Downloads: 103 | Views: 317
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015 | Popularity: 6.8 / 10
A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Abstract: Ear recognition methods in image processing become a key issue in ear identification and analysis for many geometric applications. Actually, the Captcha as graphical password methods like click text, click animal, and animal grid are used to provide authentication web applications. These methods results to security attacks. So, ear recognition methods are helpful when a RBA, converts the original image to inverted binary image to plot the boundaries of the ear. The obtained image, shows the plots like circles, Rectangular, and Squares. This paper hence proposed an RBA method, which provides more Authentication than CaRp method.
Keywords: Recognition, Authentication, RBA, Boundaries, Plots
Edition: Volume 4 Issue 8, August 2015
Pages: 1565 - 1567
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 642 - 647Face Liveness to Identify Between Actual Face and Spoof Face
Lovely Pal, Renuka Singh
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya