Palm Biometrics: Testimony of Security
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 6
Abstract
Now a days, whenever we think of developing a system or software, the first thing that comes in one’s mind is Security. We always think whether the given system is secure enough to use or not? This question arises because Security is no more secure word in today’s world because of unlawful persons. So, to provide assertion there comes an epoch i.e. BIOMETRICS. This field has gained wide popularity all over the universe, as it recognizes our Biological or Physiological characteristics and assures whether the person is approved or not to use the system. Biometrics is an authentication tool and its level of security is much higher as compared to passwords or PIN. This paper presents a Biometric System based on palm geometry oriented to contact based but peg free scenario. This paper has mainly four innovative aspects: A brief description about Biometrics. Secondly, comparisons between various technologies of Biometrics like Face, Hand, Iris and Finger based on different parameters. Thirdly, it explains the basic methodology used in Biometric Systems. Last but not the least recent work has been discussed in brief.
Authors and Affiliations
Nancy*
Solution for Premature Entries Deficit in IP Networks
The Internet is to connect multiple computer networks for linking many devices. Service disruptions occur in many networks through link and node failures. Therefore, for each service providers, the major challenge...
NEURAL NETWORK CORRELATION BASED SIMILARITY EVALUATION WITH ZERNIKE MOMENTS FOR THE POSE-INVARIANT FACE RECOGNITION
Human face recognition is best application in pattern recognition for identification and recognition. Development of face recognition system is increasing day by day in market and research organizations. Different param...
FLEXURAL STRENGTH OF TWO-WAY RC SLABS RETROFITTED WITH BASALT FIBER REINFORCED POLYMER (BFRP)
Many older structures are in the need of strengthening the existing civil engineered infrastructure. The reasons are deterioration by ageing or corrosion caused by environmental factors, increase in the load b...
Anonymity Set Location Privacy Scheme in Manet
In hostile environments, the adversary can launch traffic analysis against intercept able routing information embedded in routing messages and data packets. The adversaries on tracing network routes and inferring...
FiWi – FUTURE GENERATION BR OADBAND ACCESS TECHN OLOGY
As today’s generation is now became the slave of different internet services at every step of their life. Hence, different researches are carried out continuously sin ce past decade to enhance the performan...