text box will protect login system from brute force attack or dictionary attack.  Besides, less or more, it will reduce system developer burden in term of security control. Conclusion: In conclusion, this paper has introduced hand gesture password in order to login or authenticate to the system. And then we introduce a novel method to create a gesture pattern that act as a password. This hand gesture recognition system performs robustly despite variations in hand orientation, scale or articulation. Moreover, it works well in uncontrolled environments with background clusters. The introduction of this novel method of authentication has produced several advantages such as Internet business and many other transactions require a more stringent authentication process. Besides that, hand gesture password would contribute not only in highly secure system but also can be developed more on gaming industry. REFERENCES Ali Shahrokni, Tom Drummond, François Fleuret, Pascal Fua, 2009. “Classification-Based Probabilistic Modeling of Texture Transition for Fast Line Search Tracking and Delineation”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(3): 570-576, DOI: 10.1109/TPAMI.2008.236. Huazhong Ning, Tony X. Han, Dirk B. Walther, Ming Liu, Thomas S. Huang, 2009. “Hierarchical Space– Time Model Enabling Efficient Search for Human Actions”, IEEE Transactions on Circuits and Systems for Video Technology, 19(6): 808-820, DOI: 10.1109/TCSVT.2009.2017399. Jesús Martínez del Rincón, Dimitrios Makris, Carlos Orrite Uruñuela, Member and Jean-Christophe Nebel, 2011. “Tracking human position and lower body parts using Kalman and particle filters constrained by human biomechanics”, IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, 41(1): 26-37, DOI: 10.1109/TSMCB.2010.2044041. Leonid Raskin, Michael Rudzsky, Ehud Rivlin, 2011. “Dimensionality reduction using a Gaussian Process Annealed Particle Filter for tracking and classification of articulated body motions”, Computer Vision and Image Understanding, 115(4): 503-519, DOI: 10.1016/j.cviu.2010.12.002. Michael H. Lin, Carlo Tomasi, 2004. “Surfaces with occlusions from layered stereo”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(8): 1073-1078, DOI: 10.1109/TPAMI.2004.54. Olivier Bernier, Pascal Cheung-Mon-Chan, Arnaud Bouguet, 2009. “Fast nonparametric belief propagation for real-time stereo articulated body tracking”, Computer Vision and Image Understanding, 113(1): 29-47, January 2009, DOI: 10.1016/j.cviu.2008.07.001.


Aust. J. Basic & Appl. Sci., 6(8): 492-499, 2012

Rong Zhu and Zhaoying Zhou, 2004. “A real-time articulated human motion tracking using tri-axis inertial/magnetic sensors package”, IEEE Transactions on Neural Systems and Rehabilitation Engineering, 12(2): 295-302, DOI: 10.1109/TNSRE.2004.827825. Shaobo Hou, Aphrodite Galata, Fabrice Caillette, Neil A. Thacker, Paul A. Bromiley, 2007. “Real-time Body Tracking Using a Gaussian Process Latent Variable Model”, In Proceedings of the 11th IEEE International Conference on Computer Vision (ICCV 2007), pp: 1-8, 14-21. DOI: 10.1109/ICCV.2007.4408946. Wei Qu, A., Dan Schonfeld, 2007. “Real-Time Decentralized Articulated Motion Analysis and Object Tracking From Videos”, IEEE Transactions on Image Processing, 16(8): 2129-2138, DOI: 10.1109/TIP.2007.899619. Xiaoqin Zhang, Xinghu Shi, Weiming Hu, Xi Li, Steve J. Maybank, 2011. “Visual tracking via dynamic tensor analysis with mean update”, Neurocomputing, 74(17): 3277-3285, DOI: 10.1016/j.neucom.2011.05.006.


Similar Documents

Premium Essay

Compare and Contrast Xbox Kinect and Wii

...Similarities and Differences between Wii and Kinect Susan Skinner ENG 121 Karrie Higgins June 18, 2012 Similarities and Differences between Wii and Kinect If anyone is looking for a game console, where they can be active and in control of the game, there are two. There is the Wii and Xbox 360 with Kinect. People can really get into the game with both systems. They are similar but different as well. People can be active with both systems and not just sit on the couch or floor. Wii costs about $199 and it comes with the console, a controller, a nunchuck, one game, and a music CD. With the bundle, there is an additional four games of their choice, another controller, and another nunchuck. They can leave messages for other family members on a calendar-based message board. If they want to send messages to other people who are not in their home, they can use WiiConnect24. Surf the web with Wii Remote Plus and Opera browser. Access Netflix and Hulu plus right from the Wii console. They can get updates on the latest news from the internet in easy-to-browse categories. They can even get the weather from around the globe with the Forecast Channel. All that is needed is wireless internet access. There are different channels available, such as, Wii shop, Photo Channel, and Nintendo Channel. There is also Wii Fit so people can exercise. Xbox 360 with Kinect costs about $399 and it comes the console, Kinect sensor, wireless controller, for the Xbox, and two bonus games. It has......

