International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 103

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015


A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva


Abstract: Ear recognition methods in image processing become a key issue in ear identification and analysis for many geometric applications. Actually, the Captcha as graphical password methods like click text, click animal, and animal grid are used to provide authentication web applications. These methods results to security attacks. So, ear recognition methods are helpful when a RBA, converts the original image to inverted binary image to plot the boundaries of the ear. The obtained image, shows the plots like circles, Rectangular, and Squares. This paper hence proposed an RBA method, which provides more Authentication than CaRp method.


Keywords: Recognition, Authentication, RBA, Boundaries, Plots


Edition: Volume 4 Issue 8, August 2015,


Pages: 1565 - 1567


How to Cite this Article?

G. Harsha Vardhan, K. Jeeva, "A Region Boundaries Algorithm for Ear Authentication Based on Plots", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB157644, Volume 4 Issue 8, August 2015, 1565 - 1567

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Recognition'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'RBA'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Similar Articles with Keyword 'Boundaries'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1230 - 1231

Employee Tracking System by Google Geo Fencing

Mohammed Shamseer Vettan

Share this Article
Top