The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is the most important thing in the world. Password is used for security but it does not provide the effective security. So single biometric is preferred but due to lack of reliability, it is not efficient. So Multibiometric is used. Multibiometric provides more reliability. Fingerprint and Iris are the most unique features because it is unchangeable anywhere most of the time, compare to other...
Handwritten signatures are socially and legally well accepted as a convenient means of writer verification, document authentication and authorisation. It is a very difficult task to decide automatically whether two signatures, given as scanned images are written by the same person or not. In this paper, an effective signature verification method that depends on the structural property of different...
Network Intrusion Detection is the most happening field of the network security research. It is a new kind of defense technology of the network security, used as a countermeasure to preserve data integrity and system availability during an intrusion. An ideal IDS system should be capable of evolving itself to identify not only known attacks but also unknown attacks. Algorithms based on Genetic Engineering...
This paper proposes Geometric features by which shape and margin characteristics of objects present in images can be extracted. These extracted features are being represented as feature vector of an object and used for defining semantic of an image. These features are invariant to rotation and effectively shape and margin of the objects are defined. The feature are extracted for all the images in...
This paper proposes a two stage approach for extracting and recognizing text in images. This approach uses Morphological operation for text localization, and, Support Vector Machine for character recognition, along with some preprocessing and post processing steps. This algorithm is tested with natural Images as well as Images taken from ICDAR 2003 Robust Reading Competition dataset. The proposed...
Every enterprise wants to protect their data from both the internal and external attackers. In this initiative firewall, encryption, and authentication serve as the first line of defense. And Intrusion Detection serves as the second line of defense. IDS may use either anomaly based approach or misuse based approach. Traditional IDS were making use of misuse based approach. The drawback of misuse based...
This paper outlines a Nose tip localization technique in case of 2.5D as well as 3D meshes. No normalization process is applied and the process correctly localizes nose tip across any pose (including rotation in any direction in 3D space namely about x-axis, y-axis and z-axis).The present technique works by taking a facial image as input, and after which a thresholding process is applied to remove...
The spread of various types of malicious activities like unsolicited commercial e-mail (UCE) or unsolicited bulk e-mail (UBE) also called as SPAM has been the most imminent menace to the today's Internet world. These activities bring financial crisis to companies and annoying to most users because it clutters the users mailboxes and steal their valuable information for its financial gain. Now a day's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.