To see the other types of publications on this topic, follow the link: Finger print authentication.

Journal articles on the topic 'Finger print authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Finger print authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Garg, Vaibhav, Siddharth Yadav, and Rishabh Kamal. "Android Notes using Finger Print Authentication." International Journal of Science and Research (IJSR) 10, no. 5 (2021): 174–78. https://doi.org/10.21275/sr21405101230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Veerasamy, Nanda Kumar. "An analysis of issues in biometric finger identification." International Journal of Engineering & Technology 3, no. 3 (2014): 391. http://dx.doi.org/10.14419/ijet.v3i3.2368.

Full text
Abstract:
A Person's identity is an essential factor in this vastly connected society. Biometric Finger has wide acceptance as a genuine method for determining an individuals identity. Biometric Finger authentication is reliable, since physical characteristics in humans are difficult to forge, harder to change or make copies. Biometric fingerprinting is one of the most popular and legally accepted biometrics used in person identification. Finger print authentication applications include Computer Applications, Network Access, Data Protection, Transaction Security, and Web Security. E-commerce and E-governments can carry out strong authentication rules. This paper analyzes issues related to Fingerprint identification to suggest viable alternatives. Keywords: Fingerprint Identification, Optical Sensors, Ultrasound Sensors, Issues in Finger Print Identification.
APA, Harvard, Vancouver, ISO, and other styles
3

Anish., V., M. Balaji., and Kumar. S. Santhosh. "Aadhar Based Electronic Voting System." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1634–37. https://doi.org/10.31142/ijtsrd11537.

Full text
Abstract:
Aadhar based voting for increased productivity and efficiency is one of the primary requirements today for any organization. 0ur main aim of the proposed system is to develop a compatible voting machine with high security. The proposed system is mainly designed for our country. It has three phases. First the details of the persons who are above 18years are extracted from Aadhar card database since it had become mandatory in present scenario. To ensure more security, finger prints of the voter is used as the main authentication resource. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allows the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. This is done to preserve the security. When people cast their vote the results will be updated automatically and on the same day of election, the results will also be published. Desna Sebastian GreeshmaGopiLiniRajan "Aadhar Based Electronic Voting System and Providing Authentication".In this paper we propose compatible voting that are efficiently implementable using gsm for the security to voters. Anish. V | Balaji. M | Santhosh Kumar. S "Aadhar Based Electronic Voting System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd11537.pdf
APA, Harvard, Vancouver, ISO, and other styles
4

Pradeep, Kumar M. S., K. Suresh Dr., T. Indumati, and kumar R. Kishor. "Smart Attendance System using Raspberry Pi." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 514–18. https://doi.org/10.31142/ijtsrd2306.

Full text
Abstract:
Biometric authentication is one of the most popular and accurate technology. Now a days, it is used in many real time applications. However, recognizing finger prints in Linux based embedded computers raspberry pi is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi, in which database creation, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the finger prints of individual and store that in database . Then the use of final finger print to match with others in finger prints present in the database to show the capability of this model and also updating the database obtained to the organisation by creating an application through cloud. Pradeep Kumar M S | Dr. K. Suresh | Indumati T | Kishor kumar R "Smart Attendance System using Raspberry Pi" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: https://www.ijtsrd.com/papers/ijtsrd2306.pdf
APA, Harvard, Vancouver, ISO, and other styles
5

Rassan, IehabAL, and Hanan AlShaher. "Securing Mobile Cloud Using Finger Print Authentication." International Journal of Network Security & Its Applications 5, no. 6 (2013): 41–53. http://dx.doi.org/10.5121/ijnsa.2013.5604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

IehabALRassan and HananAlShaher. "Securing Mobile Cloud Using Finger Print Authentication." International Journal of Network Security & Its Applications (IJNSA) 5, no. 6 (2013): 41–53. https://doi.org/10.5281/zenodo.5746254.

Full text
Abstract:
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile devices, these devices can't install and run applications require heavy CPU processing or extensive memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe Photoshop, as they run in a desktop computer. The combination of cloud computing and mobile computing introduces mobile cloud computing, which also present new issues of security threats such as unauthorized access to resources exist in mobile cloud. Protecting mobile cloud computing from illegitimate access becomes an important concern to mobile users. This paper proposes and implements a new user authentication mechanism of mobile cloud computing using fingerprint recognition system. Fingerprint images of mobile users can be captured and processed using mobile phone camera to access mobile cloud computing . The implementation of the proposed solution in different mobile operating systems and devices show security enhancement in mobile cloud computing with accepted performance level.  
APA, Harvard, Vancouver, ISO, and other styles
7

Subhashini, Mrs S., and Dr P. Umamaheswari. "TEXTURE BASED FINGER PRINT IDENTIFICATION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 12 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem27468.

Full text
Abstract:
In recent days , many digital finger print image based identification applications are used widely for human identity . Finger print features like minutiae (ridge lines, bifurcation, ridge ending) delta point, core point, texture patterns of ridges and valleys etc., are used for finger print identification. Reliable finger print identification system uses the finger print features to provide higher accuracy . Many finger print identification systems have been proposed based on minutiae , ridge lines. But these systems performance are not effective as compared to texture based methods. In this article , significance of feature extraction techniques , various texture based finger print identification methods are investigated and analysed . Limitations of minutiae, , and based identification systems are discussed. Also how effective the texture based identification systems are discussed. A comparative analysis of experimental results of various methods of finger print identification is done. This paper is concluded with the finding of appropriate method of texture based feature extraction for effective identity authentication. Keywords : Finger print feature, Texture feature, feature extraction, ridges, finger print recognition.
APA, Harvard, Vancouver, ISO, and other styles
8

Mala, R. Parimala, and C. Jayakumar Kumar. "Providing Authentication by Using Biometric Multimodal Framework for Cloud Computing." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (2015): 591. http://dx.doi.org/10.11591/tijee.v15i3.1578.

