A Region Boundaries Algorithm for Ear Authentication Based on Plots
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 103

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Ear recognition methods in image processing become a key issue in ear identification and analysis for many geometric applications. Actually, the Captcha as graphical password methods like click text, click animal, and animal grid are used to provide authentication web applications. These methods results to security attacks. So, ear recognition methods are helpful when a RBA, converts the original image to inverted binary image to plot the boundaries of the ear. The obtained image, shows the plots like circles, Rectangular, and Squares. This paper hence proposed an RBA method, which provides more Authentication than CaRp method.

Keywords: Recognition, Authentication, RBA, Boundaries, Plots

Edition: Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

Share this Article

How to Cite this Article?

G. Harsha Vardhan, K. Jeeva, "A Region Boundaries Algorithm for Ear Authentication Based on Plots", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157644, Volume 4 Issue 8, August 2015, 1565 - 1567

Enter Your Email Address




Similar Articles with Keyword 'Recognition'

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 41 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Downloads: 64 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2357 - 2361

An Efficient Coin Recognition Technique using Rotational Invariance Approach

Nikita N Shelgikar, Prof. L. M. R. J Lobo

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2325 - 2329

Word Representation for Biomedical Textmining based on NNGM with Image to Text Conversion

Jinsha V. S., Limna Das.P

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'RBA'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Similar Articles with Keyword 'Boundaries'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 104 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1230 - 1231

Employee Tracking System by Google Geo Fencing

Mohammed Shamseer Vettan

Share this Article

Downloads: 106 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1702 - 1705

An Adaptive Recursive Reconstruction Technique for Segmentation of Images

Peram Nagamani, Gunna Kishore

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1789 - 1791

Role of Active Contour in Image Processing

Manjeet Kaur, Sukhpreet Kaur

Share this Article



Top