Learn More
Security of SCADA (supervisory Control and Data Acquisition) has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is a well known framework for securing the(More)
Voiceprint Recognition System also known as a Speaker Recognition System (SRS) is the best-known commercialized forms of voice Biometrics. Automated speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. In contrast to other biometric technologies which are mostly image based and(More)
Mobile Seva/Mobile Governance is a revolutionary framework which is aimed at leveraging the exponential growth that has happened in the wireless communication technology and the far reaching acceptability it has received in the country. It has been conceptualized and formulated by the Department of Electronics and Information Technology (DeitY), Government(More)
Iris recognition is seen as a highly reliable biometric technology. The performance of iris recognition is severely impacted when encountering poor quality images. The selection of the features subset and the classification is an important issue for iris biometrics. Here, we explored the contribution of collarette region in identifying a person. We applied(More)
Poor-quality images mostly result in spurious or missing features, which further degrade the overall performance of fingerprint recognition systems. This paper proposes a reconfigurable scheme of quality checks at two different levels: i) at raw image level and ii) at feature level. At first level, ellipse properties are calculated through analysis of(More)
Singular point detection is one of the most crucial processes in fingerprint recognition systems. Singular points are used for fingerprint classification, matching and alignment. This paper presents a method for reliable detection of singular points, which is largely insensitive to the degradation of fingerprint quality. The approach involves two phases,(More)
At present it is almost impossible to detect zero day attack with help of supervised anomaly detection methods. Unsupervised techniques also have the drawback of low detection rate in spite of detection of zero day attacks. Using combination of both unsupervised and supervised methods, promising detection results can be produced. In this paper we present a(More)