Human Authentication Using Biometric Recognition
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 4
Abstract
Authentication is the primary requirement for any system by means of privacy & security. Physiological biometrics is based on direct measurements of a part of the human body, such as finger-scan, facial scan, iris-scan, hand-scan, and retina-scan. Behavioral biometrics is based on measurements and data derived from an action and therefore indirectly measure characteristics of the human body, such as voice-scan and signature-scan. The element of time is essential to behavioral biometrics because it may change with time. In this paper the discussion is made on various aspects for designing a biometric recognition system for human authentication and related topics to the particular feature of biometric parameter.
Authors and Affiliations
Shailendra Kumar Dewangan
Effect of Different Modulation on PAPR and Its Reduction
As the technology grow in wireless communication, the concept of multicarrier modulation come into picture. Orthogonal Frequency Division Multiplex(OFDM) prove itself invaluable for multicarrier modulation.OFDM subcarrie...
PATIENT HEALTH MONITORING SYSTEM (PHMS) USING IoT DEVICES
Internet of Things (IoT) is the emerging paradigm, which contains huge amount of smart object and smart devices connected to the internet for communicating with each other. IoT devices are used in many fields which make...
Refined Markov clustering Algorithm for Mycobacterium Tuberculosis Protein Sequence analysis
Clustering of proteins is an essential as it helps to infer biological function of a new sequence. In this paper, the protein sequences of Mycobacterium Tuberculosis have been clustered based on its space group using Ref...
A Clustering approach in Mobile Ad-hoc Networks Routing
A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. MANETs are restricted to a local area of wireless devices, while others may be connected to the I...
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center
The main aspect of any cloud application is to provide simultaneous access to number of users by reducing the cost of maintenance. This is mainly achieved by the process of implementing virtualization effectively. Virtua...