Full text
Abstract:
Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication system. Now in this current tech world, everyone needs security everywhere to protect our personal gadgets. So to keep it secured, biometric based approach can be applied for better convenience and ease of use for the user. In this paper, a novel hybrid multimodal approach for ear recognition and finger print recognition has been presented for better robustness and efficiency which can be applied in various fields of applications like authentication in banking transactions. Biometric based human recognition is rapidly gaining popularity due to breached of traditional security systems and the lowering cost of sensors. This paper comprehensively reviews multimodal recognition using ear pattern and finger print data, it is concluded that further research should investigate fast and fully automatic ear-finger print multimodal systems robust to occlusions and deformations.
APA, Harvard, Vancouver, ISO, and other styles
9

Abdullahi, Umar, and Hambali Moshood Abiola. "Survey of Finger Knuckle Print Recognition and Authentication." Kwaghe International Journal of Sciences and Technology 1, no. 1 (2024): 383–402. https://doi.org/10.58578/kijst.v1i1.3611.

Full text
Abstract:
Background: Finger knuckle (FK) has gained significant attention as a biometric characteristic in recent years. Its unique features, such as visible lines, wrinkles, and ridges on the external surface of finger knuckles, make it an economically viable option for human identification. FK serves as the foundation for many biometric systems. Aim: This report presents a comprehensive analysis of relevant FK research. The typical FK identification system consists of four steps: image acquisition, image preprocessing, feature extraction, and matching. Various methods have been employed at each stage in this research. Result: The paper highlight state-of-art methods utilized for the recognition of FK.
APA, Harvard, Vancouver, ISO, and other styles
10

Negi, Lalit, Anju Gupta, and Pooja Khurana. "Enhancing Security System using Finger Print based Authentication." International Journal of Computer Applications 166, no. 3 (2017): 9–12. http://dx.doi.org/10.5120/ijca2017913943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

RAJKUMAR, G., and T. SIVAGAMA SUNDARI. "Hostel Management System Based on Finger Print Authentication." Oriental journal of computer science and technology 11, no. 4 (2018): 230–34. http://dx.doi.org/10.13005/ojcst11.04.08.

Full text
Abstract:
The biometric system plays the most important role in this current century. Finger print identification is one among the foremost distinguished and familiar identity verification system due to its individuality. Security within the hostel is one of the foremost repetitive issues. To keep up day by day attendance verification is sophisticated and time consuming system for the hostel management. There are number of existing attending systems are available for college students, for hostel students it must improve. Within the existing system wardens are manually maintain the attendance for hostel students. This paper deals with, avoid of an entire problem in hostel management system together with this monitoring system also proposed. The administrator of this system was college principal or warden. Biometric system is used to accommodate a large number of students within the hostel. This system makes automatically to monitor the entry and exit of students from hostel and offers alert SMS to parents for their safety.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Lin, Lei Zhang, David Zhang, and Hailong Zhu. "Online finger-knuckle-print verification for personal authentication." Pattern Recognition 43, no. 7 (2010): 2560–71. http://dx.doi.org/10.1016/j.patcog.2010.01.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ch, Bilal Hussain. "Web Based Electronic Voting System Using Finger Print Authentication and GSM Module." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 307–11. http://dx.doi.org/10.31142/ijtsrd18456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sathiya, L., and V. Palanisamy. "A Survey on Finger Knuckle Print based Biometric Authentication." International Journal of Computer Sciences and Engineering 6, no. 8 (2018): 236–40. http://dx.doi.org/10.26438/ijcse/v6i8.236240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Malik, Jyoti, Ratna Dahiya, Dhiraj Girdhar, and G. Sainarayanan. "Finger knuckle print authentication using Canny edge detection method." International Journal of Signal and Imaging Systems Engineering 9, no. 6 (2016): 333. http://dx.doi.org/10.1504/ijsise.2016.080267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sainarayanan, G., Dhiraj Girdhar, Jyoti Malik, and Ratna Dahiya. "Finger knuckle print authentication using Canny edge detection method." International Journal of Signal and Imaging Systems Engineering 9, no. 6 (2016): 333. http://dx.doi.org/10.1504/ijsise.2016.10000770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Morales, A., C. M. Travieso, M. A. Ferrer, and J. B. Alonso. "Improved finger-knuckle-print authentication based on orientation enhancement." Electronics Letters 47, no. 6 (2011): 380. http://dx.doi.org/10.1049/el.2011.0156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bansode, Sakshi Babasaheb, and Prof A. Mote Prof A. Mote. "Finger Print Based Bank Locker Security System." International Journal of Pharmaceutical Research and Applications 10, no. 1 (2025): 1278–82. https://doi.org/10.35629/4494-100112781282.

Full text
Abstract:
The main aim of this paper is to design and implement a secure locker system that provides reliable and user-friendly access to stored valuables. The locker system is designed to be secure, with multiple layers of authentication to prevent unauthorized access. The system uses a combination of keypad, fingerprint scanner, and mobile phone verification to authenticate the user, with an LCD display and LED indicators providing clear feedback to the user. To develop the system, we used an Arduino UNO board and a variety of components including a GSM SIM800L module, a solenoid lock, an LCD display, LED indicators, a buzzer, and a keypad. The fingerprint scanner used was the R307 fingerprint scanner. we used the Arduino Integrated Development Environment (IDE) to program the system, with the code written in C. The system was tested extensively to ensure that it is reliable and secure. we tested the keypad, fingerprint scanner, and mobile phone verification separately to ensure that each component worked as expected. They also tested the system as a whole to ensure that it provided reliable and user-friendly access to the locker. system is a reliable and user-friendly solution for storing valuables. The system provides multiple layers of authentication to prevent unauthorized access, and the components used are reliable and easy to use. we recommend that the system be further developed to include additional features such The results of the research project show that the secure locker as a camera for added security. Overall, the secure locker system is a great example of how technology can be used to provide secure and to everyday problems.
APA, Harvard, Vancouver, ISO, and other styles
19

Kumar, V. D. Ambeth, V. D. Ashok Kumar, S. Malathi, and P. Jagaeedesh. "Intruder Identification Using Footprint Recognition with PCA and SVM Classifiers." Advanced Materials Research 984-985 (July 2014): 1345–49. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1345.

