Time filter

Source Type

Aralvaimozhi, India

Manju M.,Jayamatha Engineering College
Journal of Theoretical and Applied Information Technology | Year: 2014

The huge number of fingerprints collected by the Federal Bureau of Investigation (FBI) has created an enormous problem in storage and transmission. Increase of online communication and transactions, has led to the requirement of security and privacy measures to be inbuilt in fingerprint recognition system. There are several solutions already in use to protect confidential information and to authenticate people electronically. When biometrics is used, it often deals with a discussion concerning privacy and integrity. This paper proposes a new methodology for effectively avoiding the replay attack during transmission of minutiae data. The minutiae information is split in to two parts and the first part is encrypted using pseudorandom permutation and then the remaining part of the minutiae information is embedded into the resultant permuted sequence using a low distortion based digital watermarking transform technique. To prove the integrity of the transmitted data, the receiver performs the same operation as that of the sender and compares the obtained data with the received data. Thus this algorithm gives solution to the replay attack which is found most common in all ATM based applications. © 2005 - 2014 JATIT & LLS. All rights reserved. Source

Brindha T.,Noorul Islam University | Shaji R.S.,Noorul Islam University | Rajesh G.P.,Jayamatha Engineering College
International Journal of Engineering and Technology | Year: 2013

Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data to the cloud in a rapid and secure manner. It assists activities and government agencies considerably decrease their economic overhead of data organization, as they can store their data endorsement vaguely to third-party cloud storage sources than preserving the data centers on their personal. Cloud storage allows users to accumulate their data at a remote location and have the on-demand high superiority cloud requests without the burden of restricted hardware and software organization. Along with the widespread benefits on cloud computing, however, security issues with cloud data storage are arising in terms of confidentiality, integrity and reliability. Although the profits are obvious, such a service is also turning down user's corporeal control of their outsourced data, which unavoidably facades novel security dangers towards the accuracy of the data in cloud. This paper provides a comprehensive survey of major security issues that exists in cloud data storage. We also conduct extensive empirical studies and analysis of different techniques which provides security fortification for outsourced data in cloud computing environment. Source

Manju M.,Jayamatha Engineering College
International Journal of Security and its Applications | Year: 2014

With the fast improvement of multimedia technologies and the rising attractiveness of the internet, information or data hiding methods have become more and more extensively applied to achieve authentication. Data hiding methods are ways of embedding additional messages into host signals by modifying their original contents without introducing perceptual changes. The main aim of the paper is to present a survey on traditional data hiding techniques which are mainly based on reducing the embedding distortions. © 2014 SERSC. Source

Manju M.,Jayamatha Engineering College | Kavitha V.,Anna University
International Journal of Soft Computing | Year: 2013

In this study, the accuracy of finger print recognition problem is been addressed. As per the literature the Back Propagation Network (BPN) for fingerprint recognition has resulted in inconsistent with unpredictable performance. This research has proposed the soft computing tool to images to overcome the low recognition rate and the low accuracy in fingerprint identification. Fuzzy logic is worn to eliminate the false minutiae from the fingerprint. Genetic algorithm has been incorporated to optimize the weights of neural network and the accuracy in the recognition process has been improved. The proposed method is implemented on the F VC 2004 DB1 database. The Laplacian based Pyramidal Model has strongly supported in fingerprint enhancement process which has increased the Peak Signal to Noise Ratio (PSNR) and decreased the Mean Square Error (MSE). The results have proven that the false minutiae have been eliminated by applying fuzzy rules and also the Equal Error Rate (EER) has been reduced. The increase in the recognition accuracy moreover in turn has reduced the training and the testing time. © 2013, Medwell Journals. Source

Uma R.,Jayamatha Engineering College | Muneeswaran K.,Mepco Schlenk Engineering College, Sivakasi
International Journal of Soft Computing | Year: 2013

The increasing growth of content volume in the internet makes the content management process challengeable to the various web search engines which in turn need increasing developments in information retrieval process. This study comprises the advantages of two methodologies namely ontology determination and synonym determination which paves a way for building up an effective web search mechanism. Further researchers developed an approach for the retrieval of information consisting of both the semantic perspective density approach and lexical resources. Those two approaches provide us with the catalog of the type of things or categories for the queries thrown on to the search engine. Retrieved documents are displayed to user based on document ranking process. Display starts with top ranked document. © Medwell Journals, 2013. Source

Discover hidden collaborations