Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014

Abstract

Spoof attack suppression by the biometric information incorporation is the new and modern method ofavoid and as well suppression the attack online as well Off line . Wireless networks provide variousadvantages in real world. This can help businesses to increase their productivity, lower cost andeffectiveness, increase scalability and improve relationship with business partners and attractcustomers. In recent decades, we have witnessed the evolution of biometric technology from the firstpioneering works in face and voice recognition to the current state of development wherein a widespectrum of highly accurate systems may be found, ranging from largely deployed modalities, such asfingerprint, face, or iris, to more marginal ones, such as signature or hand. Fingerprints cannot lie, butliars can make fingerprints". Unfortunately, this paraphrase of an old quote attributed to Mark Twain1has been proven right in many occasions now. And not only for fingerprints, but also for many otherbiometric traits such as face, iris, voice or even gait. Every technology has its own time. Since the firstpioneering works on automatic voice and face recognition over 40 years ago [1]"“[2][3], steady andcon]tinuous progress has been made in the development of biometric technology. Driven by the veryappealing new security biometric paradigm "forget about cards and passwords, you are your own key",researchers from many different fields such as image processing, computer vision or patternrecognition, have applied the newest techniques in each of these areas to improve the performance ofbiometric systems [4]. This path of technological evolution has permitted the use of biometrics in manydiverse activities such as forensics, border and access control, surveillance or on-line commerce. Prof Hadadi Sudheendra | Dr. N Krishnamurthy"Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15801.pdf http://www.ijtsrd.com/other-scientific-research-area/other/15801/novel-promising-algorithm-to-suppress-spoof-attack-by-cryptography-firewall2014/prof-hadadi-sudheendra

Authors and Affiliations

Keywords

Related Articles

Evaluation of the Cognitive Level in Adults over 60 Years

The objective of the present study is to assess cognitive level in adults over 60 years. To carry out this research, a population study was applied and a representative sample was calculated using a 95% confidence level...

Strength Assessment and Restoration of RC Structures by Structural Health Monitoring Techniques

In effect, concrete is broadly used as a building material due to the fact of its excessive strength cost ratio in many applications. Concrete constructions are commonly predicted to supply bother free provider in the co...

Matlab Implementation of Power Quality Improvement Based on Fast Dynamic Control

The paper is based on power quality with fast dynamic control having no isolation transformer. The concept is simulated using famous MATLAB tool and the proposed architecture is based on four switching devices only, form...

Impact of Mass Culture on Personnel Potential in Ecotourism Sphere

This article is devoted to one of the functions of mass culture as a form of social relations, which consists in ensuring the socialization of a person, helping him to master new social roles and values, to teach him how...

A Mathematical Analysis of Blood Flow through Artery with Mild Stenosis

Presented herein are the studies of blood flow through artery with mild stenosis. The parameter specified µ and R. It has been observed that the increases the viscosity increase the load capacity. Again it has been obse...

Download PDF file
  • EP ID EP389022
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

(2018). Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014. International Journal of Trend in Scientific Research and Development, 2(5), 102-109. https://europub.co.uk/articles/-A-389022