Full text
Abstract:
In modern digital era authentication has been done using biometric recognition. This biometric includes finger print, footprint, facial recognition, DNA of a person’s gene, hand palm print and eye’s iris recognition. The widely used among these is finger print and iris recognition. In this work we proposed a biometric recognition using footprints of a person. Earlier work deals with capturing footprint on a paper or on a surface. This won’t give us accurate foot print, since it depends on nature of the surface, quality of the paper and proper placement of the foot to give good foot print impression. To avoid all these we proposed a touch less method to obtain foot prints. The footprint can be obtained using any digital camera. We can take footprint image in many angles to conform the individuality of a person. In this work we used Principle Component Analysis (PCA) for pattern recognition and feature extraction. Then the SVM classifier split the patterns in to relevant classes. In early stage of our work itself we got remarkable quality and it is comparatively better than conventional footprint images obtained using paper or surface
APA, Harvard, Vancouver, ISO, and other styles
20

G.Athidass and K.Alamelu. "Security Issues in Mobile Banking." Shanlax International Journal of Management 6, S1 (2018): 6–10. https://doi.org/10.5281/zenodo.1461247.

Full text
Abstract:
The invention of mobile phones makes the human life easier. The purpose of this study is to identify security risks in mobile banking and to provide an authentication method for mobile banking transaction by using bio-metric mechanism.  Current  mobile  banking  authentication  is  challenging  and  identified  as  a  major security risk. Literature review shows that customer distrusts mobile banking due to security issues. The authors discuss security risks in current authentication methods in mobile banking.  There  are  different  methods  and  approaches  to  handle  authentication  in  mobile banking.  In  this  thesis,  we  propose  a  new  approach  of  authentication  in  mobile banking. The strengths and weaknesses of existing approaches of authentication are identified with the help of Literature Review and interviews. The authors present basic transaction model and include security risks. By Literature Review it is found that finger print mechanism is a suitable method for authentication. Authors focus on  authentication  method  and  present  a  biometric  scanning  device  which  can identify  the  customer’s  finger  print  thus  enabling  the  customer  to  access  mobile banking facility. To promote mobile banking, it is necessary to improve customer trust in terms of security. 
APA, Harvard, Vancouver, ISO, and other styles
21

Nigam, Aditya, Kamlesh Tiwari, and Phalguni Gupta. "Multiple texture information fusion for finger-knuckle-print authentication system." Neurocomputing 188 (May 2016): 190–205. http://dx.doi.org/10.1016/j.neucom.2015.04.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Altaher, Ali Salem, and Saleem Mohammed Ridha Taha. "Personal authentication based on finger knuckle print using quantum computing." International Journal of Biometrics 9, no. 2 (2017): 129. http://dx.doi.org/10.1504/ijbm.2017.085676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Taha, Saleem Mohammed Ridha, and Ali Salem Altaher. "Personal authentication based on finger knuckle print using quantum computing." International Journal of Biometrics 9, no. 2 (2017): 129. http://dx.doi.org/10.1504/ijbm.2017.10006482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Vandana, V.R., and S. Jinesh. "A Review on User Identification and Emotion Classification Using ECG." Research and Applications: Emerging Technologies 1, no. 3 (2019): 1–6. https://doi.org/10.5281/zenodo.3582012.

Full text
Abstract:
<em>The aliveness of a person can be related with the heart beat rhythm. So the heart beat rhythm can be signalized into an ECG. Nowadays for the biometric authentication purpose we normally use the finger print, face &amp;iris recognition etc. Among that ECG is more against forgeries and it is advanced technique than finger print &amp;face recognition. This paper describes different methods used in identifying a person using Electrocardiogram signals. The same signal used for the classification of emotions also. User identification is the common method for identify a user in the business field and other organizations.&nbsp; User ID is one of the most common authentication system used within computing systems, networks, applications and over the Internet. Commonly used authentications are fingerprint, face recognition, iris recognition &amp; RFID etc. Among ECG is universal, continuous&amp; difficult to falsify. So the user identification using ECG is the new trend in biometric authentication. ECG is a periodical signal creates P,QRS,T through depolarization of atrium, repolarization &amp;depolarization of ventricle. ECG is a bio signal &amp; is unique because the variation in amplitude of R wave and the time duration of each wave is different for each individual. There are many different types of </em><em>emotions</em><em> that have an influence on how we live on earth and how we behave to others. The emotions are identified were happiness, sadness, disgust, fear, surprise, and anger. This paper describes the different method used to identify the person &amp;classifies the emotion using ECG.</em>
APA, Harvard, Vancouver, ISO, and other styles
25

Haitham, Salman Chyad, and Ali Mustafa Raniah. "Subject Review: Palm Print Biometric Authentication System for Security Applications." International Journal of Computer Science and Mobile Applications 10, no. 7 (2022): 8–15. https://doi.org/10.5281/zenodo.6874686.

