4 research outputs found
A Treatise on the use of Finger Print for a Biometric Authentication System
In this paper an attempt has been made to present a scheme that combines Biometrics, in the form of finger prints with passwords to answer some key authentication questions such as who one is, and what does one know. In addition nonces and time-stamps have been used to prevent replay attacks. The method proposed here is a two-factor authentication algorithm that can be used between a client and a server or in general a service requester and a service provider. The method is resistant to man-in-the-meet attacks and also does not depend upon third-party authentication agents
An automatic and efficient foreground object extraction scheme
This paper presents a method to differentiate the foreground objects from the
background of a color image. Firstly a color image of any size is input for
processing. The algorithm converts it to a grayscale image. Next we apply canny
edge detector to find the boundary of the foreground object. We concentrate to
find the maximum distance between each boundary pixel column wise and row wise
and we fill the region that is bound by the edges. Thus we are able to extract
the grayscale values of pixels that are in the bounded region and convert the
grayscale image back to original color image containing only the foreground
object