Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 5
Abstract
In this recent information technology biometric techniques are being used increasingly against identity theft. The basic need of biometric applications provides a measurable physical characterstics is a more reliable indicator of identity than legacy systems such as PASSWORDS and PINS.The necessity for security in fields such as improving airport security,strengthening the national borders, in travel documents,in preventing ID theft has brought the need to develop an able and efficient method for correct classification of personal authentication ,many countries begin to issue Edriving License and Epassports containing biometric data for their citizens. Biometric template recognition is the challenging problem in the real world applications. This project deals with the fingerprint classification and recognition systems. which consists of extracting and matching of minutiae from the input image.In this project a new statistical ecc method is provided for finger print biometric applications. User authentication is verified based on the elliptical curve that is generated for each finger print image that are stored in the database. This approach gives better results in realtime applications from database type of attacks.
Authors and Affiliations
Prathima Devi Sirivella#1 , Mrs D. Raaga Vamsi#2
DAEMON Decisional Access in Emission Mechanism Of Networks
The Decisional access method of mining is a process of retrieving data with some assumption decision from the data bases which are inter connected with databases Many of the organizations are providing design of th...
Identity Security Using Authentication and Authorization in Cloud Computing
The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to thei...
An Android Application for Google Map Navigation System Implementing Travelling Salesman Problem
Genetic Algorithm is used to determine the optimum route on Google map and solves the Travelling Salesman problem. This is implemented using Google API and Android OS. Different Geo Locations (Latitude and Longitude) are...
Effective Searching Shortest Path In Graph Using Prim’s Algorithm
Prims algorithm is studied the shortest path problem in the greedy method which is used to select a subset of the edge such that spanning tree is formed and the weight of the edges is minimal. There are various shortest...
Precision-Aware and Quantization of Lifting Based DWT Hardware Architecture
This paper presents precision-aware approaches and associated hardware implementations for performing the DWT. By implementing BP architecture and also presents DS design methodologies. These methods enable use of an opt...