Full text
Abstract:
Biometric authentication offers an authoritative and accurate approach in access control to identifying or verifying the identity of the individual using the system, through their behavioural and physical traits such as palm print, face, finger print, voice, iris etc. The field of Security, Forensics, and Banking pays great attention to biometrics. Individual traits cannot be forget or missing as compared passwords to and keys. They are also being much complicated to copy. For this reason biometric security systems are considered to be safer and very secure than conventional security systems. But every trait has its own disadvantages and advantages. In this paper, we propose a detailed background review for several techniques, methods and approaches used in the palm print authentication system with many various methods and procedures. A comparison of these security application technologies (dataset, pre-processing, feature extraction, Authentication/ security applications techniques and result) is also presented.
APA, Harvard, Vancouver, ISO, and other styles
26

Bilal, Hussain Ch, and Subayyal. "Web Based Electronic Voting System Using Finger Print Authentication and GSM Module." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 307–11. https://doi.org/10.31142/ijtsrd18456.

Full text
Abstract:
Voting is the heart of a democratic country and it should be fair and square by all means .Every country in the world is spending a handsome amount on the electoral process to refine it to the next level. Instead of all the refinement on the electoral process there is always issues rises about the rigging in the elections. To counter this and to ameliorate the electoral process to next level we are proposing a system which includes a finger print scanner and GSM module. We have defined a methodology to counter all the hidden holes in the electoral process. Bilal Hussain Ch | Subayyal &quot;Web Based Electronic Voting System Using Finger Print Authentication and GSM Module&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18456.pdf
APA, Harvard, Vancouver, ISO, and other styles
27

Bhagyashree, P. Dhoble, and Bhushan A. Deshpande Prof. "Virtual Reality Based Remote Place Explorer Application." International Journal of Research and Review 6, no. 4 (2019): 250–54. https://doi.org/10.5281/zenodo.3989189.

Full text
Abstract:
Virtual Reality is implemented by a combination of technologies that are used in order to visualize and provide interaction with a virtual environment. These environments often depict three-dimensional space which may be realistic or imaginary, macroscopic or microscopic and based on realistic physical laws of dynamics, or on imaginary dynamics. A key feature of Virtual Reality is that it allows multi-sensory interaction with the space being visualized. Virtual Reality ideally suited for effective learning and try to explain this effectiveness in terms of the advantages afforded by active learning through experiences. In this project we used finger print authentication helper which is an android library to simplify the authentication with finger print process. This will provide a common platform for finger print authentication for all the android versions. For authentication purpose Kerberos authentication protocol is used. Implementations of Kerberos exist in Apple OS, Android OS. Kerberos has made the internet and its site more secure, and enables users to do more work on the Internet and in the office without compromising safety. Used Google virtual reality library to implement virtual reality concept with available software development kit to make cardboard apps. There are three different SDK (Software Development Kit) to make Cardboard apps. This includes Android SDK, Apple iOS SDK and a Unity SDK. The underlying standard is OpenGL, which is widely accepted popular high performance industry standard. The Android app is made using Java language corresponding to JDK (Java Development Kit) 1.7, using Android SDK version 24. We used (Bring Your Own Device) BYOD approach for the phones to be used inside Cardboard. Set up a system that uses Virtual Reality to aid and improve the knowledge transfer process. For achieving this, the system has to be cost effective so that it can be used individually by everyone in any field. It facilitate continued usage without being a preventing to normal flow of classwork or specific to any location. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
28

Abdollahi, Amin, Hossein Alidaei-Sharif, Hossein Roghani-Mamaqani, and Ata Herizchi. "Photoswitchable fluorescent polymer nanoparticles as high-security anticounterfeiting materials for authentication and optical patterning." Journal of Materials Chemistry C 8, no. 16 (2020): 5476–93. http://dx.doi.org/10.1039/d0tc00937g.

Full text
Abstract:
Spiropyran-containing stimuli-chromic flexible latex nanoparticles were synthesized for development of high-security anticounterfeiting inks with application in print-marking and finger-printing on cellulosic substrates.
APA, Harvard, Vancouver, ISO, and other styles
29

Shrivastava, Rajeev, Mohammad Javeed, and G. Mallesham. "Field Programmable Gate Array Implementation for Highly Secured Palm Print Authentication." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4565–70. http://dx.doi.org/10.1166/jctn.2020.9281.

Full text
Abstract:
To guarantee individual ID and profoundly secure recognizable proof issues, biometric innovations will give more prominent security while improving precision. This new innovation has been done lately because of exchange misrepresentation, security breaks, individual ID, and so on. The excellence of biometric innovation is that it gives an exceptional code to every individual and can’t be duplicated or manufactured by others. So as to conquer the withdrawal of finger impression frameworks, this paper proposed a palm-based individual distinguishing proof framework, a promising and new research region in biometric recognizable proof frameworks in light of their uniqueness, adaptability and a quicker and wide scope of high speeds. It gives higher security on biometric unique mark frameworks with rich highlights, for example, wrinkles, constant brushes, mainlines, details focuses and single focuses. The fundamental motivation behind the proposed palm unique finger impression framework is to actualize a framework with higher exactness and speed up palm unique finger impression acknowledgment for some clients. Here, in this we presented an exceptionally ensured palm print recognizable proof framework with intrigue extraction territory (ROI) with a morphological procedure utilizing a two-way un-crushed or course vector (UDBW) change to separate low-level palm fingerprints enrolled capacities for its vector work (FV) and afterward after correlation is by estimating the separation between the palm transporters and the capacity of the palm and the capacity of the enlisted transport line and palm control. The after effects of the recreation show that the proposed biometric recognizable proof framework gives more noteworthy precision and solid distinguishing proof speed.
APA, Harvard, Vancouver, ISO, and other styles
30

SNEHAL, NARAYANRAO BELSARE, and R.N.PATIL PROF. "A REVIEW ON SMART SECURITY SOLUTIONS BASED ON IOT." JournalNX - A Multidisciplinary Peer Reviewed Journal 2, no. 10 (2016): 19–22. https://doi.org/10.5281/zenodo.1468144.

