Learn More
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in few situations. The biometric improves the capability to recognize the persons. A biometric identification system is an automatic(More)
The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the(More)
In a Multimodal biometric system, the effective fusion method is necessary for combining information from various single modality systems. Two biometric characteristics are considered in this study: iris and fingerprint. Multimodal biometric system needs an effective fusion scheme to combine biometric characteristics derived from one or more modalities. The(More)
Biometrics refers to authentication techniques that rely on humans physical and behavioral characteristics that can be automatically checked. Biometric based authentication system provides robust security and ease of use than conventional methods of verification system. Multimodal biometric system is one of the major areas of study identified with large(More)
  • J. Deeksha, N. Radha, U. Yedukondalu
  • 2013
To avoid accidents on highway roads, it is necessary to maintain safe distance between vehicles referred as “Inter-Vehicular Distance”. A warning system should be employed inside the vehicle, so that the vehicle could sense the distance between other vehicles by using GPS co-ordinates and ADHOC wireless network and then intimate it to the driver. The main(More)
A distributed computer network is a special type of network, which facilitates the customers to use different network services which is provided by the service providers. In the distributed computer networks, user verification is an important process for the security. In the verification process, the decision is taken whether the user is legal or illegal(More)
The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the combination of(More)
In this paper personal verification method using finger-vein and signature is presented. Among many authentication systems finger-vein is promising as the foolproof method of automatic personal identification. Finger-vein and signature image is pre-processed and features are extracted using cross number concept and principle compound analysis. Fusion(More)