Biometric Cc Cam for Identifying a Particular Object or Person Initially
نویسندگان
چکیده
Biometrics is not novel to everyone. But we are eager to follow the features provided by biometrics for our security in offices and in any other security required areas. But we are not bothering about the nation security. Today the biometric cc cam is not completely available for our nation security. So we tried to propose a new concept in biometric cc cams to protect our nation. Biometric cc cam is used to trace capture all the pottages and they are stored in the database of control room. If any attacks occurred they will search for proofs at that stage. But we are proposing cc cam with an inbuilt chip which consists of the pottages of most wanted persons and it have the capability of ringing an alarm when any one of those persons whose information is pre stored with a chip. This alarm alerts whole area and also the control room. With this camera we can easily trace the terrorists and any wanted persons. These cams also have the capability of storing large amount pottages per second. If any squad want proves they will approach these cams pottages.
منابع مشابه
An Approach for Human Identification by Ear Biometric System
Ear biometric for identification of human is quite complex task. It’s use either uni-modal or multi-modal approach in order to authenticate a person. A uni-modal biometric system involves a single source of biometric to identify a person. This paper is based on uni-modal approach with ear as a biometric trait for recognizing a person. In this paper, an experimental approach is used for identify...
متن کاملAnalysis of various Biometric Techniques
Biometrics is automated methods for identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic has the capability to reliably distinguish between an authorized person and an imposter. Since biometric characteristics are distinctive, can not be forgotten or lost, and the person to be authenticated needs to be physically present at the point o...
متن کاملIdentification versus Verification
This appendix expands on information presented in Chapter Two. It begins with a definition of biometrics and related terms, and then describes the steps in the biometric authentication process, reviews issues of template management and storage, and addresses testing issues. The appendix concludes with a brief review of mainstream biometric applications. 1 DEFINITIONS A biometric is any measurab...
متن کاملEvaluation of Periocular over Face Biometric: A Case Study
Recognition of a person through his face is the primitive mean of human identification. Identifying a person through face biometric have grown its importance through the last decade and researchers have attempted to find unique facial feature-points. Facial data also contains change with expression and age, which makes recognition through face difficult. And there has developed a stringent nece...
متن کاملSecure Iris Authentication Using Visual Cryptography
Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013