Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
In this recent information technology biometric techniques are being used increasingly against identity theft. The basic need of biometric applications provides a measurable physical characterstics is a more reliable indicator of identity than legacy systems such as PASSWORDS and PINS.The necessity for security in fields such as improving airport security,strengthening the national borders, in travel documents,in preventing ID theft has brought the need to develop an able and efficient method for correct classification of personal authentication ,many countries begin to issue Edriving License and Epassports containing biometric data for their citizens. Biometric template recognition is the challenging problem in the real world applications. This project deals with the fingerprint classification and recognition systems. which consists of extracting and matching of minutiae from the input image.In this project a new statistical ecc method is provided for finger print biometric applications. User authentication is verified based on the elliptical curve that is generated for each finger print image that are stored in the database. This approach gives better results in realtime applications from database type of attacks.
Authors and Affiliations
Prathima Devi Sirivella#1 , Mrs D. Raaga Vamsi#2
Security requirements in Software Requirements Engineering
In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirement...
A Survey Of Key Management Schemes In Wireless Sensor Networks
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...
LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
In digital image watermarking authentication methods and techniques, the original image will be watermarked with a text, image, audio or any signature. To overcome the uneven and enormous distribution of multi...
Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks,presenting a challenger model for selective jamming attacks, which may give to...
Table Detection and Extraction from Image Document
Tables make information easier to understand and perceive than regular text block. Now days, it becomes popular structure for information representation. Format of tables differs and change according to need of rep...