Palm Vein Extraction and Matching For Personal Identification

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract : The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords are introduced as alternative techniques to textual passwords. Biometrics is used for human recognition which consists of authentication, verification and recognition. A CCD camera will capture the image and this image will process through various algorithms. In future this image will be compared for personal authentication. In this paper, three algorithms are proposed to extract the images taken by CCD camera.

Authors and Affiliations

Mr. Vishal U. Bhosale , Mr. Onkar S. Kale , Mr. Mahesh W. Pawar , Mr. Roshan R. Patil , Mr. Pritam S. Patil , Prof Mrs. Sonali Madankar

Keywords

Related Articles

 Comparative Analysis of Collaborative Filtering Technique

 Today it is almost impossible to retrieve information with a keyword search when the information is spread over several pages. The Semantic Web is an extension of the current web in which information is given &nb...

Improving the Security Layer logic for a Health Care Information System

Abstract: In a previous paper we suggested an information system to store, manage and treat millions of the gathered patient’s information. We were able to propose a reliable application, which is able to fulfill the mos...

Review on Green Networking Solutions

Abstract : Empirical studies have revealed that a significant amount of energy is lost unnecessarily in the network architectures, protocols, routers and various other network devices. Thus there is a need for techniques...

 A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network

 The most prominent applications of wireless sensors networks are coverage, Target detection and field surveillance. This paper investigates detection of a target traversing the region being monitored by some nu...

 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection against DDOS.

 Abstract: Multiple-path routing protocols allow data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traf...

Download PDF file
  • EP ID EP142081
  • DOI 10.9790/0661-16296468
  • Views 111
  • Downloads 0

How To Cite

Mr. Vishal U. Bhosale, Mr. Onkar S. Kale, Mr. Mahesh W. Pawar, Mr. Roshan R. Patil, Mr. Pritam S. Patil, Prof Mrs. Sonali Madankar (2014).  Palm Vein Extraction and Matching For Personal Identification. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 64-68. https://europub.co.uk/articles/-A-142081