Words: 477 - Pages: 2

Free Essay

Face Recognition

...REVIEWS, REFINEMENTS AND NEW IDEAS IN FACE RECOGNITION Edited by Peter M. Corcoran Reviews, Refinements and New Ideas in Face Recognition Edited by Peter M. Corcoran Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Mirna Cvijic Technical Editor Teodora Smiljanic Cover Designer Jan Hyrat Image Copyright hfng, 2010. Used under license from First published July, 2011 Printed in Croatia A free online edition of this book is......

Words: 33246 - Pages: 133

Free Essay

Gesture Recognition Technology could come to the rescue. Recognising this potential, a lot of growth has been made in the ‘Gesture Recognition Technology’. Now, gestures can be used as a form of input. They will help in bridging the gap between humans and machines. Now, with the advent of this technology, the need of a physical touch on the machine would be eliminated, and the machines would be able to interpret these gestures and operate. Using the concept of gesture recognition, it would be possible to point a finger at the computer screen so that the cursor will move accordingly. This could potentially make the potential input devices such as mouse, keyboard redundant. The report presents the details of the ‘Gesture Recognition Technology’, throws light on the fields where the technology can be applied, provides the technical know-how of the technology- how it works, and discusses the major solution Providers along with the product offerings. The report concludes with the mentioning possible issues which could limit the wide spread of the technology. 2. Gesture Recognition Technology Gesture recognition technology allows users to interact with their devices using simple and natural hand gestures. It utilizes advanced image processing and machine vision algorithms to track a user's hand gestures and convert them into commands. They also allow for detecting natural and intuitive hand gestures such as GRAB (closing of the hand) which supports all mouse functionalities including mouse......

Words: 1289 - Pages: 6

Free Essay

Secured Authentication 3d Password

...SECURED AUTHENTICATION: 3D PASSWORD INTRODUCTION: Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric......

Words: 4892 - Pages: 20

Free Essay


...Why Do We Gesture When We Speak? Robert M. Krauss Columbia University This is a pre-editing version of a paper published as: Krauss, R.M. (1998). Why do we gesture when we speak? Current Directions in Psychological Science 7, 5459. CD.3 July 30, 2001 Why Do We Gesture When We Speak? Robert M. Krauss1 Columbia University Students of human nature traditionally have considered conversational gestures—unplanned, articulate hand movements that accompany spontaneous speech— to be a medium for conveying semantic information, the visual counterpart of words.2 Over a century ago, Sir Francis Bacon put the relationship of gesture and language in the form of a simple analogy: "As the tongue speaketh to the ear, so the gesture speaketh to the eye" (Bacon, 1891). Although the extent to which gestures serve a communicative function is presently a matter of some controversy,3 there is accumulating evidence that communication is not the only function such gestures serve. Over the past several years my colleagues and I have explored the hypothesis, casually suggested by a remarkably diverse group of writers over the past 60 years, that gestures help speakers formulate coherent speech by aiding in the retrieval of elusive words from lexical memory. How might gesturing affect lexical retrieval? Human memory employs several different formats to represent knowledge, and much of the content of 1Address correspondence to Robert M. Krauss, Department of Psychology, Columbia......

Words: 4076 - Pages: 17

Premium Essay


...use language of gestures. These international and unique language has a long history. There are plenty of gestures and all the gestures have their origin but their meaning differs according to region. For example when we want to indicate that things are working according to our plans or when we want to approve something we us thumb up sign which is popular in American and European cultures . This gesture has its origination which goes back to the times of the gladiators . During these battles the audience had to decide give a life to gladiator or to kill him, so, if they were using thumb up gesture that was a sign that they want the gladiator to be dead . This harmless gesture translates into a rude and offensive gesture in Islamic and Asian countries. Sometimes we cross our fingers which is also a part of body language. It is considered as a sign of wishing for good luck or fortune. It also may have originated from the Pagan symbols that means to ward off evil. Usually people cross their fingers before telling a lie . That is why it is a positive and negative symbol as it interprets both luck or lies ( . Each of us uses the gesture of rabbit ears especially when shooting a photo but this also has a rude meaning which comes from the history . This gesture was meant......

