Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shameem Sulthana, E. S.
- Implementation and Evaluation of SIFT Descriptors based Finger-Knuckle-Print Authentication System
Abstract Views :217 |
PDF Views:0
Authors
Affiliations
1 Bharathiar University, Coimbatore, IN
2 Department of IT, Pondicherry Engineering College, Pondicherry, IN
1 Bharathiar University, Coimbatore, IN
2 Department of IT, Pondicherry Engineering College, Pondicherry, IN
Source
Indian Journal of Science and Technology, Vol 7, No 3 (2014), Pagination: 374–382Abstract
Finger-Knuckle-Print (FKP) uses feature detection and matching techniques in its hard core design. It works similar for almost every authentication system. The Scale Invariant Feature Transform (SIFT) is the most reliable feature extraction technique that is used in authentication systems on FKP. The feature descriptors detected by SIFT claim to be capable of distinguishing each and every image in the dataset from one another with the cost involved in its operations. In SIFT based FKP authentication systems, the storage and computational cost will directly depend on the size of the feature descriptors used. Such matching process will directly match these feature descriptors to find an exact match and the descriptors were directly stored in storage media as templates. Hence there is a necessity for storing all the feature descriptors of the enrolled FKP images for future references. The size of these feature descriptors data will be greater than the original FKP image dataset and the performance of the system will rapidly decrease with respect to the increase in enrollment in the database. The proposed work address these issues with FKP based authentication system using SIFT for efficient computation and cost compared with the existing work and proven to be secure and tough resistant for authentication system.Keywords
Authentication, Feature Description, Matching, Recognition, Scale Invariance- Security Over Web Services Using Evidence Based Access Control
Abstract Views :142 |
PDF Views:1
The main goal of this work is it supports communication between parties in different trust domains, allow evidence associated with parties to be securely collected and evaluated for the purpose of allowing access to resources, create an ecosystem in which evidence providers can flourish.
This will describe the design of the evidence-based access models; discuss usage scenarios, and present preliminary results.
The results suggest that this approach is flexible enough to accommodate interesting present computing scenarios and efficient enough to implement on small devices.
Authors
Affiliations
1 Department of Computer Science, Achariya Arts & Science College, Pondicherry-605013, IN
2 Department of Information Technology, Pondicherry Engineering College, Pondicherry, IN
1 Department of Computer Science, Achariya Arts & Science College, Pondicherry-605013, IN
2 Department of Information Technology, Pondicherry Engineering College, Pondicherry, IN
Source
Software Engineering, Vol 1, No 4 (2009), Pagination: 147-150Abstract
This work focus on using evidence for making access control decisions in present computing environments. These environments create new interaction scenarios that traditional access control approaches handle poorly. This approach views access control as the filtering of messages between communicating services. This work implements the evidence-based approach with a mechanism analogous to a network firewall, filtering messages going to and from a service.The main goal of this work is it supports communication between parties in different trust domains, allow evidence associated with parties to be securely collected and evaluated for the purpose of allowing access to resources, create an ecosystem in which evidence providers can flourish.
This will describe the design of the evidence-based access models; discuss usage scenarios, and present preliminary results.
The results suggest that this approach is flexible enough to accommodate interesting present computing scenarios and efficient enough to implement on small devices.