A Region Boundaries Algorithm for Ear Authentication Based on Plots
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Ear recognition methods in image processing become a key issue in ear identification and analysis for many geometric applications. Actually, the Captcha as graphical password methods like click text, click animal, and animal grid are used to provide authentication web applications. These methods results to security attacks. So, ear recognition methods are helpful when a RBA, converts the original image to inverted binary image to plot the boundaries of the ear.The obtained image, shows the plots like circles, Rectangular, and Squares. This paper hence proposed an RBA method, which provides more Authentication than CaRp method.

Keywords: Recognition, Authentication, RBA, Boundaries, Plots

Edition: Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

Share this Article

How to Cite this Article?

G. Harsha Vardhan, K. Jeeva, "A Region Boundaries Algorithm for Ear Authentication Based on Plots", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157644, Volume 4 Issue 8, August 2015, 1565 - 1567

126 PDF Views | 92 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Recognition'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2325 - 2329

Word Representation for Biomedical Textmining based on NNGM with Image to Text Conversion

Jinsha V. S., Limna Das.P

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2810 - 2813

Palm Print Recognition System ? Review

Mohit Trehan, Nitin Bhagat

Share this Article

Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Similar Articles with Keyword 'RBA'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1742 - 1745

A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing

Dr. Raafiya Gulmeher, Javeriya Shabnam

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Similar Articles with Keyword 'Boundaries'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1230 - 1231

Employee Tracking System by Google Geo Fencing

Mohammed Shamseer Vettan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1702 - 1705

An Adaptive Recursive Reconstruction Technique for Segmentation of Images

Peram Nagamani, Gunna Kishore

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1789 - 1791

Role of Active Contour in Image Processing

Manjeet Kaur, Sukhpreet Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article
Top