Words: 360 - Pages: 2

Premium Essay

3d Password

...Definition of 3D password Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play. Introduction of 3D password Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let's say a virtual garage The 3D password is a multi......

Words: 602 - Pages: 3

Premium Essay

Impact on Telecommunication Company on Revenue Recognition Based on New Ifrs

...Executive Summary In November 2011, the FASB and IASB released the Exposure Draft: Revenue Recognition in Contracts with Customers which aims to replace the existing FRS 18 Revenue. The exposure draft aims to improve and streamline current revenue recognition methods and provide a more robust framework to do so. As a result, revenue recognition under the exposure draft is carried out differently in a number of ways. Maxis Berhad is an investment holding company which provides telecommunication, internet and corporate services. It engages in multiple activities and recognises revenue from these activities using the principles laid down in FRS 18. Revenue is recognised only when it can be measured reliably and the company is expected to receive economic benefits. The company also lays out particular conditions to apply revenue recognition to different activities. As a result, if the company is to implement the exposure draft it would have to face several changes in the way it recognises revenue. Specifically, activation fees for various subscription plans will have to be recognized as revenue over the expected contractual period of those plans, rather than allocated as part of the revenue for the included monthly service and handset. This would also require Maxis to determine an estimate for expected lifespan of customers’ contract, taking into account possible renewals. In addition, Maxis will also have to change the way it recognises revenue for its prepaid mobile starter...

Words: 4300 - Pages: 18

Free Essay


...Recognition-based awards are given when employees go above and beyond. Employees are usually given plaques, trophies, certificates, small gifts, vacations, and dinners with company officials as a way to recognize their achievements. Cash awards are sometimes also given. Some examples of awards are outstanding achievement, excellent customer service, and length of service award. Awards are also given out to say “thank you”, “job well done”, and “you are valued as an employee”. When managers decide to give out recognition awards they have to have some guidelines that they need to follow. They need to first make sure that they have a clearly defined purpose for the award and that all team members know what it is. They also have to determine the type of award, who is eligible, and what criteria needs to be meet. Lastly they will need to decide if there is going to be award money, how it is going to funded and paid out and how the award is going to be given. Having a purpose for awards helps employees know why and how the award is going not only benefit themselves but the company as a whole. By informing employees about the purpose of the award all helps to encourage the behavior that is being awarded. Managers also need to make sure that eligibility is very clear. They need to make sure that all employees understand who is and who isn’t eligible without any room for misunderstanding. The criteria also needs to be very clear without any room for misunderstanding. Lastly,......

Words: 305 - Pages: 2

Premium Essay

Language and Gestures

...Cheryl Rowan Prof. Kalos Intro to Cultural Anthropology 5 August 2012 Language and Gestures Although it is often very overlooked, language is an extremely important part of culture. It is how we communicate by putting meaning to words. Just as culture is different everywhere, language is as well. In Federica Sgorbissa’s article, “Gestures That Speak”, she discusses the way humans have a natural instinct to pronounce words differently when obtaining different meanings or emotion, as well as our natural instinct to use gestures as a form of language. It is said that we use gestures to highlight language structure to make our message easier to understand. In a study in Italy, they had people listen to two comments that could easily be taken different ways, giving the sentence two different meanings, and then where shown others with a video. Without the visual stimuli of gestures shown while being spoken, more got the only audio ones wrong. This along with many other studies have shown the importance of gestures in language. Communication is an important aspect of culture. Culture is learned, through experience, environment, and people, but it is learned through communication, which is why language is so important. According to the Sapir-Whorf Hypothesis, “linguistic differences encode culture”, language can influence your perspective. Language enables us to share our beliefs and values and learn from each other, as well as learning about other cultures. Even simply...

