Learn More
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint(More)
In a real-time automatic face recognition system, accurate face detection plays a very important part in recognition performance. We use color, edge, and binary information to detect eye pair candidate regions from an input image, then extract the face candidate region with the detected eye pair. We verify both the eye pair candidate region and the face(More)
Recently, in the smartcard-based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. To protect the fingerprint data, techniques such as " fuzzy vault "(More)
Cancelable biometrics expresses multiplicity. Now-a-days conventional authentications and identifications are advanced with biometrics. Since biometrics is unique in nature of a person, he/she must be aware on tracking the original features and also the cross matching of the same when his/her biometrics is used in different applications; and once the(More)
With the increasing demand of ubiquitous computing, the interconnection of mobile ad hoc networks (MANETs) to Internet is also getting attractive, which is so-called hybrid or connected MANET. In MANET paradigm, routing is a challenging task due to mobility and the resulting inherent dynamic network topology. In many applications, multipath routing scheme(More)
  • 1