A new approach to hiding data in the images using steganography techniques based on AES and RC5 algorithm cryptosystem

MS Hossen, MA Islam, T Khatun… - … on Smart Electronics …, 2020 - ieeexplore.ieee.org
In the new era of modern science and technology is developing day by day, data
confidentiality is risky, all over the world and it increases rapidly. In this paper, a new …

Biometrically secured atm vigilance system

MN Kumar, S Raghul, KN Prasad… - 2021 7th International …, 2021 - ieeexplore.ieee.org
The increase in electronic transactions has contributed to a higher demand for fast and
precise identification and authentication of users. In ATM's, biometric-based authentication …

Two three step authentication in ATM machine to transfer money and for voting application

K Sudharsan, VDA Kumar, R Venkatesan… - Procedia Computer …, 2019 - Elsevier
Voting plays a major role in electing a right person by the public to rule the country. The
main aim of the paper is to perform two operations such as transaction of money and for …

An online E-Cash scheme with digital signature authentication cryptosystem

M Ashiqul Islam, M Sagar Hossen, M Hossain… - … : Proceedings of ICSCN …, 2021 - Springer
This paper is intended to enlighten the curious minds on how to use cryptocurrency easily in
our day-to-day life. What bitcoin really is? The relation between bank and the user, who has …

Utilizing the Internet of Things, Monitoring and Protecting System for Automated Teller Machines

MN Hossain, MS Sayeed, SFU Zaman - Asian Journal For …, 2022 - asianssr.org
For the vast majority of people in modern society, ATMs are the preferred method of cash
withdrawal. ATM robberies have happened even in locations where CCTV cameras are …

Method and apparatus for automatically connecting a mobile device and an output device

PJ Zehler - US Patent 10,931,666, 2021 - Google Patents
BACKGROUND Another disclosed feature of the embodiments is an apparatus comprising a
processor that is configured to A user typically operates an output device using a user …

Visual Recognized Attendance System

NT Chitra, G Sreenivasulu… - … on Advancements in …, 2024 - ieeexplore.ieee.org
Usually in our regular class we face a situation where faculty or respective administrators
take attendance which would consume time. So, this project aims to develop a visual …

An automatic violence detection technique using 3D convolutional neural network

M Abdul Karim, M Jahidul Islam Razin… - … : Proceedings of ICSCN …, 2021 - Springer
In the field of machine learning, the deep learning technique plays a very important role as it
is useful in various real-life domains. As various crimes and misdeeds are occurring in …

Comparison of ResNet50 Algorithm with AlexNet Algorithm in Precise Biometric Palm Print Recognition

HK Kumar, SA Kumar - 2023 9th International Conference on …, 2023 - ieeexplore.ieee.org
This work's main objective is to replace the AlexNet algorithm with the Novel ResNet50
Algorithm to increase the biometric palm print identification accuracy. A sample size of ten …

Internet of Things-Based Cardless Banking System with Fingerprint Authentication Using Raspberry Pi

E Mahammad, N Malladhi, GBP Ram… - … Conference on Soft …, 2021 - Springer
For the purpose of online transactions, the user needs to carry credit or debit card at
commercial places. In the existing swipe machine system, to authenticate a user, only …