Finger Vein Based User Identification Using Differential Box Counting
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches the vascular pattern in an individual’s finger to previously obtained data. Finger vein recognition uses the unique patterns of finger veins to identify individuals at a high level of accuracy. Most existing biometric systems have high complexity in time or space or both. This paper presents a user identification system framework using a novel finger-vein technology for authentication, which provides high security and reliability than the other identification technologies. The proposed algorithm is Fractal Model using Differential Box Counting method (DBC). The performance parameters of the proposed algorithm are compared with the existing algorithm, (Fractal model using blanket technique) and the equal error rate is calculated to be 0.05%. This approach not only has precise estimated parametric values but also consumes less computational time.
Authors and Affiliations
Athira Chandra, Jaishree. M, Vetrivelan. P
Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with i...
Merits and Demerits of Open Source Software
Open source software (OSS) is one of the fastest growing movements towards the less budget and cheaper software. Within the technical development of the world, yet we have seen that OSS will become a viable alternati...
Streaming of High Quality videos using Cloud
Recently many mobile entertaining applications have been launched, but most popular app like Facebook, Twitter, YouTube have large demand among users. But these media applications are limited by the unstable wireless...
Phishing Detection In Selected Feature Using Modified SVM-PSO
The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand t...
Key Frame Extraction and Shot Change Detection for compressing Color Video
Progress intechnology is rapidly increasing now-a-days. The number of user are increasing but the resources are limited. So this project is to effectively and efficiently use the limited and expensive resource, soas...