Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 4 of 4
  • Item
    FIVDL: Fingerprint Image Verification using Dictionary Learning
    (Elsevier, 2015) Arunalatha, J.S.; Tejaswi, V.; Shaila, K.; Anvekar, D.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M.
    Fingerprints are used for identification in forensics and are classified into Manual and Automatic. Automatic fingerprint identification system is classified into Latent and Exemplar. A novel Exemplar technique of Fingerprint Image Verification using Dictionary Learning (FIVDL) is proposed to improve the performance of low quality fingerprints, where Dictionary learning method reduces the time complexity by using block processing instead of pixel processing. The dynamic range of an image is adjusted by using Successive Mean Quantization Transform (SMQT) technique and the frequency domain noise is reduced using spectral frequency Histogram Equalization. Then, an adaptive nonlinear dynamic range adjustment technique is utilized to determine the local spectral features on corresponding fingerprint ridge frequency and orientation. The dictionary is constructed using spatial fundamental frequency that is determined from the spectral features. These dictionaries help in removing the spurious noise present in fingerprints and reduce the time complexity by using block processing instead of pixel processing. Further, dictionaries are used to reconstruct the image for matching. The proposed FIVDL is verified on FVC database sets and Experimental result shows an improvement over the state-of-the-art techniques. © 2015 The Authors.
  • Item
    SGR: Secure geographical routing in Wireless Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2015) Lata, B.T.; Tejaswi, V.; Shaila, K.; Raghavendra, M.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M.
    Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems(GPS). This helps to easily detect the position of their neighboring nodes. The power consumption is more in the existing routing algorithms, since the nodes build the routing tables and the neighboring node IDs are determined by searching the routing table. In this paper, we have proposed Secure Geographical Routing (SGR) algorithm in which the data traffic and energy consumption is minimized using single copy data transfer. In SGR, initially one copy is transmitted to the next node using greedy approach and another copy is preserved in the sending station. If acknowledgment is not received even after timeout then the second copy is transmitted. This dynamic single copy scheme reduces the data traffic in Wireless Sensor Networks. Security algorithms are incorporated in every sensor node to prevent any malicious node attack that disturb the normal functioning of the network. Simulation result shows that the performance of the proposed algorithm is better in terms of packet delivery probability and energy consumption in comparison with existing algorithms. © 2014 IEEE.
  • Item
    SALR: Secure adaptive load-balancing routing in service oriented wireless sensor networks
    (Institute of Electrical and Electronics Engineers Inc., 2015) Lata, B.T.; Sumukha, T.V.; Suhas, H.; Tejaswi, V.; Shaila, K.; Venugopal, K.R.; Anvekar, D.; Patnaik, L.M.
    Congestion control and secure data transfer are the major factors that enhance the efficiency of Service Oriented Wireless Sensor Networks. It is desirable to modify the routing and security schemes adaptively in order to respond effectively to the rapidly changing Network State. Adding more complexities to the routing and security schemes increases the end-to-end delay which is not acceptable in Service Oriented WSNs which are mostly in real time. We propose an algorithm Secure Adaptive Load-Balancing Routing (SALR) protocol, in which the routing decision is taken at every hop considering the unforeseen changes in the network. Multipath selection based on Node Strength is done at every hop to decide the most secure and least congested route. The system predicts the best route rather than running the congestion detection and security schemes repeatedly. Simulation results show that security and latency performance is better than reported protocols. © 2015 IEEE.
  • Item
    PCVOS: Principal component variances based off-line signature verification
    (Institute of Electrical and Electronics Engineers Inc., 2015) Arunalatha, J.S.; Prashanth, C.R.; Tejaswi, V.; Shaila, K.; Raja, K.B.; Anvekar, D.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M.
    Offline signature verification system is widely used as a behavioral biometric for identifying a person. This behavioral biometric trait is a challenge in designing the system that has to counter intrapersonal and interpersonal variations. In this paper, we propose a novel technique PCVOS: Principal Component Variances based Off-line Signature Verification on two critical parameters viz., the Pixel Density (PD) and the Centre of Gravity (CoG) distance. It consists of two parallel processes, namely Signature training which involves extraction of features from the samples of database and Test signature analysis which performs extraction of features from the test samples. The trained values from the database are compared with the features of the test signature using Principal Component Analysis (PCA). The PCVOS algorithm shows a notable improvement over the algorithms in [21], [22] and [23]. © 2015 IEEE.