Full text
Abstract:
This paper deals with the Review of design and implementation of Smart surveillance monitoring system using Raspberry pi and fingerprint sensor. It increases the usage of mobile technology to provide essential security to our homes and for other control applications. The proposed The project aims at designing an intelligent access control system based on fingerprint technology. The proposed system makes use of finger print module for authentication process and an electromechanical relay switch to control magnetic door locking system for door accessing. The system also supports with camera based image capturing technique when any wrong finger print was detected and alerts through email from wireless Wi-Fi connectivity. https://journalnx.com/journal-article/20150125
APA, Harvard, Vancouver, ISO, and other styles
31

Hanmandlu, Madasu, Neha Mittal, and Ritu Vijay. "A Robust Finger Knuckle Print Authentication using Topothesy and fractal dimension." Defence Science Journal 67, no. 1 (2016): 66. http://dx.doi.org/10.14429/dsj.1.9003.

Full text
Abstract:
&lt;p&gt;This paper presents the finger knuckle based biometric authentication system using the approaches like structure entropy, GSHP (Gaussian smoothed High pass), GSOD (Gaussian Smoothed Oriented Directives) and also the well known method for surface roughness measurement called the fractal profiles represented by Topothesy and fractal dimension which describe not only the roughness but also the affine self similarity. We have also implemented Daisy descriptor for the representation of texture. The results of fractal parameters along with the refined scores are comparable to those of the compcode and impcompcode.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
32

SHARIATMADAR, ZAHRA S., and KARIM FAEZ. "FINGER-KNUCKLE-PRINT RECOGNITION VIA ENCODING LOCAL-BINARY-PATTERN." Journal of Circuits, Systems and Computers 22, no. 06 (2013): 1350050. http://dx.doi.org/10.1142/s0218126613500503.

Full text
Abstract:
Biometrics-based authentication is an effective approach which is used for automatically recognizing a person's identity. Recently, it has been found that the finger-knuckle-print (FKP), which refers to the texture pattern produced by the finger knuckle bending, is highly unique and can be used as a biometric identifier. In this paper, we present an effective FKP recognition scheme for personal identification and identity verification. This method is a new encoding scheme based on local binary pattern (LBP). Each image first is decomposed in several blocks, each block is convolved with a bank of Gabor filters and then, the LBPs histograms are extracted from the convolved images. Finally, a BioHashing approach is applied on the obtained fixed-length feature vectors. Extensive experiments conducted over the Poly-U FKP database demonstrated the efficiency and effectiveness of our proposed method.
APA, Harvard, Vancouver, ISO, and other styles
33

Fairuz, Subha, Mohamed Hadi Habaebi, and Elsheikh Mohamed Ahmed Elsheikh. "Pre-trained based CNN model to identify finger vein." Bulletin of Electrical Engineering and Informatics 8, no. 3 (2019): 855–62. http://dx.doi.org/10.11591/eei.v8i3.1505.

Full text
Abstract:
In current biometric security systems using images for security authentication, finger vein-based systems are getting special attention in particular attributable to the facts such as insurance of data confidentiality and higher accuracy. Previous studies were mostly based on finger-print, palm vein etc. however, due to being more secure than fingerprint system and due to the fact that each person's finger vein is different from others finger vein are impossible to use to do forgery as veins reside under the skin. The system that we worked on functions by recognizing vein patterns from images of fingers which are captured using near Infrared(NIR) technology. Due to the lack of an available database, we created and used our own dataset which was pre-trained using transfer learning of AlexNet model and verification is done by applying correct as well as incorrect test images. The result of deep convolutional neural network (CNN) based several experimental results are shown with training accuracy, training loss, Receiver Operating Characteristic (ROC) Curve and Area Under the Curve (AUC).
APA, Harvard, Vancouver, ISO, and other styles
34

Subha, Fairuz, Hadi Habaebi Mohamed, and Mohamed Ahmed Elsheikh Elsheikh. "Pre-trained based CNN model to identify finger vein." Bulletin of Electrical Engineering and Informatics 8, no. 3 (2019): 855–62. https://doi.org/10.11591/eei.v8i3.1505.

Full text
Abstract:
In current biometric security systems using images for security authentication, finger vein-based systems are getting special attention in particular attributable to the facts such as insurance of data confidentiality and higher accuracy. Previous studies were mostly based on finger-print, palm vein etc. however, due to being more secure than fingerprint system and due to the fact that each person&#39;s finger vein is different from others finger vein are impossible to use to do forgery as veins reside under the skin. The system that we worked on functions by recognizing vein patterns from images of fingers which are captured using near Infrared (NIR) technology. Due to the lack of an available database, we created and used our own dataset which was pre-trained using transfer learning of AlexNet model and verification is done by applying correct as well as incorrect test images. The result of deep convolutional neural network (CNN) based several experimental results are shown with training accuracy, training loss, Receiver Operating Characteristic (ROC) Curve and Area Under the Curve (AUC).
APA, Harvard, Vancouver, ISO, and other styles
35

Maheshwari, Uma, and Kalpana Kalpana. "Multimodal Image Fusion in Biometric Authentication." Fusion: Practice and Applications 1, no. 2 (2020): 79–91. http://dx.doi.org/10.54216/fpa.010203.

