4 research outputs found

    A Treatise on the use of Finger Print for a Biometric Authentication System

    Get PDF
    In this paper an attempt has been made to present a scheme that combines Biometrics, in the form of finger prints with passwords to answer some key authentication questions such as who one is, and what does one know. In addition nonces and time-stamps have been used to prevent replay attacks. The method proposed here is a two-factor authentication algorithm that can be used between a client and a server or in general a service requester and a service provider. The method is resistant to man-in-the-meet attacks and also does not depend upon third-party authentication agents

    An automatic and efficient foreground object extraction scheme

    Full text link
    This paper presents a method to differentiate the foreground objects from the background of a color image. Firstly a color image of any size is input for processing. The algorithm converts it to a grayscale image. Next we apply canny edge detector to find the boundary of the foreground object. We concentrate to find the maximum distance between each boundary pixel column wise and row wise and we fill the region that is bound by the edges. Thus we are able to extract the grayscale values of pixels that are in the bounded region and convert the grayscale image back to original color image containing only the foreground object
    corecore