Three Level Security System using Image Based Authentication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

An Image Based Approach for Authentication Using Multi-level Security System

-Security-sensitive environments defend their resources against unauthorized access by implementing access management mechanisms. Text based passwords are not secure enough for such applications. Increasing security has regularly been a problem since net and net Development came into existence, text primarily based passwords is not enough to counter such problems, that's to boot Associate in Nu...

متن کامل

image authentication using lbp-based perceptual image hashing

feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...

متن کامل

Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol

being developed using Scripting languages. PHP (ver. 5) and MySQL along with AJAX have been used extensively. Abstract:-Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friend...

متن کامل

Enhancing Security System using Finger Print based Authentication

Security has been assuming a key part in lots of places like workplaces, foundations, libraries, research centres and so on so as to keep our information secretly so that no other unapproved individual could have an entrance on them. These days we require security frameworks for protection of profitable information and even cash. This paper displays a finger print based entryway opening system ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2018

ISSN: 2319-5940,2278-1021

DOI: 10.17148/ijarcce.2018.71129