Security BM Techiniqueusing in Digital Image Processing

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 18, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: S.Thiraviya Regina Rajam,Dr. S.Britto Ramesh Kumar,G.Karthiga


View PDF Format


In today world advanced used in technology have made easier by providing to high levels of knowledge to different major function is how to secure in personal data and information. Biometrics means measurement statistical analysis of peoples physical and behavioral characters..The term ―Biometrics‖is derived from the Greek words Bio (life) and Metric(life).The Bio-Metric(BM) security system increasing in cyber security system. The biometrics recover the technologies for measuring and analyzing a person physiological characteristics. These characteristics are unique to verify and identify person. The main research areas and it application to develop the security system for high security areas.


1.Julian Ashbourn, Biometrics: Advanced Identity Verification, London: Springer-Verlag, pp. 5-11,2015. 2.A.K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in a Networked Society, KluwerAcademic Publishers. 3.Best Practices in Testing and Reporting Biometric Device Performance,version 2.0, tech. report, United Kingdom Biometric Working Group, 2002; technology/biometrics. 4. Maltoni et al., Handbook of Fingerprint Recognition, Springer, 2013. 5.Password Clues, The CentralNic Password Survey Report, CentralNic, 13 July 2015; php?pid=73. 6. Maio et al., ―FVC2002: Second Fingerprint Verification Competition,‖ Proc. Int’l Conf. Pattern Recognition, vol. 3, IEEE CS Press, 2013, pp. 811–814.


Cyber security, Iris and security.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

Facebook IconYouTube IconTwitter IconVisit Our Blog