Seminarsonly.com

Custom Search

>>

 

Are you interested in this topic.Then mail to us immediately to get the full report.

email :- contactv2@gmail.com

 

 

Custom Search

 

 

 

 

 

 

 
Secure ATM by Image Processing

   

Definition

Every biometric system has its limitations. Therefore, identification based on multiple biometrics is an emerging trend as multimodel biometrics can provide a more balanced solution to the security multimodel systems involve the use of more than one biometric system. Our contribution to the above subject is that we have developed an algorithm on banking security. For this we have considered a bank using biometric technology for its security purpose. The security is assured by using finger scan, voice scan, hand geometry scan and by requesting the password given by the bank for a particular user when necessary.

Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors.

What is Digital Image Processing?

An Image may be defined as a two dimensional function f (x,y) where x and y are spatial(plane) coordinates x, y is called intensity or gray level of the image at that point. When x, y and the amplitude values of f are all finite, discrete quantities, we call the image a digital image.

Interest in digital image areas: improvement of pictorial information for human interpretation: and representation for autonomous machine perception.

The entire process of Image Processing and starting from the receiving of visual information to the giving out of description of the scene, may be divided into three major stages which are also considered as major sub areas, and are given below

(i) Discretization and representation : Converting visual information into a discrete form: suitable for computer processing: approximating visual information to save storage space as well as time requirement in subsequent processing.

(ii) Processing : Improving image quality by filtering etc ; compressing data to save storage and channel capacity during transmission.

(iii) Analysis: Extracting image features; qualifying shapes, registration and recognition.

Draw back of passwords-need for Biometrics

No more problems if forgotten passwords and id codes, biometrics is the technology taking care of it which turns your body into your password. Typically, the more rigorous you make your password selection and construction rules the more difficulty users will have in remembering their passwords. Unfortunately, strict password rules are necessary to stop simple hacker attacks on the network.

The fundamental problem with password is two fold. First, they are transferable they can be written down on paper, they can be transferred to some one who should not have them. Second, and just as important, they can be forgotten. Recent research suggests that a forgotten password can cost as much as US$ 340 per event! This is n't too surprising. Clearly, the risk and costs of compromised passwords are a significant facto to consider in developing any sure system. The critical need for additional level of security has given rise to the field of "BIOMETRICS"


You may also like this : EDGE, Holographic Data Storage , Integer Fast Fourier Transform, NRAM, Orthogonal Frequency Division Multiplplexing , Ovonic Unified Memory, 4G Wireless Systems , Daknet, AC Performance Of Nanoelectronics , High Performance DSP Architectures, Millipede , Free Space Laser Communications, Short Message Service (SMS), Conditional Access System , SyncML, Virtual keyboard, High Altitude Aeronautical Platforms, MANET , Smart Fabrics, Dynamic Virtual Private Network, Blue Tooth, Autonomic Computing , Voice Over Internet Protocol, Artificial Neural Network (ANN) , DNA Based Computing, Digital Subscriber Line , Freenet, Access gateways , Free Space Optics, Introduction to the Internet Protocols, High Altitude Aeronautical Platforms, Fiber Distributed Data Interface , Hyper-Threading technology , IMode, Cyberterrorism Adding Intelligence to Internet, Self-Managing Computing, Unified Modeling Language (UML), Socket Programming, SAM, VoCable , ATM with an Eye,Mind Reading Computer, Blue Brain, 6G Wireless, Touch Screens,IT Seminar Reports, PPT and PDF.

<<back


copyright © 2006 V2 Computers E-mail :- contactv2@gmail.com