Palm Vein Extraction and Matching For Personal Identification
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords are introduced as alternative techniques to textual passwords. Biometrics is used for human recognition which consists of authentication, verification and recognition. A CCD camera will capture the image and this image will process through various algorithms. In future this image will be compared for personal authentication. In this paper, three algorithms are proposed to extract the images taken by CCD camera.
Authors and Affiliations
Mr. Vishal U. Bhosale , Mr. Onkar S. Kale , Mr. Mahesh W. Pawar , Mr. Roshan R. Patil , Mr. Pritam S. Patil , Prof Mrs. Sonali Madankar
Effective Crypto Systemfor Achieving Security and Performance over Market Basket Data Analysis
Abstract:Nowadays Cloud computing plays a vital role in diverseareaslike Personal Health,Social applications,enterprise,Finacial and Public domains etc., Security is an important province in as far as cloudcomputing is...
The Gap of Hospital Service Performance By Using Service Quality Analysis
Abstract: Patient is a customer of the Hospital whose satisfaction must be noticed. The satisfaction of patient is depended on the service performance which has been performed by the hospital. Service quality analysis is...
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Abstract: Computational Intelligence is the study of the design of intelligent agents. An agent is something that react according to an environment—it does something. Agents includes worms, dogs, thermostats, airplanes,...
Assessing Water- Based Recreational Activities to Project Beach Ecotourism Potentials in Kisumu County
Abstract: This paper presents discussions on observed scenarios that characterize water-based recreational activities with an aim of laying grounds for appreciating relationships that enhance or hamper ecotourism d...
Cloud Computing: A Key to It Development in West African Sub Region
Abstract: There is no gainsaying the fact that information technology (IT) development in West Africa has met a lot of challenges ranging from cyber threat to inadequate IT infrastructure. Cloud computing is a revo...