“Enhancing Iris Scanning Using Visual Cryptography”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic orbehavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniquesamong all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris.For authentication, the feature template in the database and the user template should be the same. Storing thetemplate in the database securely is not a secure approach, because it can be stolen. To deal with this securityissue, in our paper a new method for securely storing the template in the database is proposed.Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scannedimage is divided into different parts i.e. called as shares; these shares are stored in the database. The proposedVisual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. Inour proposed system, we present a powerful approach of iris recognition. It uses an improved circular Houghtransform to detect the inner boundary.
Authors and Affiliations
Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur
Distinct Revocable Data Hiding In Ciphered Image
Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibl...
Pose Estimation in AVI from Unknown Correspondences Using Genetic Algorithm
Abstract: In this paper we propose a model based approach to determine correspondences and pose of objects in automated visual inspection applications. The method does not consider correspondence and pose estimation prob...
Analytical Review on the Correlation between Ai and Neuroscience
Neuroscience is the pragmatic study of brain anatomy and physiology. AI and neuroscience are typical related to the human brain’s behavior. The alliance between artificial intelligence and neuroscience can produc...
Text Clustering in Distributed Networks with Enhanced File Security
Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such appr...
Computerized Power Montoring System for EEDC Umuahia
Abstract: The computerized process in any facet of human existence or any sector of any economy promotesefficiency accuracy, effectiveness, improved service delivery and many more. This is also applies to thecomput...