Human Authentication Using Biometric Recognition
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 4
Abstract
Authentication is the primary requirement for any system by means of privacy & security. Physiological biometrics is based on direct measurements of a part of the human body, such as finger-scan, facial scan, iris-scan, hand-scan, and retina-scan. Behavioral biometrics is based on measurements and data derived from an action and therefore indirectly measure characteristics of the human body, such as voice-scan and signature-scan. The element of time is essential to behavioral biometrics because it may change with time. In this paper the discussion is made on various aspects for designing a biometric recognition system for human authentication and related topics to the particular feature of biometric parameter.
Authors and Affiliations
Shailendra Kumar Dewangan
Spectral Subtraction for Speech Enhancement and Compression Using LPC
Pre-Processing of Speech Signal is very crucial in the applications where silence or background noise is completely undesirable. The degradation of speech due to the presence of noise causes severe difficulties in variou...
An Approach of Zero Correlation Linear Cryptanalysis
Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which ar...
EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES
Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...
Optimistic Rough Sets Attribute Reduction using Dynamic Programming
Nowadays, and with the current progress in technologies and business sales, databases with large amount of data exist especially in Retail Companies. The main objective of this study is to reduce the complexity of the cl...
DIVERSE ROUTING IN NETWORKS WITHOUT DISJOINTNESS CONSTRAINT USING PROBABILISTIC FAILURES
To develop a various routing theme for coping with multiple, presumably related to failures. Isolated single link failures is effectively restrained disjoint path protection, however mechanisms for sick from multiple fai...