Fingerprint Identification Using Minutiae Matching
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 6
Abstract
In the modern computerized world, it has become more and more important to authenticate people in a secure way. Modern applications like online banking or online shopping use techniques that depend on personal identification numbers, keys, or passwords. Nevertheless, these technologies imply the risk of data being forgotten, lost, or even stolen. Therefore biometric authentication methods promise a unique way to be able to authenticate people. A secure and confidential biometric authentication method is the utilization of fingerprints. Usually a technique called minutiae matching is used to be able to handle automatic fingerprint recognition with a computer system.
Authors and Affiliations
S. Mousmi1 , Dr. T. Meyappan2 , M. Sc. , M. Phil, M. B. A, (M. Tech), Ph. D.
Implementation of Queuing Algorithm in Multipath Dynamic routing architecture for effective and secured data transfer in VoIP
VoIP is a technology that allows people to communicate each other with low cost effort in internet service. Quality of Service (QOS) is essential to secure and deliver a data in IP network. Such as (Delay, Jitter a...
ACCIDENT AVOIDANCE AND DETECTION ON HIGHWAYS
Technological approaches for detecting and monitoring fatigue levels of driver fatigue continue to emerge and many are now in the development, validation testing, or early implementation stages. Previous studie...
32 Bit Parallel Multiplier Using VHDL
In this paper, design of 32-bit parallel multiplier is presented, by introducing Carry Save Adder (CSA) in partial product lines. The multiplier given in this paper is modeled using VHDL (Very High Speed Integration Hard...
Implementation of Three Level Integrated AC-DC Converter with Pulse Width Modulation
In this paper, implementation of three-level integrated ac–dc converter with pulse width modulation is presented. The proposed converter combines with the operation of the boost power factor correction and the three-leve...
Retrieval of Image by Combining the Histogram and HSV Features Along with Surf Algorithm
Content Based Image Retrieval (CBIR) In this paper Surf features along with the content properties of an image are used. Input will be one image file and software will search for the same images in database folder...