Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
In this recent information technology biometric techniques are being used increasingly against identity theft. The basic need of biometric applications provides a measurable physical characterstics is a more reliable indicator of identity than legacy systems such as PASSWORDS and PINS.The necessity for security in fields such as improving airport security,strengthening the national borders, in travel documents,in preventing ID theft has brought the need to develop an able and efficient method for correct classification of personal authentication ,many countries begin to issue Edriving License and Epassports containing biometric data for their citizens. Biometric template recognition is the challenging problem in the real world applications. This project deals with the fingerprint classification and recognition systems. which consists of extracting and matching of minutiae from the input image.In this project a new statistical ecc method is provided for finger print biometric applications. User authentication is verified based on the elliptical curve that is generated for each finger print image that are stored in the database. This approach gives better results in realtime applications from database type of attacks.
Authors and Affiliations
Prathima Devi Sirivella#1 , Mrs D. Raaga Vamsi#2
A Survey Of Key Management Schemes In Wireless Sensor Networks
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...
Detecting and Alerting Tcp –Ip Packets againt TCP SYN attacks
Transmission Control Protocol Synchronized ( TCP SYN) Flood has become a problem to the network management to maintain the network server from being attacked by the malicious attackers. Possibly one of the problems...
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the...
A Brief Survey On Document Clustering Techniques Using MATLAB
Document clustering is a more specific technique for unsupervised document organization, it is generally considered to be a centralized process. Clustering methods can be used to automatically group the retrieved documen...
Ajax Complexity
For century, This paper discuss the new era of Internet application and user experience, Ajax is a new technology and this paper address the Software system complexity and Algorithms for better feature and performa...