Jyoti Malik

Learn More
In this paper, Harris Corner Detector is proposed as a corner detection technique to extract palmprint features in the form of corners. Here, hamming distance similarity measurement using sliding window method is used as a feature matching method for the corners detected. The aim of using hamming distance method for corner matching is the non-dependency of(More)
Authentication time is the main and important part of the authentication system. Normally the response time should be fast but as the number of persons in the database increases, there is probability of more response time taken for authentication. The need of fast authentication system arises so that authenti-cation time (matching time) is very less. This(More)
Palmprint recognition refers to recognizing a person on the basis of palmprint features. In this paper, we have proposed a palmprint based biometric authentication method with improvement in accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, Directional operator, Wavelet transform, Fourier transform etc.(More)
Palmprint recognition is a biometric method to automatically identify a person's identity. In this paper, phase congruency method is proposed to extract features from a palm-print image for authentication. The phase congruency is one of the promising methods to analyse the image as it is invariant to image contrast and therefore can extract reliable(More)
Over the past decade digital images has become a very popular way to communicate, store and process information. With the rapid advancement and easy availability of technology, there is a flood of devices that are able to capture, store and create digital images. Over the past years image processing techniques have been developed that makes it really easy(More)
Android, one of the most popular open source mobile operating system, is facing a lot of security issues. Being used by users with varying degrees of awareness complicates the problem further. Most of the security problems are due to maliciousness of android applications. The malwares get installed in mobile phones through various popular applications(More)
Automatic human identification is one of the most penetrating tasks to meet growing demand for rigorous security. The usage of biometrics has been largely used in the identification and recognition of criminals and has become an essential tool for law and order enforcement departments. The biometrics-based automated human identification and recognition(More)