A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kuche, Pranjali
- Collaborating Left and Right Palmprint Images for Personal Identification
Authors
1 Department of IT, MMCOE, Pune, Maharashtra, IN
Source
Digital Image Processing, Vol 8, No 3 (2016), Pagination: 70-73Abstract
Single biometric cannot provide much accuracy as compared to multibiometric, so multibiometric is preferred for real world personal identification application that needs high standard security. Multibiometric combines two or more single biometrics in order to get the higher accuracy. However, among various biometric technology palmprint identification has been proved more efficient and easy to implement. This paper reveals the idea to perform the multibiometric by combining the feature of the left and right palmprint. This framework combines three kinds of scores generated by left and right palmprint images to perform matching score level fusion. Initially the score is generated from the left palmprint images followed by right palmprint images and finally the left palmprint is compared with the reverse right palmprint to obtain the third score. All the three scores are combined and based on final score the subject is authenticated.
The nature of the left and right palmprint images is carefully taken into account by proposed algorithm, which allows it to properly exploit the similarity between the left and right palmprint images. Moreover, as compared to the previous palmprint identification method, the proposed weighted fusion scheme allowed perfect identification performance.
Keywords
Palmprint Identification, Biometrics, SIFT Algorithm, Multi Biometrics, Contactless.- Multiparty Searchable Encryption Scheme
Authors
1 Department of IT, MMCOE, Pune, Maharashtra, IN
Source
Data Mining and Knowledge Engineering, Vol 8, No 2 (2016), Pagination: 58-61Abstract
In existing symmetric searchable encryption scheme it aims to allow a user to outsource his/her encrypted data into a cloud server and delegate the latter to search on his/her behalf. In these schemes it does not qualify a new secure and scalable solution for the multiparty settings. The users outsource their encrypted data into cloud server and selectively authorize each data to search. Due to this possibility the cloud server may collude with some malicious user which is a challenge to have a secure and scalable multiparty searchable encryption scheme (MPSE). Now based on this analysis we will present a new secure model for MPSE by considering the best case and the worst case scenario. We use Data Encryption Standard (DSE) to implement MPSE.Keywords
Multiparty Searchable Encryption Scheme (MPSE).- Traffic Sign Recognition System
Authors
1 Department of IT, Marathwada Mitra Mandal's College of Engineering, Pune, Maharashtra, IN