International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064

Downloads: 130

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

Vein Map Technology with Kerberos Authentication

Asmita B. Kalamkar [2] | Dr. K. N. Honwadkar [3]

Abstract: In acknowledgment of human distinguishing proof for wellbeing and to secure the information is an all around issue of concern in our existence today. At the point, when developing assurance is an issue, content focused security passwords are lacking to invert such issues. So the thought of unique mark and image based verification came into picture. Biometrics utilizes individual physical or conduct highlights for individual acknowledgment evidence, for example, unique finger impression acknowledgment, facial acknowledgment, retina checking and eye filtering has been generously broke down as an answer for security issues. Nonetheless, most current unique mark strategies have high many-sided quality in time or space or both, and are along these lines not suitable for a few gadgets. In this paper, we suggest a finger-vein acknowledgment framework alongside Kerberos authentication for confirmation. Human finger veins are rich in pints of premium which are known as subtle elements, which can be used as acknowledgment proof for check. More over every individual's vein of guide is exceptional, no two persons on the planet can have the same vein of guide. For additional assurance reason, we can union vein map innovation and the Kerberos confirmation i. e. authentication with additional server i. e. Image Server. This gives a secured channel for communication over network.

Keywords: Authentication, Biometrics, Finger-Vein Recognition, Image Based Authentication System, Kerberos Protocol

Edition: Volume 4 Issue 9, September 2015,

Pages: 750 - 752

How to Cite this Article?

Asmita B. Kalamkar, Dr. K. N. Honwadkar, "Vein Map Technology with Kerberos Authentication", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 750-752,

How to Share this Article?

Similar Articles with Keyword 'Authentication'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal [2] | Renuka Singh [2]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article