Secure Online Transaction using Iris

نویسندگان

چکیده

In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates shifting environment. To begin with, Haar cascade based has been connected quick and basic confront location from the input picture. The picture is at that point being changed over into grayscale After that, iris, eyebrows, nose, mouth of candidates extricated escalated valleys recognized confront.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Methods for Transaction in Secure Online Banking

Security is a concept similar to being cautious or alert against any danger. Network security is the condition of being protected against any danger or loss. Thus safety plays a important role in bank transactions where disclosure of any data results in big loss. We can define networking as the combination of two or more computers for the purpose of resource sharing. Resources here include file...

متن کامل

Secure Iris Authentication Using Visual Cryptography

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

متن کامل

A Secure Electronic Murabaha Transaction

Conventional credit card transactions are not consistent with Islamic principles, as exemplified by the Islamic banking system and the ‘Murabaha sale’. Thus, if Islamic principles are to be applied to e-commerce, where credit card transactions are the norm, a new and secure electronic payment process is required. In this paper we present a method for secure electronic Murabaha transactions. Aft...

متن کامل

Properties of secure transaction protocols

Communication protocols are the computational basis for distributed electronic commerce systems, and thus the properties of these protocols deene the forms of commerce possible in electronic systems. Existing protocols used for electronic commerce focus primarily on security properties, including message integrity, privacy and non-repudiation, and on basic transaction properties, usually just a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Cryptography and Network Security (IJCNS)

سال: 2021

ISSN: ['2582-9238']

DOI: https://doi.org/10.35940/ijcns.a1408.111221