Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014 - International Journal of Trend in Scientific Research and Development

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Friday, 19 January 2018

Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014

Spoof attack suppression by the bio metric information incorporation is the new and modern method of avoid and as well suppression the attack online as well Off line . Wireless networks provide various ad vantages in real world. This can help businesses to increase their productivity, lower cost and effectiveness, increase scalability and improve relationship with business partners and attract customers. In recent decades, we have witnessed the evolution of bio metric technology from the first pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as fingerprint, face, or iris, to more marginal ones, such as signature or hand.

Fingerprints cannot lie, butliars can make fingerprints". Unfortunately, this paraphrase of an old quote attributed to Mark Twain 1 has been proven right in many occasions now. And not only for fingerprints, but also for many other bio metric traits such as face, iris, voice or even gait. Every technology has its own time. Since the first pioneering works on automatic voice and face recognition over 40 years ago [1]"“[2][3], steady and con] tinuous progress has been made in the development of bio metric technology.

Driven by the very appealing new security bio metric paradigm "forget about cards and passwords, you are your own key",researchers from many different fields such as image processing, computer vision or pattern recognition, have applied the newest techniques in each of these areas to improve the performance of bio metric systems [4]. This path of technological evolution has permitted the use of bio metrics in many diverse activities such as forensics, border and access control, surveillance or on-line commerce.

Prof Hadadi Sudheendra | Dr. N Krishnamurthy" Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018,

Paper URL: http://www.ijtsrd.com/papers/ijtsrd15801.pdf

Direct URL: http://www.ijtsrd.com/other-scientific-research-area/other/15801/novel-promising-algorithm-to-suppress-spoof-attack-by-cryptography-firewall2014/prof-hadadi-sudheendra

No comments:

Post a Comment

Ad