Full text
Abstract:
During this study, a unique multimodal biometric system was constructed. This system incorporated a variety of unimodal biometric inputs, including fingerprints, palmprints, knuckle prints, and retina images. The multimodal system generated the fused template via feature-level fusion, which combined several different biometric characteristics. The Gabor filter extracted the features from the various biometric aspects. The fusion of the extracted information from the fingerprint, knuckle print, palmprint, and retina into a single template, which was then saved in the database for authentication, resulted in a reduction in both the spatial and temporal complexity of the process. A novel technique for safeguarding fingerprint privacy has been developed to contribute to the study. This system integrates the unique fingerprints of the thumb, index finger, and middle finger into a single new template. It was suggested that the Fixed-Size Template (FEFST) technique may be used might develop a novel strategy for the extraction of fingerprint features. From each of the fingerprints, the minute locations of the ridge end and ridge bifurcations as well as their orientations relative to the reference points were retrieved. The primary template was derived from the fingerprint that included the greatest number of ridge ends. For the purpose of generating the combined minutiae template, the templates of the other two fingerprints were incorporated into this template. The merged minutiae template that was developed was then saved in a database so that registration could take place. During the authentication process, the system received the three query fingerprints, and those fingerprints were compared to the previously saved template.
APA, Harvard, Vancouver, ISO, and other styles
36

Sulthana, E. S. Shameem. "Implementation and Evaluation of SIFT Descriptors based Finger-Knuckle-Print Authentication System." Indian Journal of Science and Technology 7, no. 3 (2013): 374–82. http://dx.doi.org/10.17485/ijst/2014/v7i3.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mahboob, Ferheen. "MINUTIA EXTRACTOR AND MINUTIA MATCHER BASED FINGER PRINT RECOGNITION USING DIGITAL IMAGE PROCESSING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31823.

Full text
Abstract:
The MATLAB code presents a user-friendly graphical interface for fingerprint recognition and verification. Through this interface, users can load fingerprint images and execute a series of image processing tasks aimed at enhancing image quality and extracting crucial features. Operations such as histogram equalization, FFT enhancement, binarization, and thinning are available to optimize the fingerprint images for analysis. The system facilitates minutia extraction, identifying significant points like ridge endings and bifurcations, which are fundamental for fingerprint matching. Moreover, it includes functionalities for removing spurious minutiae, thereby improving the accuracy of the recognition process. Users can save and load fingerprint templates, streamlining the storage and retrieval of extracted features for matching purposes. Additionally, the system supports fingerprint matching, allowing users to compare templates and determine their similarity or match percentage. This versatile tool finds applications in biometric authentication systems, forensic analysis, and security domains, where robust fingerprint recognition and verification are imperative. Overall, the MATLAB code provides a comprehensive framework encapsulated within a user-friendly interface, offering researchers and practitioners a valuable resource for fingerprint analysis and biometric authentication. Keywords : Fingerprint recognition, GUI (Graphical User Interface), Security systems, Access control, Forensic analysis, User-friendly
APA, Harvard, Vancouver, ISO, and other styles
38

Mohammed Bala, Usman, Musbahu Muhammad Muhammad, and Ya’u Nuhu. "COVID 19 Concerns: A Boost to Contactless Biometric System." Journal of Applied Science, Information and Computing 2, no. 2 (2021): 24–27. http://dx.doi.org/10.59568/jasic-2021-2-2-03.

Full text
Abstract:
Finger print recognition is a secure and convenient technology that has become commonly used, not only in Smart phone but in our everyday activities. However, the recent global outbreak of corona virus is raising alarm about how safe using finger print authentication really is as touching the sensor can possibly spread the virus. The objective of this study is to provide ways to eliminate the risk of affecting with corona virus. This can be achieving by providing a touchless/contactless identification system at access control points using 3D + system develop by TBS. The system provides frictionless, no-contact readings even for people going through the system in a queue. The system captures properties of the hand and has applications for the COVID environment. This system provide high accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic.
APA, Harvard, Vancouver, ISO, and other styles
39

G, Kiran Kumar, Malathi Rani D, and Guru Mohan Rao E. "Fast palmprint retrieval using speed up robust features." Indian Journal of Science and Technology 13, no. 31 (2020): 3204–12. https://doi.org/10.17485/IJST/v13i31.404.

Full text
Abstract:
Abstract <strong>Background/Objective:</strong>&nbsp;Biometric usage is increasing in exponential series in all organisations for multiple purposes like employee attendance, Aadhaar based authentication and secure login using finger print etc. This biometric process should be as quick as possible without making much delay to retrieve the respective finger print. So an efficient quick retrieval procedure is required, in this regards a fast retrieval method for palm prints is proposed in this article.&nbsp;<strong>Method:</strong>&nbsp;This method uses Speed up Robust Features (SURF) and an efficient look up table for fast retrieval of palm prints. A key is computed for each palmprint by matching with a pre-selected palmprint called representative. This key is used, to place the palmprint into the look up table like traditional database record. To identify a query palmprint, key is computed and selects a set of palm prints from the look up table which are having similar key as possible matches.&nbsp;<strong>Findings:</strong>&nbsp;This proposed solution is experimented with multiple representative images to check the improved performance. As an outcome we could achieve better hit rate by comparing with existing system<strong>Novelty:</strong>. &nbsp;This proposed method makes the new palm prints dynamically without disturbing the current records in the system. The entire solution is experimented on benchmark PolyU palmprint database of 7,753 images and significant performance is shown in results. This proposed solution shows better results with respect to hit rate and miss rate. <strong>Keywords:</strong> Palmprint; index key; SURF; similarity score; representative
APA, Harvard, Vancouver, ISO, and other styles
40

Miss., Kamble Sunayana Nivrutti, Gund. V. D. Prof., and Kazi K. S. Prof. "Multimodal Biometrics Authentication System using Fusion of Fingerprint and Iris." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 1282–86. https://doi.org/10.31142/ijtsrd18861.

