The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometric palmprint identification is a technology used for identification and verification of palmprints using image acquisition, preprocessing, feature extraction and template matching. Even though the existing palmprint authentication systems have several advantages, there exist many disadvantages such as less accuracy, computational complexity, implementation expense, high resolution and storage...
Face recognition is a biometric analysis tool that has enabled surveillance systems to detect humans and recognize humans without their co-operation. In this scheme face recognition is done by Principal Component Analysis (PCA). Face images are projected onto a face space that encodes best variation among known face images. The face space is defined by eigenface which are eigenvectors of the set of...
Hacktivism is the biggest challenge being faced by the Cyber world. Many digital forensic tools are being developed to deal with this challenge but at the same pace hackers are developing the counter techniques. This paper includes the digital forensics basics along with the recent trends of hacktivism in social networking sites, cloud computing, websites and phishing. The various tools of forensics...
The web contains enormous amount of information. From that enormous information only small amount of that information is visible to users and a huge portion of the information is not visible to the users. This is because traditional search engines are not able to index or access all information. The information which can be retrieved by following hypertext links are accessed by such traditional search...
Search engines can return ranked documents as a result for any query from which the user struggle to navigate and search the correct answer. This process wastes user's navigation time and due to this the need for automated question answering systems becomes more urgent. We need such a system which is capable of replying the exact and concise answer to the question posed in natural language. The best...
Infant abduction, swapping, missing, illegal adoptions and kidnapping are increasing issues in the hospitals, birthing centers, health centers and in other places where multiple births occur simultaneously. A biometric system using the footprint of the newborn is proposed to overcome such issues. An online system with specialized preprocessing steps is developed for the images with a normal and a...
To find the veins in intravenous emergency injections, non-invasive feasible methods seem to be necessary. In another area in biometric identification, hand vein patterns can be used as other external identifiers are more probable to be damaged or forged. To achieve these goals, NIR back hand vein images are captured. In the proposed method, the NIR hand vein images are pre-processed and segmented...
As most of the web applications are associated with database as back end so there are possibilities of SQL injection attacks (SQLIA) on it. Even SQLIA is among top 10 attacks according to Open Web Application Security Project but still approaches are not able to give proper solution to this problem. Number of measures are also discovered to overcome this attack, but which measure is more convenient...
Radio Frequency IDentification (RFID) is the wireless non-contact system that uses radio-frequency waves to transfer data from a tag attached to an object, for the automatic identification and tracking. An internet based concept is incorporated with RFID technology to form an internet based application for the library management. The RFID reader Motorola MC9090 is used for the entire process which...
Video copy detection is an active research area as copyright issues continue to be a challenge to the multimedia industry. A content-based video copy detection method using discrete wavelet transform is presented here. Daubechies wavelet transform is used to obtain feature descriptor from video frames. The computation required for similarity search is also reduced in this work. MUSCLE-VCD-2007, the...
In nonrigid image registration two problems make a challenging task. First the voxel intensity similarity and anatomical image similarity will not be equivalent. Second during imaging process some distortions such as unwanted rotations and monotonic gray-level fields may occur. Due to these problems image registration quality gets affected. To avoid these problems and to calculate efficiently Uniform...
Electrocardiogram (ECG) is generally used for diagnosis of cardiovascular abnormalities and heart disorders. An efficient method for analyzing the ECG signal towards the detection of cardiovascular abnormalities and ischemic episodes follows mainly five stages: pre-processing, feature extraction, cardiac abnormality detection, beat classification and ischemic episode recognition. The detection of...
ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the...
Paper presents performance comparison of palm print identification techniques based on fractional coefficients of transformed palm print edge image using three transforms namely Cosine., Haar and Kekre. In transform domain., the energy of image gets concentrated towards low frequency region; this characteristic of image transforms is used here to reduce the feature vector size of palm print images...
Integrated Circuits (IC) have evolved over the last few decades from modest circuit complexities to highly complex circuit realizations in meeting the market needs. Considering the heavy investments of time, manpower and financial resources in the development of the advanced chips, the original developers of the chip, per force, take steps to protect the various Intellectual Properties (IP) through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.