A NEW APPROACH OF ALTERED FINGERPRINTS DETECTION ON THE ALTERED AND NORMAL FINGERPRINT DATABASE
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 6
Abstract
The Research work of this paper is to investigate the current techniques for Altered fingerprint detection. Pattern recognition modalities being used in the world are fingerprint, footprint, palm print. But these pattern recognition methods cannot identify the persons having altered finger. The objective of this research work is to propose an algorithm for Detection. The Proposed method for Detection is one of the most reliable methods of personal verification. This can be widely used in Criminal Identification, Access Authority Verification, ATM verification and many other citizen centric applications. The Proposed method SVM-KERNEL is effective search method over the large clustered fingerprint database.
Authors and Affiliations
R. Josphineleela , M. Ramakrishnan
SCHEDULING OF MECHANICS IN AUTOMOBILE REPAIR SHOPS USING ANN
Scheduling problems are NP – Hard combinatorial optimization problems, since many algorithms have been developed which offers new promising insights for solving resource allocation problems. Considering the problems face...
RECONCILIATION OF CHANGES ON XML LISTS
In this research, we developed an efficient reconciliation method for mobile environments by using edit scripts of XML data sent from each mobile device. To obtain a simple model for mobile devices, we use the XML list d...
CLOPINIONMINER: OPINION TARGET EXTRACTION IN A CROSSLANGUAGE SCENARIO
In almost every e-Commerce industry today reviews are essential for both customers as well as the company. Reviews help the customers to sort out the right products and choose the ones that they find best. On the other h...
A SECURITY FRAMEWORK FOR AN ENTERPRISE SYSTEM ON CLOUD
Enterprise systems provide integrated information for all activities in an organization. These systems serve as a vital asset to any organization and hence it becomes mandatory to ensure their security. Information secur...
Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography
Cryptography is the science of information security. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. The combination of Implicit quantum key distribution protocol (3AQKDP) and...