Spoof attack suppression by the bio metric information incorporation is the new and modern method of avoid and as well suppression the attack online as well Off line . Wireless networks provide various ad vantages in real world. This can help businesses to increase their productivity, lower cost and effectiveness, increase scalability and improve relationship with business partners and attract customers. In recent decades, we have witnessed the evolution of bio metric technology from the first pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as fingerprint, face, or iris, to more marginal ones, such as signature or hand.
Fingerprints cannot lie, butliars can make fingerprints". Unfortunately, this paraphrase of an old quote attributed to Mark Twain 1 has been proven right in many occasions now. And not only for fingerprints, but also for many other bio metric traits such as face, iris, voice or even gait. Every technology has its own time. Since the first pioneering works on automatic voice and face recognition over 40 years ago [1]"“[2][3], steady and con] tinuous progress has been made in the development of bio metric technology.
Driven by the very appealing new security bio metric paradigm "forget about cards and passwords, you are your own key",researchers from many different fields such as image processing, computer vision or pattern recognition, have applied the newest techniques in each of these areas to improve the performance of bio metric systems [4]. This path of technological evolution has permitted the use of bio metrics in many diverse activities such as forensics, border and access control, surveillance or on-line commerce.
Prof Hadadi Sudheendra | Dr. N Krishnamurthy" Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018,
Paper URL: http://www.ijtsrd.com/papers/ijtsrd15801.pdf
Direct URL: http://www.ijtsrd.com/other-scientific-research-area/other/15801/novel-promising-algorithm-to-suppress-spoof-attack-by-cryptography-firewall2014/prof-hadadi-sudheendra
Fingerprints cannot lie, butliars can make fingerprints". Unfortunately, this paraphrase of an old quote attributed to Mark Twain 1 has been proven right in many occasions now. And not only for fingerprints, but also for many other bio metric traits such as face, iris, voice or even gait. Every technology has its own time. Since the first pioneering works on automatic voice and face recognition over 40 years ago [1]"“[2][3], steady and con] tinuous progress has been made in the development of bio metric technology.
Driven by the very appealing new security bio metric paradigm "forget about cards and passwords, you are your own key",researchers from many different fields such as image processing, computer vision or pattern recognition, have applied the newest techniques in each of these areas to improve the performance of bio metric systems [4]. This path of technological evolution has permitted the use of bio metrics in many diverse activities such as forensics, border and access control, surveillance or on-line commerce.
Prof Hadadi Sudheendra | Dr. N Krishnamurthy" Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018,
Paper URL: http://www.ijtsrd.com/papers/ijtsrd15801.pdf
Direct URL: http://www.ijtsrd.com/other-scientific-research-area/other/15801/novel-promising-algorithm-to-suppress-spoof-attack-by-cryptography-firewall2014/prof-hadadi-sudheendra
No comments:
Post a Comment