[PDF][PDF] Biometrics in cyber security

J Kour, M Hanmandlu, AQ Ansari - Defence Science Journal, 2016 - academia.edu
Computers play an important role in our daily lives and its usage has grown manifolds today.
With ever increasing demand of security regulations all over the world and large number of …

DWT Based Fingerprint Recognition using Non Minutiae Features

SDR Kumar, KB Raja, RK Chhotaray… - … Journal of Computer …, 2011 - search.proquest.com
Forensic applications like criminal investigations, terrorist identification and National security
issues require a strong fingerprint data base and efficient identification system. In this paper …

Evolution of hadoop and big data trends in smart world

N Awasthy, N Valivarthi - … Computing: Transforming Industry 4.0 to Society …, 2023 - Springer
Abstract This chapter explores Big Data's huge volume, velocity, and diversity add to its
complexity. Big data is used to make informed decisions with real-time dynamic updates for …

An effective algorithm for fingerprint reference point detection

J Ma, X jun Jing, B Zhang, S Sun - 2010 2nd International …, 2010 - ieeexplore.ieee.org
It is very important to detect the reference point effectively and accurately, especially in
nonminutiae based fingerprint matching and fingerprint classification. In this paper, an …

Fingerprint matching with cross correlation and minutiae scores

S Insankeovilay, P Prasarn… - The 4th 2011 …, 2012 - ieeexplore.ieee.org
This paper reports a combination technique for fingerprint identification (matching). The
proposed method utilizes both Normalized cross correlation (NCC) template matching and …

Demosaicking using vector spectral model

R Lukac, KN Plataniotis - 2006 IEEE International Conference …, 2006 - ieeexplore.ieee.org
A new edge-sensing demosaicking solution based on a novel vector spectral model is
introduced in this paper. Using the vector spectral model, the proposed solution preserves …

Fingerprint recognition using inter ridge variation

AC Ramachandra, M Raghavendra… - … on Emerging Trends …, 2010 - ieeexplore.ieee.org
The Fingerprint is widely used biometric to identify and authenticate a person in the society.
In this paper we propose Fingerprint Recognition using Inter Ridge Variation (FRIRV) …

[PDF][PDF] Cancellable Fingerprint Authentication Schemes for Bio-Crypto Applications

WJ Wong - researchbank.swinburne.edu.au
Conventional biometric systems store the biometric features in unprotected templates. Once
these templates are compromised, the raw biometric data can be easily recovered and used …

[PDF][PDF] Z» M ZfyZ Äd Y Ã| Ë

Y WÄ - sid.ir
A Likelihood Ratio Approach to Information Fusion for Image-Based Fingerprint Verification
Page 1 Archive of SID µZ ,½Y ËY eÂÌb»ZÊ |ÀÆ» Á © ] Ê |ÀÆ» ÄË ¿ 8, Ã Z¼ 2 ½Zf ]Ze , 1389 …

[PDF][PDF] An Effective Identification Systems Based on Iris Texture Analysis

H Mohammadi, M Mohammadi… - International Journal of …, 2013 - academia.edu
Iris identification has received extremely attention as a reliable approach to human
identification in the world today. It is very effective for person identification due to the iris' …