The palmprint is physiological biometric widely used for identification of individuals. Multispec... more The palmprint is physiological biometric widely used for identification of individuals. Multispectral palmprint systems are good solution because it can provides more discriminative information for person identification. Multispectral palmprint identification systems for large database and used for protecting palmprint system and users privacy. This paper reviews to the palmprint identification methods for palmprint image acquisition, preprocessing, palmprint related fusions, feature extraction and feature matching. The Biometric identification is the method of identify the person by using the human's characteristics. The biometric technology is used to measure the two types of characteristics are physiological characteristics and behavioral characteristics. Behavioral characteristics measure the behavior, mood and action produced by human such as signature, sound, posture, voice, keystroke etc. Physiological characteristics measure human body parts of the person which are uniqu...
Over the last few years, there is tremendous use of online social networking sites. It’s also pro... more Over the last few years, there is tremendous use of online social networking sites. It’s also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking websites like Twitter, Facebook and Google+ etc. These are popularly practiced by numerous people to become linked up with each other and partake their daily happenings through it. Here we focus on twitter for an experiment which is more popular for micro-blogging and its community interact through publishing text-based posts of 140 characters known as tweets. By considering this popularity of tweeter hacker’s use of short Uniform Resource Locator (URL), as a result it disseminates viruses on user accounts. Our study is based on examining the malicious content or their short URLs and protect the user from unauthorized activities. We introduce such a system which provides the security to multiple users of twitter. Besides, they get some alert mails. Ou...
International Journal of Managment, IT and Engineering, 2012
Performance of cryptosystems is a very important process in measuring the performance of Cryptosy... more Performance of cryptosystems is a very important process in measuring the performance of Cryptosystems. Communication is the basic process of exchanging information. The effectiveness of computer communication is mainly based on the security aspects. Security of information transmitted over the network is becoming tougher in spite of the availability of many cryptographic algorithms. This paper provides the various factors affecting the performance of Encryption algorithms. This paper also focuses on the factors which affects the security of the information transmitted over the networks. Since our main concern here is the performance of these algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The security of algorithms and performance of a given algorithm depends on variety of parameters such as key size, block size, diffusion and confusion properties. This paper...
Palmprint is physiological biometric used for recognition of person. Palmprint containing texture... more Palmprint is physiological biometric used for recognition of person. Palmprint containing texture, statistical, line, point, geometry features. In this paper we proposed palmprint recognition using DWT, DCT and PCA techniques (PRUDDP). It is simple and effective methodology for palmprint recognition. The preprocessing used for palmprint image alignment, resize the palmprint image and to enhance contrast of palmprint image by using histogram equalization. DCT and DWT used to generate features and that features are extracted by using PCA. The extracted features from database images and test images are match by using Euclidean Distance. Keywords— Biometric, DCT, DWT, ED, PCA, and Palmprint
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015
Palmprint recognition is physiological biometric method used for recognition of person. It consis... more Palmprint recognition is physiological biometric method used for recognition of person. It consists of various features like texture, statistical, line, point, geometry features which are used separately or by the combination of two or more features for quick and correct recognition purpose. The proposed method Palmprint Recognition using DWT and DCT with PCA technique (PRDDP) is simple and effective methodology for palmprint recognition. In it preprocessing used for palmprint image alignment, to resize the palmprint image and to enhance contrast of palmprint image by using histogram equalization. DCT and DWT used to generate features and that features are extracted by using PCA. And the extracted features, from database images and test images, are match by using ED.
The palmprint is physiological biometric widely used for identification of individuals. Multispec... more The palmprint is physiological biometric widely used for identification of individuals. Multispectral palmprint systems are good solution because it can provides more discriminative information for person identification. Multispectral palmprint identification systems for large database and used for protecting palmprint system and users privacy. This paper reviews to the palmprint identification methods for palmprint image acquisition, preprocessing, palmprint related fusions, feature extraction and feature matching. The Biometric identification is the method of identify the person by using the human's characteristics. The biometric technology is used to measure the two types of characteristics are physiological characteristics and behavioral characteristics. Behavioral characteristics measure the behavior, mood and action produced by human such as signature, sound, posture, voice, keystroke etc. Physiological characteristics measure human body parts of the person which are uniqu...
Over the last few years, there is tremendous use of online social networking sites. It’s also pro... more Over the last few years, there is tremendous use of online social networking sites. It’s also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking websites like Twitter, Facebook and Google+ etc. These are popularly practiced by numerous people to become linked up with each other and partake their daily happenings through it. Here we focus on twitter for an experiment which is more popular for micro-blogging and its community interact through publishing text-based posts of 140 characters known as tweets. By considering this popularity of tweeter hacker’s use of short Uniform Resource Locator (URL), as a result it disseminates viruses on user accounts. Our study is based on examining the malicious content or their short URLs and protect the user from unauthorized activities. We introduce such a system which provides the security to multiple users of twitter. Besides, they get some alert mails. Ou...
International Journal of Managment, IT and Engineering, 2012
Performance of cryptosystems is a very important process in measuring the performance of Cryptosy... more Performance of cryptosystems is a very important process in measuring the performance of Cryptosystems. Communication is the basic process of exchanging information. The effectiveness of computer communication is mainly based on the security aspects. Security of information transmitted over the network is becoming tougher in spite of the availability of many cryptographic algorithms. This paper provides the various factors affecting the performance of Encryption algorithms. This paper also focuses on the factors which affects the security of the information transmitted over the networks. Since our main concern here is the performance of these algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The security of algorithms and performance of a given algorithm depends on variety of parameters such as key size, block size, diffusion and confusion properties. This paper...
Palmprint is physiological biometric used for recognition of person. Palmprint containing texture... more Palmprint is physiological biometric used for recognition of person. Palmprint containing texture, statistical, line, point, geometry features. In this paper we proposed palmprint recognition using DWT, DCT and PCA techniques (PRUDDP). It is simple and effective methodology for palmprint recognition. The preprocessing used for palmprint image alignment, resize the palmprint image and to enhance contrast of palmprint image by using histogram equalization. DCT and DWT used to generate features and that features are extracted by using PCA. The extracted features from database images and test images are match by using Euclidean Distance. Keywords— Biometric, DCT, DWT, ED, PCA, and Palmprint
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015
Palmprint recognition is physiological biometric method used for recognition of person. It consis... more Palmprint recognition is physiological biometric method used for recognition of person. It consists of various features like texture, statistical, line, point, geometry features which are used separately or by the combination of two or more features for quick and correct recognition purpose. The proposed method Palmprint Recognition using DWT and DCT with PCA technique (PRDDP) is simple and effective methodology for palmprint recognition. In it preprocessing used for palmprint image alignment, to resize the palmprint image and to enhance contrast of palmprint image by using histogram equalization. DCT and DWT used to generate features and that features are extracted by using PCA. And the extracted features, from database images and test images, are match by using ED.
Uploads
Papers by Chhaya Nayak