Unique i : An Integrated Automated Altered Fingerprint Identification System
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint recognition. Fingerprints of a person do not change throughout the life. By altering the fingers several criminals are evading the normal fingerprint identification system. This is a serious case in several domains. In Unique i, altered fingerprints are matched with their unaltered mates and a proper result is produced. The system detects both natural and altered fingerprints. It is a complete online application by using the concept of AADHAAR. The system is connected with a biometric device and a live scan method is used. The applications involve Bio-Vote and Track-Me. Bio-Vote is a biometric enabled online-voting system with various levels of users and Track-Me is an online biometric enabled system for labourer identification.
Authors and Affiliations
Unnikrishnan. S. Kumar
EFFICIENT COLLABORATIVE SCIENTIFIC WORKFLOW COMPOSITION USING SERVICE ORIENTED COLLABORATION MODEL
Collaboration has become a dominant feature of modern science. Many scientific problems are beyond the realm of individual discipline or scientist to solve and hence require collaborative efforts. Modern scientific d...
Performance Analysis of RTOS with GPOS for Heart Rate and Temperature Measurement Wireless System Using Raspberry Pi
The objective of the project is to analyze the General Purpose Operation System (GPOS) performance with Real Time Operating System (RTOS) using a Heartbeat sensor and temperature sensor as a real time application. Me...
A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks
The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing...
Implementation of Multinomial Standard Product for RSA State Identify Algorithm
This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...
Extraction of Frequent Subgraph from Graph Database
Graphs are promising abstraction of complex structured and semi-structured data. Graph mining techniques extract, analyze and summarize significant and useful information from the graph databases. Finding frequent su...