Words: 604 - Pages: 3

Free Essay

Gesture Recognition

...Gesture recognition is a topic in IT with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion but typically originate from facial or hand movements. Current focuses in the field include emotion recognition from face and hand gestures however the identification and recognition of posture, gait, proxemics, and human behaviors is also the subject of gesture recognition techniques. Although not wearable, the use of gesture recognition is, in fact, only possible through the use of the human body and motion (akin to any other wearable technology). In terms of fitness and health management, gesture recognition software is at the forefront of post injury and post-op physical therapy. Specifically, a company called GestureTek, through their proprietary Interactive Rehabilitation and Exercise System (IREX), “uses immersive video gesture control technology to place patients into virtual sport or gaming environments where they are guided through clinician prescribed therapeutic exercise regimes. The IREX virtual reality environments are specifically designed to rehabilitate the patient in the precise manner recommended by the clinician. The motion of the patient can be monitored and reported to describe functional improvement in the patient’s range of motion, control of motion and balance over the course of their treatment.” Being able to independently monitor progress, whilst also making rehabilitation fun,......

Words: 294 - Pages: 2

Free Essay

Password Security

... [pic] Password Security And Other Effective Authentication Methods [pic] Table of Contents Introduction 1 User Accounts 1 Account and Password Policy 2 Password Attacks 4 Authentication Methods and Password Management 5 Public Key Infrastructure 6 Single Sign-On (SSO) 6 One-Time Password (OTP) Tokens 7 Biometrics 7 Fingerprints 7 Face Scans 7 Retina Scans 7 Iris Scans 7 Palm Scans 8 Hand Geometry 8 Heart Patterns 8 Voice Pattern Recognition 8 Signature Dynamics 8 Keystroke Patterns 8 Password Managers 8 Conclusion 9 Bibliography 10 Introduction Human beings are arguably the weakest link in computer and information security. People pose such a significant threat to their own computer networks and personal information simply because they don’t keep password security in the forefront of their mind. This is one of the reasons passwords are considered a poor security mechanism. Still, passwords are the most common method for user authentication on computer systems and websites. Passwords are so easily hacked and used to steal personal information such as bank account credentials, credit card numbers, etcetera, contributing to the significant growth of identity theft, most of which could be prevented by using strong passwords and not writing them down. End user education on more secure authentication methods such as strong password creations and two factor authentication can help to improve cyber security...

Words: 2777 - Pages: 12

Free Essay

Insignificant Gestures

...“Insignificant Gestures” “Insignificant Gestures” is a short story written by Jo Cannon in 2007. The story deals with the narrator’s experiences as a young expatriate doctor in Africa and how they have influenced him and his life. The conditions in Africa when the narrator worked there where very rough and characterised by poverty. The only consolation in his otherwise gloomy everyday life was Celia, the native servant working for him. Celia shared his passion for drawing and lit up his existence. When she by an unfortunately accident dies, the narrator is crushed and filled with guilt. To forget about the events in Africa he retrains as psychiatrist since he cannot bear to witness another death. The narrator of the story is a first person non-omniscient speaker who tells the story in past tense. The story is composed of a series of flashbacks which the narrator is looking back upon from the “present” where he is now working as a psychiatrist. All the flashbacks take place in Africa and are memories of Celia and his life living there. Celia Dimba, the narrator’s housekeeper, is a native African. Even though the narrator is against having a servant, based on the immoral symbolism associated with them, he is convinced by the argument, that Celia’s family’s wellbeing depends on her. Celia is never in any kind of hard labour which is partly because of the narrator’s simple life and long working hours but also because of the fact that, he feels ashamed of the......

Words: 1049 - Pages: 5

Free Essay

Password Strength Is Not Password Security

...Password Strength is not Password Security Kevin Marino November 11, 2013 MSCC697, Regis University Professor Garcia Password Strength is not Password Security When password security becomes the topic of conversation it generally focuses on how strong a password is and whether or not the user reuses a password across multiple sites. While these aspects can affect password security, there are certain measures that the server side of the authentication process can implement to increase security without the user changing their habits. This approach would solve many of the security problems that authentication servers are facing. The goal of this study is to determine a set of best practices that can be implemented to increase security without the intervention of the user. While passwords may not be around forever, due to the introduction of new authentication hardware, they will be around until one of these hardware become mainstream and readily available to the general public. These practices will offer greater security until that time comes. User authentication in today's world generally requires a user name and a password. Though the strength of the user's password is generally seen as the base line for security, the authenticating server can implement certain security measures that can compensate for weak passwords. One main factor for considering different security measures is the advancement of brute force attack......

Words: 1960 - Pages: 8

Free Essay


...A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword. Sentries would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web sites, and even reading the morning newspaper online. Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words may be harder to guess, a desirable property. Some passwords are formed from multiple words and may more accurately be called a passphrase. The term passcode is sometimes used when the secret information is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be easily memorized and typed. Authentication by password is less secure than authentication which uses......

Words: 253 - Pages: 2