Full text
Abstract:
In the present era of information technology, there is a need to implement authentication and authorization techniques for security of resources. There are number of ways to prove authentication and authorization. But the biometric authentication beat all other techniques. Biometric techniques prove the authenticity or authorization of a human being based on his her physiological or behavioural traits. It also protects resources access from unauthorized users. We will develop a multimodal biometric identification system that represents a valid alternative to conventional approaches. In biometric system physical or behavioural traits are used. A multimodal biometric identification system aims to fuse two or more physical or behavioural traits. Multimodal biometric system is used in order to improve the accuracy. Multimodal biometric identification system based on Iris and fingerprint trait based on fuzzy logic is proposed. Typically in a multimodal biometric system each biometric trait processes its information independently. The processed information is combined using an appropriate fusion scheme. Miss. Kamble Sunayana Nivrutti | Prof. Gund. V. D. | Prof. Kazi K. S &quot;Multimodal Biometrics Authentication System using Fusion of Fingerprint and Iris&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18861.pdf
APA, Harvard, Vancouver, ISO, and other styles
41

Parvathi, M. "Data Security Using Unique Code Generation and Micro Pattern Analysis with GUA CCP Technique." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (2023): 1321–25. http://dx.doi.org/10.22214/ijraset.2023.55838.

Full text
Abstract:
Abstract: This project is concentrated on the data security using various authentication mechanisms. This is to validate the user to enter into the system and to access the database by using password. The password techniques will differ and it may be vary from stage to stage. If the password is correct then only the user can get accessing rights. In this project three different types of techniques are analyzed. The project comprises of text password i.e. passphrase, image based password and graphical password for the three levels respectively. First one is unique one time password generation whenever the user gets into login. Second one is behavioral authentication. User has to upload their finger print at the time of registration. User has to import their finger print. If it matches with the database already stored then the access rights will be given to the user. Third one is graphical password. In this method CCP method is implemented. Set of images uploaded at the time of registration and a pixel coordinate is fixed on each image. At the time of login user has to enter the correct pixel coordinate in all the images then only user can get the accessing rights. In these methods nobody can crack all the three level passwords. In the first level it is dynamic password and in the second level unique identification password and in the third level multiple static key points are used as password. It is highly impossible to crack the third level authentication.
APA, Harvard, Vancouver, ISO, and other styles
42

Marasco, Emanuela, and Anudeep Vurity. "Late Deep Fusion of Color Spaces to Enhance Finger Photo Presentation Attack Detection in Smartphones." Applied Sciences 12, no. 22 (2022): 11409. http://dx.doi.org/10.3390/app122211409.

Full text
Abstract:
Finger photo recognition represents a promising touchless technology that offers portable and hygienic authentication solutions in smartphones, eliminating physical contact. Public spaces, such as banks and staff-less stores, benefit from contactless authentication considering the current public health sphere. The user captures the image of their own finger by using the camera integrated in a mobile device. Although recent research has pushed boundaries of finger photo matching, the security of this biometric methodology still represents a concern. Existing systems have been proven to be vulnerable to print attacks by presenting a color paper-printout in front of the camera and photo attacks that consist of displaying the original image in front of the capturing device. This paper aims to improve the performance of finger photo presentation attack detection (PAD) algorithms by investigating deep fusion strategies to combine deep representations obtained from different color spaces. In this work, spoofness is described by combining different color models. The proposed framework integrates multiple convolutional neural networks (CNNs), each trained using patches extracted from a specific color model and centered around minutiae points. Experiments were carried out on a publicly available database of spoofed finger photos obtained from the IIITD Smartphone Finger photo Database with spoof data, including printouts and various display attacks. The results show that deep fusion of the best color models improved the robustness of the PAD system and competed with the state-of-the-art.
APA, Harvard, Vancouver, ISO, and other styles
43

Arunachalamand, MuthuKumar, and Kavipriya Amuthan. "Finger Knuckle Print Recognition using MMDA with Fuzzy Vault." International Arab Journal of Information Technology 17, no. 4 (2020): 554–61. http://dx.doi.org/10.34028/iajit/17/4/14.

Full text
Abstract:
Currently frequent biometric scientific research such as with biometric applications like face, iris, voice, hand-based biometrics traits like palm print and fingerprint technique are utilized for spotting out the persons. These specific biometrics habits have their own improvement and weakness so that no particular biometrics can adequately opt for all terms like the accuracy and cost of all applications. In recent times, in addition, to distinct with the hand-based biometrics technique, Finger Knuckle Print (FKP) has been appealed to boom the attention among biometric researchers. The image template pattern formation of FKP embraces the report that is suitable for spotting the uniqueness of individuality. This FKP trait observes a person based on the knuckle print and the framework in the outer finger surface. This FKP feature determines the line anatomy and finger structures which are well established and persistent throughout the life of an individual. In this paper, a novel method for personal identification will be introduced, along with that data to be stored in a secure way has also been proposed. The authentication process includes the transformation of features using 2D Log Gabor filter and Eigen value representation of Multi-Manifold Discriminant Analysis (MMDA) of FKP. Finally, these features are grouped using k-means clustering for both identification and verification process. This proposed system is initialized based on the FKP framework without a template based on the fuzzy vault. The key idea of fuzzy vault storing is utilized to safeguard the secret key in the existence of random numbers as chaff pints
APA, Harvard, Vancouver, ISO, and other styles
44

Et. al., Jaichandran R. ,. "Biometric Based User Authentication and Privacy Preserving In Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 347–50. http://dx.doi.org/10.17762/turcomat.v12i2.801.

Full text
Abstract:
Cloud technology provides advantage of storage services for individuals and organizations thus making file access easy and simple irrespective of location. The major concern is the security while the file is been outsourced. Maintaining integrity, file unchanged, gaining confidentiality during file outsourced plays an important role. In this paper, we propose identity based data outsourcing technique to provide data security during authorization and storage. For data authorization we propose finger print based authentication. The fingerprint based authentication is performed using Minutae Map algorithm (MM). For data security we convert the data owner files to hash values using SHA algorithm. Finally in the cloud storage stage, data security and data availability is addressed using multiple cloud storage system.
APA, Harvard, Vancouver, ISO, and other styles
45

Memon, Qurban A. "Multi-Layered Multimodal Biometric Authentication for Smartphone Devices." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 15 (2020): 222. http://dx.doi.org/10.3991/ijim.v14i15.15825.

