Modified Dactylogram Sifting
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Fingerprint recognition has been with success utilized by enforcement agencies to spot suspects and victims for nearly a hundred years. Recent advances in automated fingerprint identification technology, in addition the growing would like for reliable person identification, have resulted in an increased use of fingerprints in both government and civilian applications such as border control, employment background checks, and secure facility access. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Classify altered fingerprints into three classes based on the changes in ridge pattern due to alteration as obliterated, distorted and imitated. The projected algorithmic rule supported the trivialities based on the minutiae extracted satisfies the essential requirements and determine the alteration type automatically to reconstruct altered fingerprints. In order to conquer the drawbacks of existing techniques, we proposed an efficient and robust fingerprint matching technique via fuzzy based method. For some types of altered fingerprints where the ridge patterns are damaged locally or the ridge structure is still present on the finger but possibly at a different location, reconstruction is indeed possible by the proposed method. Further it is shown that authentication is retained even though fingerprint identity has altered.
Authors and Affiliations
Geethu V S , V. Selvakumar
Low Power And Area Efficiency of SHA-1 and SHA-2 Hash Algorithm
This paper summarizes about the design of a Low Power and Efficiency of SHA-1 and SHA-2 Hash Functions capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions. The need for high-s...
A Novel Protocol for Better Energy-Efficiency, Latency and Fault Tolerance in Wireless Sensor Network
Wireless sensor networks with thousands of small sensor nodes are becoming very popular due to their large use in many of applications such as monitoring and collecting data from undisturbed dangerous environ...
Fault Tolerant Environment in web crawler Using Hardware Failure Detection
Fault Tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault Tolerant Distributed Environment encompasses all aspects of modern fault-tolerant dis...
ARM Based Fruit Grading and Management System Using Image Processing
traditionally, classification and grading is performed based on observations and through experience. This paper presents an integrating system for grading by considering different attributes. A fruit color, size de...
WPA Exploitation In The World Of Wireless Network
Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a we...