Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Automated Lip Reading Technique for Password Authentication

Sharmila Sengupta, Arpita Bhattacharya, Pranita Desai, Aarti Gupta Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Download full text
  1. Sharmila Sengupta, Arpita Bhattacharya, Pranita Desai and Aarti Gupta. Article: Automated Lip Reading Technique for Password Authentication. International Journal of Applied Information Systems 4(3):18-24, September 2012. BibTeX

    	author = "Sharmila Sengupta and Arpita Bhattacharya and Pranita Desai and Aarti Gupta",
    	title = "Article: Automated Lip Reading Technique for Password Authentication",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 3,
    	pages = "18-24",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"


As technology is starting to conquer every strata of the society, the war for protecting confidential data from being intercepted is growing intense by the hour. Biometric- security stands out as the most secure form of authentication in high security zones such as defense, space missions and research head-quarters. Today, forms of password-protection range from face-recognition to retina -scan. Here, we develop a system for recognizing and converting lip movement of an individual into a recognized pattern which is set as a password for the system using image-processing. This system is also a break-through for providing people with motor-disabilities a robust and easy way of protecting their data. By capturing and tracing the successive movement of lips during speech, the corresponding word can be detected. The captured images are represented as points on a two-dimensional flat manifold that enables us to efficiently define the pronunciation of each word and thereby analyze or synthesize the motion of the lips. The motion of lips helps us track the word syllable-by-syllable. With multiple levels of image processing, it becomes possible to set the matching parameters to a very close value, hence not allowing any brute-force or other infamous hacking techniques to break into the user's system. This lip reading technique also serves applications in areas where communication via direct speech is not possible.


  1. Jui-Cheng Yen and Jiun-In Guo, "A new image encryption algorithm and its VLSI architecture," in Proc. IEEE workshop Signal Processing Systems, 1999,pp. 430-437.
  2. I. Ozturk, I. Sogukpinar, "Analysis and comparison of image encryption algorithm," Journal of transactions on engineering, computing and technology December, vol. 3,2004,p. 38.
  3. M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS'02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vison System, 2002.
  4. S. S. Manicaam. , G. Nikolaos, and Bourbakis, "Lossless image compression and encryption using SCAN," Journal of Patterns Recognition, vol. 34, no. 6, 2001, pp. 1229-1245.
  5. S. Kumar, D. K. kumar, M. Alemu, and M. Burry, "EMG based voice recognition," In Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004.
  6. G. Gravier A. Garg G. Potamianos, C. Neti and A. W. Senior, "Recent Advances in the automatic recognition of audio-visual speech," Proc. Of the IEEE, vol. 91,2003.
  7. K. Otani, and T. Hasegawa, "The image input microphone- A new nonacoustic speech communication system by media conversion from oral motion images to speech," IEEE journal on Slected Areas in Communications, vol. 13,no. 1, pp. 42-48, January1995.
  8. Duchnowski, P. , Hunke, M. , Bsching, D. , Meier, U. , and Waibel,A. 1995. Toward movement-invariant automatic lipreading and speech recognition. In Proc. ICASSP'95, pp. 109–112.
  9. Michal Aharon, Ron Kimmel, Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction, International Journal of Computer Vision 67(3), 297–312, 2006.
  10. Mohammad Ali Bani Younes and Aman Jantan,Image Encryption Using Block-Base Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
  11. Bregler, C. , Hild, H. , Manke, S. , and Waible, A 1993. Improving connected letter recognition by lip reading. In proc. IEEE Int. Conf. on ASSP, pp. 557-560.
  12. Dinesh Kumar Jain N. ; Palaniswamy N, Raaja Sarabhoje, G. Enhanced Blowfish algorithm using bitmap image pixel plotting for security improvisation, 2nd International Conference on Education Technology and Computer (ICETC), 2010.


Lip-reading, lip-contour, syllable tracking, silent-password, threshold analysis, image encryption