Full text
Abstract:
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Moreover, most of the financial institutions such as banks, etc. enforce two or three step access into their corporate data to enforce security. However, personal devices currently do not support similar applications or way of enforcing multilayered access to its different domains/regions of data. In this paper, a multilayered multimodal biometric approach using three biometric methods (such as finger print, face and voice) is proposed for smartphones. It is shown that fusion of biometric methods can be layered to enforce secured access to private data on smartphone. The experimental results are presented.
APA, Harvard, Vancouver, ISO, and other styles
46

Waghmode,, Mahesh N. "Raspberry Pi Enabled Biometric Attendance System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34994.

Full text
Abstract:
The precision and ease of use of the BIOMETRIC Attendance System draw many users to it among the many real-time apps available today. The development of an attendance system based on fingerprints was a significant difficulty. This method proposes to use a Raspberry Pi running Linux as the attendance system. The procedure starts with the generation of the database using a fingerprint reader and continues with the system-provided recognition and authentication. The Raspberry Pi platform is used for the entire procedure. The standardized fingerprint authentication approach, which can extract an individual's finger print and compare it to a database, is presented in this study. Additionally, it can give parents and teachers a summary of attendance on a daily and monthly basis. The main goal of the study that follows is to use biometric systems for verifying and authenticating the physical attendance of inmates in any kind of organization. This is made possible by the working principle of biometrics, which is based on control of prominent scalability, flexible properties, and cost reduction for reducing the requirements of biometric systems for numerous computational resources. Key Words: Fingerprint Sensor, Interfacing, Raspberry Pi.
APA, Harvard, Vancouver, ISO, and other styles
47

Imran M. Hussain Qureshi and Vijay K. Kale. "A study of risk-based authentication system in cyber security using machine learning." World Journal of Advanced Engineering Technology and Sciences 7, no. 2 (2022): 065–70. http://dx.doi.org/10.30574/wjaets.2022.7.2.0125.

Full text
Abstract:
The optimum authentication method is determined by the user's risk profile, which is created using context- and behavior-based data from the user's device, finger print, one-time password, and other characteristics. Hacking and security breaches of online accounts, including social networking and web ac- counts, are very common in today's society. We suggest a Risk Based Authentication System utilizing Machine Learning to stop this. For the protection of data and money in this internet environment, security is a worry. Numerous parameters are researched and taken into consideration in the paper in order to solve the issue. These variables determine whether to grant the user permission or not. The gradients descent method is used to verify the user. Previous literature is re- viewed with technical details of the system before conclusion.
APA, Harvard, Vancouver, ISO, and other styles
48

SATHYA., M., KARTHIC.N, P. KISHORE., and KANAGARAJ.E. "ADVANCEMENT OF TECHNOLOGY IN IDENTIFICATION-BIO-METRICS." International Journal of Advances in Engineering & Scientific Research 1, no. 5 (2014): 63–68. https://doi.org/10.5281/zenodo.10721686.

Full text
Abstract:
<strong><em>Abstract</em></strong> <em>Biometrics</em><em> refers to metrics related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control It is also used to identify individuals in groups that are under </em><em>surveillance</em><em>. Behavioral characteristics are related to the pattern of behavior of person, including but not limited to typing pulse, </em><em>gait</em><em>, and </em><em>voice</em><em>. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.[2]</em> <strong><em>Keywords: </em></strong><em>Iris Recognition, Finger-Print, Sensors, Hand Geometry,</em> <em>Reducibility. </em> &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
49

Hammouche, Rabah, Abdelouahab Attia, and Samir Akrouf. "A NOVEL SYSTEM BASED ON PHASE CONGRUENCY AND GABOR - FILTER BANK FOR FINGER KNUCKLE PATTERN AUTHENTICATION." ICTACT Journal on Image and Video Processing 10, no. 3 (2020): 2125–31. https://doi.org/10.21917/ijivp.2020.0303.

Full text
Abstract:
The authentication of individuals based on Finger Knuckle print (FKP) is a very interesting system in the biometric community. In this paper, we introduce a biometric authentication system based on the FKP trait which consists of four stages. The first one is the extraction of the Region of Interest (ROI). The Phase Congruency method with Gabor filters bank descriptors has been used in the feature extraction stage. Then to enhance the performance of the proposed scheme the Principle Component Analysis (PCA) + Linear Discriminant Analysis (LDA) method has been used in the dimensionality reduction stage. Finally, cosine Mahalanobis distance has been used in the matching stage. Experiments were conducted on the FKP PolyU Database which are publicly available. The reported results with comparison to previous methods prove the effectiveness of the proposed scheme, as well as the given system can achieve very high performance in both the identification and verification modes.
APA, Harvard, Vancouver, ISO, and other styles
50

Bilal, Hussain Ch, and Subayyal. "Secure E Banking Using Bioinformatics." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 302–6. https://doi.org/10.31142/ijtsrd18455.

Full text
Abstract:
During the past decade e banking has emerged with enormous speed. The use of e banking and the application of e banking is now enormous these days. But the modern banking completely relies on internet and computer technology, the threats and the chances of breaching the security has also increased. We are totally dependent on the internet to carry out the transactions and the daily routines in the banks. Thus there is the immense need of increasing the security in the banking field. We have developed the system in which we have developed a secure banking system. We are using Finger print authentication device and the GSM module to carry out the functionalities of the system. Bilal Hussain Ch | Subayyal &quot;Secure E-Banking Using Bioinformatics&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18455.pdf
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!