CFP last date
22 April 2024
Reseach Article

Development of Multimedia Application for Smartphones

by M. A. Mohamed, A. I. Abdel-fatah, Bassant M. El-den
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 2
Year of Publication: 2014
Authors: M. A. Mohamed, A. I. Abdel-fatah, Bassant M. El-den
10.5120/16564-6228

M. A. Mohamed, A. I. Abdel-fatah, Bassant M. El-den . Development of Multimedia Application for Smartphones. International Journal of Computer Applications. 95, 2 ( June 2014), 4-8. DOI=10.5120/16564-6228

@article{ 10.5120/16564-6228,
author = { M. A. Mohamed, A. I. Abdel-fatah, Bassant M. El-den },
title = { Development of Multimedia Application for Smartphones },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 2 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number2/16564-6228/ },
doi = { 10.5120/16564-6228 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:18:22.021019+05:30
%A M. A. Mohamed
%A A. I. Abdel-fatah
%A Bassant M. El-den
%T Development of Multimedia Application for Smartphones
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 2
%P 4-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security and verify the user's identity has become one of the biggest concerns of institutions and individuals; this interest emerged many types of authentication. Security field uses three different ways; in the oldest documentation of these methods depending on the specific information such as a password or name. The second type depends on something you have his key, such as a smart cards. The last of these species depends on the dynamic qualities for biometry, which measures the properties of natural or behavioral uniqueness in people to document or rooting their identification and verification including famous biometrics (e. g. fingerprint; retina; iris, as well as some facial characteristics and features), also includes personal behaviors (e. g. signature; voice, and walk). All of this biometrics has its advantages that are compatible with the requirements of the different security systems. The proposed implementation model has come as an idea, since today's mobile phones are computers in medium. They are used in running e-mails; agendas; storing data; markets; etc. , providing some approaches of security model based on face recognition and/or fingerprint as biometrics approaches for authentication on mobile phones. A new level of mobile phone user's security approach is presented this has been tested with the database. The algorithms have been first profiled in MATLAB and then implemented on android based smart-phones. The balance between accuracy and computation complexity on the application is an important mission to achieve it. In this paper the face recognition security for mobile phones has been represented and applied for face by using principle Component Analysis (PCA) technique.

References
  1. R. Ballagas, J. Borchers, M. Rohs, J. G. Sheridan, "The smart phone: ubiquitous input device", IEEE Pervasive Computing, vol. 5, issue 1, March 2006, pp. 70-77, doi: 10. 1109/MPRV. 2006. 18.
  2. V. Loscri, M. Tropea and S. Marano, "Voice and video telephony services in smartphone", EURASIP Journal on Wireless Communications and Networking, vol. 2006, issue 2, 2006, pp. 16-24, doi: 10. 1155/WCN/2006/84945.
  3. L. Tarrataca, A. C. Santos and J. M. P. Cardoso, "The current feasibility of gesture recognition for a smartphone using J2ME", Proc. the 2009 ACM symposium on Applied Computing, 2009, pp. 1642- 1649, doi: 10. 1145/1529282. 1529652.
  4. S. Kulkarni and P. Agrawal, "Smartphone driven healthcare system for rural communities in developing countries", Proc. of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments, 2008, Article No. 8, doi: 10. 1145/1515747. 1515758.
  5. N. Ai, Y. Lu and J. Deogun, "The smart phones of tomorrow", ACM SIGBED Review, vol. 5, issue 1, Article No. 16, Special issue on the RTSS forum on deeply embedded real-time computing, 2008, doi: 10. 1145/1366283. 1366299.
  6. Y. Fei, L. Zhong and N. K. Jha, "An Energy-Aware Framework for Dynamic Software Management in Mobile Computing Systems", ACM Transactions on Embedded Computing Systems, Vol. 7, No. 3, Article 27, April 2008, doi: 10. 1145/1347375. 1347380.
  7. Sabri M. , Nurulhuda I. , "Mobile to server face recognition: A System overview," World Academy of Science, Engineering and Technology, vol. 69,pp. 767-771, 2010.
  8. P. Jonathon Phillips, Patrick J. Rauss, and Sandor Z. Der. FERET (Face Recognition Technology) Recognition Algorithm Development and Test Results. Technical Report ARL–TR–995, Army Research Laboratory, October 1996.
  9. F. Prokoski. History, Current Status, and Future of Infrared Identification. In Proceedings of IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications, pages 5–14, June 2000. Facial Thermo gram.
  10. Chin-Seng Chua, Feng Han, and Yeong-Khing Ho. 3D Human Face Recognition using Point Signature. In International Conference on Face and Gesture Recognition, pages 233–238, 2000.
  11. http://cswww. essex. ac. uk/mv/allfaces/faces94. html Last visit at 05-march-2014.
  12. Sharma M. , Singh S. , "Practical implementation of matlab based approach for face detection using feed forward network", Journal of Computer Science and Information Security, vol. 9, pp. 284-290, 2011.
  13. L. Ma and K. Khorasani, "Facial expression recognition using constructive feedforward neural networks", IEEE Transactions on Systems, Man and Cybernetics, Part B, Vol. 34, No. 3, June 2004, pp. 1588-1595.
  14. Choi K. , Toh K. A. , Byun H. , "Real-time training on mobile devices for face recognition application," Elsevier Pattern Recognition, vol. 44, pp. 412-320, 2011.
  15. Sabri M. , Nurulhuda I. , "Mobile to server face recognition: A System overview," World Academy of Science, Engineering and Technology, vol. 69, pp. 767-771, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Smartphone's Android Multimedia Face Recognition Software Development