Finger Vein Based User Identification Using Differential Box Counting
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches the vascular pattern in an individual’s finger to previously obtained data. Finger vein recognition uses the unique patterns of finger veins to identify individuals at a high level of accuracy. Most existing biometric systems have high complexity in time or space or both. This paper presents a user identification system framework using a novel finger-vein technology for authentication, which provides high security and reliability than the other identification technologies. The proposed algorithm is Fractal Model using Differential Box Counting method (DBC). The performance parameters of the proposed algorithm are compared with the existing algorithm, (Fractal model using blanket technique) and the equal error rate is calculated to be 0.05%. This approach not only has precise estimated parametric values but also consumes less computational time.
Authors and Affiliations
Athira Chandra, Jaishree. M, Vetrivelan. P
Implementation of Wireless Sensor Hub to Support Protocols Interoperability
This Paper presents a wireless sensor hub which supports protocols interoperability such as MiWi and WiFi protocol. The wireless sensor network/hub (WSN) is a combination of sensing, computation, and communication in...
Real Time Digital Signal Processing Based On Optical OFDM
The adaptability provided for Eventually Tom's perusing OFDM may be connected as transfer speed granularity to the clients. Done such an approach that every about them will make guaranteed An certain level for servic...
Cloud-based Mobile Social Networking Video Monitoring
The latest cloud computing knowledge with wealthy possessions to recompense for the limitations of mobile devices and connections can potentially provide a perfect proposal to hold up the desired mobile services. We...
Achieving Data Security Using Inter Clouds
Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive inf...
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...