International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 15    Submit Your Rating     Cite This   Download        Certificate

BIOMETRICS IDENTIFICATIONTECHNIQUE FORINTERFERENCE DETECTION SYSTEMS.

    2 Author(s):  AJAY KUMAR PATHAK, DR.UTPAL CHAKRABORTY

Vol -  7, Issue- 12 ,         Page(s) : 205 - 217  (2016 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Identifying an enemy committing fraud is a major fear to all business, schools, colleges, organizations, governments etc. Recently, the most used applications for prevention or detection of enemy committing fraud are interference detection systems. Biometrics technology is simply the measurement and use of the unique characteristics of living humans to distinguish them from one another and it is more useful as compared to passwords and symbols,sign, indication, signal,hint as they can be lost or stolen, so we have to opt the technique biometric authentication. The biometric authentication provides the ability to require more request of authentication in such a quick and easy manner that users are not disturbed by the additional requirements. In this paper, I have prearranged a brief introduction about biometrics. Then I have prearranged the information regarding the interference detection system and finally I have proposed a method which is based on fingerprint recognition which would allow us to detect more efficiently any misuse of the computer system that is running.

  1. A Comparison Based Study on Biometrics for Human Recognition Himanshu Srivastava Department of Computer Science & Engineering Roorkee Institute of Technology, Roorkee (U.K.), India.e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep.- Oct. 2013), PP 22-29 www.iosrjournals.org.
  2. Corresponding author: Monika Saini, University of Delhi, Delhi, India, Tel: 91-8130634711; E-mail: mini.1901@yahoo.com, Rec date: March 04, 2016; Acc date: May 19, 2016; Pub date: May 25, 2016.
  3. Debnath Bhattacharyya, “Biometric Authentication: A Review,” International Journal of u- and e- Service, Science and Technology, vol. 2, no. 3, 2009.
  4. David Maltoni, Anil K. Jain, Handbook of fingerprint recognition, Springer publication (2002).
  5. Himanshu Srivastava, “Personal Identification Using Iris Recognition System, a Review,” International Journal of Engineering Research and Applications (IJERA), vol. 3, no. 3, pp. 449-453, 2013. www.iosrjournals.org.
  6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012 Smita S. Mudholkar 1, Pradnya M. Shende 2, Milind V. Sarode,  Department of Computer Science & Engineering, Amravati University, India.
  7. Jammi Ashok et.al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 07, 2010, 2402-2408 ,An overview of biometrics.
  8. Journal of Forensic Medicine, Biometrics in Forensic Identification: Applications and Challenges.
  9. Jammi Ashok 1 Professor and Head Assistant Professor Associate. Department of IT, GCET, Hyderabad, India.
  10. Monika Saini* and Anup Kumar Kapoor, University of Delhi, Delhi, India.
  11. P.V.G.S.Mudiraj, Associate Professor, MCA Dept., Adams Engg. College, Paloncha, Khammam.
  12. Padma, Manivannan, “Comparative and Analysis of Biometric Systems” International Journal on Computer Science and Engineering (IJCSE,) vol. 3, no. 5, pp2156-2162, 2011.
  13. Simon Liu and Mark Silverman, “A Practical Guide to Biometric Security Technology,” IT Pro 27-32, 2001. 
  14. Vaka Shiva Shankar, Assistant Professor, Department of MCA, KCCS, WarangalVol. 02, No. 07, 2010, 2402-2408.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details