M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015
A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Ear recognition methods in image processing become a key issue in ear identification and analysis for many geometric applications. Actually, the Captcha as graphical password methods like click text, click animal, and animal grid are used to provide authentication web applications. These methods results to security attacks. So, ear recognition methods are helpful when a RBA, converts the original image to inverted binary image to plot the boundaries of the ear.The obtained image, shows the plots like circles, Rectangular, and Squares. This paper hence proposed an RBA method, which provides more Authentication than CaRp method.
Keywords: Recognition, Authentication, RBA, Boundaries, Plots
Edition: Volume 4 Issue 8, August 2015
Pages: 1565 - 1567
How to Cite this Article?
G. Harsha Vardhan, K. Jeeva, "A Region Boundaries Algorithm for Ear Authentication Based on Plots", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157644, Volume 4 Issue 8, August 2015, 1565 - 1567
126 PDF Views | 92 PDF Downloads
Similar Articles with Keyword 'Recognition'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1673 - 1677Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021
Pages: 1165 - 1168A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2325 - 2329Word Representation for Biomedical Textmining based on NNGM with Image to Text Conversion
Jinsha V. S., Limna Das.P
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2810 - 2813Palm Print Recognition System ? Review
Mohit Trehan, Nitin Bhagat
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Similar Articles with Keyword 'RBA'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3087 - 3089Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption
Vanajakshi Devi.K, Praveen Kumar.N
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1742 - 1745A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing
Dr. Raafiya Gulmeher, Javeriya Shabnam
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2457 - 2462Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
Rashmi Kadu, Sonali Patil
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1295 - 1299Video Analysis to Detect and Track Road Ahead for Safety
Laxmi, Dr. Neelam Srivastava
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2040 - 2043An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform
Akshata S Kori, Manjunatha A S.
Similar Articles with Keyword 'Boundaries'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020
Pages: 1230 - 1231Employee Tracking System by Google Geo Fencing
Mohammed Shamseer Vettan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1702 - 1705An Adaptive Recursive Reconstruction Technique for Segmentation of Images
Peram Nagamani, Gunna Kishore
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1295 - 1299Video Analysis to Detect and Track Road Ahead for Safety
Laxmi, Dr. Neelam Srivastava
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1789 - 1791Role of Active Contour in Image Processing
Manjeet Kaur, Sukhpreet Kaur
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva