Sharmila More - Academia.edu (original) (raw)
Conference Presentations by Sharmila More
Proceedings of the 13th INDIACom; INDIACom-2019; IEEE Conference ID: 46181 2019 6th International Conference on “Computing for Sustainable Global Development”, 13th - 15th March, 2019 Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA), 2019
Nowadays, in every technology sector, security issues are one of major concerns. For resolving t... more Nowadays, in every technology sector, security
issues are one of major concerns. For resolving these issue
cryptographic features extraction algorithm is frequently used.
The main feature in computer security is the cryptography
techniques . In our work, multimodal biometric images are used
as input and features like shape, size, edge and texture are
extrxacted.This is executed by applying feature extraction
algorithm like Gabor filter. In this paper we are explaining about
multimodal biometrics its role and effect of Gabor Filter on
multimodal biometrics images. We have discussed the
implementation of modified Gabor Filter algorithm by using
MATLAB on parameters such as age and gender. We have also
discussed other parameters like key size, input size, time taken,
simulation, memory requirement, CPU usage, matching
algorithm, time delay, false acceptance rate, false rejection rate.
Papers by Sharmila More
Advances in Biomedical Engineering and Technology, 2020
Cryptography is becoming slowly but surely a more important feature of computer security. In ever... more Cryptography is becoming slowly but surely a more important feature of computer security. In every field of technology, there are major issues of security but these issues overcome by using cryptographic algorithms. Biometric images are used as input and then the features like shape, size, edge, and texture are extracted. This is done by applying feature extraction algorithms and advanced encryption standard algorithm on Fingerprints, Iris, faces, and palm print simultaneously. In this paper, we have explained the information about multimodal biometrics, limitations of the DES algorithm on the encryption process of multimodal biometric images, Solution to these problems, and the role of AES in multimodal. We have discussed the implementation of the AES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Major issues in multimodal biometrics such as matching algorithm, time delay, FAR are also discussed.
International journal of computer sciences and engineering, Aug 31, 2018
Lecture notes in bioengineering, Sep 29, 2020
Cryptography is becoming slowly but surely a more important feature of computer security. In ever... more Cryptography is becoming slowly but surely a more important feature of computer security. In every field of technology, there are major issues of security but these issues overcome by using cryptographic algorithms. Biometric images are used as input and then the features like shape, size, edge, and texture are extracted. This is done by applying feature extraction algorithms and advanced encryption standard algorithm on Fingerprints, Iris, faces, and palm print simultaneously. In this paper, we have explained the information about multimodal biometrics, limitations of the DES algorithm on the encryption process of multimodal biometric images, Solution to these problems, and the role of AES in multimodal. We have discussed the implementation of the AES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Major issues in multimodal biometrics such as matching algorithm, time delay, FAR are also discussed.
International Journal of Computer Sciences and Engineering, 2018
Advances in intelligent systems and computing, Sep 30, 2022
2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 2019
Nowadays, in every technology sector, security issues are one of major concerns. For resolving th... more Nowadays, in every technology sector, security issues are one of major concerns. For resolving these issue cryptographic features extraction algorithm is frequently used. The main feature in computer security is the cryptography techniques. In our work, multimodal biometric images are used as input and features like shape, size, edge and texture are extracted. This is executed by applying feature extraction algorithm like Gabor filter. In this paper we are explaining about multimodal biometrics its role and effect of Gabor Filter on multimodal biometrics images. We have discussed the implementation of modified Gabor Filter algorithm by using MATLAB on parameters such as age and gender. We have also discussed other parameters like key size, input size, time taken, simulation, memory requirement, CPU usage, matching algorithm, time delay, false acceptance rate, false rejection rate.
ICT Analysis and Applications
Biometrics is the term used in computer science and network security for identification, verifica... more Biometrics is the term used in computer science and network security for identification, verification and access control of human by using their behavioural and physiological characteristics. Attendance in educational institutions, industries will require more paper work and time. To reduce this, biometric system is used. Biometric Studies commonly used Fingerprints, Face, Iris , Voice, Signature, Vascular, Retinal, DNA and Hand geometry recognition and verification. Different types of technologies used in biometric system to increase the system performance and then system become secure; simple easy and time saving comparisons are happened. This paper gives information about technologies used in Biometric system.
Cryptography is becoming slowly but surely a more important feature of computer security. In ever... more Cryptography is becoming slowly but surely a more important feature of computer security. In every field of technology, there are major issues of security but these issues overcome by using cryptographic algorithms. Biometric images are used as input and then the features like shape, size, edge, and texture are extracted. This is done by applying feature extraction algorithms and advanced encryption standard algorithm on Fingerprints, Iris, faces, and palm print simultaneously. In this paper, we have explained the information about multimodal biometrics, limitations of the DES algorithm on the encryption process of multimodal biometric images, Solution to these problems, and the role of AES in multimodal. We have discussed the implementation of the AES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Major issues in multimodal biometrics such as matc...
International Journal of Advanced Research in Computer Science and Software Engineering, 2013
Green computing, also called green technology, is the environmentally sustainable to use of compu... more Green computing, also called green technology, is the environmentally sustainable to use of computers and related resources like-monitors, printer, storage devices, networking and communication systems-efficiently and effectively with minimal or no impact on the environment. Green computing whose goals are to reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. Computers today not only used in offices but also at homes. As the number of computers is increasing day by day, so is the amount of electricity consumed by them which in turn is increasing the carbon content in atmosphere. This problem has been realized by people and measures are being taken which help in minimizing the power usage of computers. Therefore , this can be called as Green Computing. We use Green Computing because it-reduced energy usage from green computing techniques translates into lower carbon dioxide emissions, stemming from a reduction in the fossil fuel used in power plants and transportation, Conserving resources means less energy is required to produce, use, and dispose of products ,Saving energy and resources saves money .Green computing even includes changing government policy to encourage recycling and lowering energy use by individuals and businesses.
International Journal of Advanced Research in Computer Science and Software Engineering, 2014
The definition of E-Governance is the use of Information and communication technology to provide ... more The definition of E-Governance is the use of Information and communication technology to provide the improvement in government services , transactions, interaction with citizens, land revenue, business and other parts of government. This paper investigates the applicability and potential use of biometrics for E-Government services. In this paper we also identify the requirements of biometrics in e-governance, recognition techniques and what are the possible attacks on biometric systems. We also provide some solutions to reduce the vulnerabilities in the system. A number of biometric traits have been developed and are used to authenticate the person's identity. A biometric system can be either an 'identification' system or a 'verification' (authentication) system. Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. Here we identify the requirements of biometrics in e-governance and also define how it is applicable and what are the possible attacks on biometric systems
Proceedings of the 13th INDIACom; INDIACom-2019; IEEE Conference ID: 46181 2019 6th International Conference on “Computing for Sustainable Global Development”, 13th - 15th March, 2019 Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA), 2019
Nowadays, in every technology sector, security issues are one of major concerns. For resolving t... more Nowadays, in every technology sector, security
issues are one of major concerns. For resolving these issue
cryptographic features extraction algorithm is frequently used.
The main feature in computer security is the cryptography
techniques . In our work, multimodal biometric images are used
as input and features like shape, size, edge and texture are
extrxacted.This is executed by applying feature extraction
algorithm like Gabor filter. In this paper we are explaining about
multimodal biometrics its role and effect of Gabor Filter on
multimodal biometrics images. We have discussed the
implementation of modified Gabor Filter algorithm by using
MATLAB on parameters such as age and gender. We have also
discussed other parameters like key size, input size, time taken,
simulation, memory requirement, CPU usage, matching
algorithm, time delay, false acceptance rate, false rejection rate.
Advances in Biomedical Engineering and Technology, 2020
Cryptography is becoming slowly but surely a more important feature of computer security. In ever... more Cryptography is becoming slowly but surely a more important feature of computer security. In every field of technology, there are major issues of security but these issues overcome by using cryptographic algorithms. Biometric images are used as input and then the features like shape, size, edge, and texture are extracted. This is done by applying feature extraction algorithms and advanced encryption standard algorithm on Fingerprints, Iris, faces, and palm print simultaneously. In this paper, we have explained the information about multimodal biometrics, limitations of the DES algorithm on the encryption process of multimodal biometric images, Solution to these problems, and the role of AES in multimodal. We have discussed the implementation of the AES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Major issues in multimodal biometrics such as matching algorithm, time delay, FAR are also discussed.
International journal of computer sciences and engineering, Aug 31, 2018
Lecture notes in bioengineering, Sep 29, 2020
Cryptography is becoming slowly but surely a more important feature of computer security. In ever... more Cryptography is becoming slowly but surely a more important feature of computer security. In every field of technology, there are major issues of security but these issues overcome by using cryptographic algorithms. Biometric images are used as input and then the features like shape, size, edge, and texture are extracted. This is done by applying feature extraction algorithms and advanced encryption standard algorithm on Fingerprints, Iris, faces, and palm print simultaneously. In this paper, we have explained the information about multimodal biometrics, limitations of the DES algorithm on the encryption process of multimodal biometric images, Solution to these problems, and the role of AES in multimodal. We have discussed the implementation of the AES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Major issues in multimodal biometrics such as matching algorithm, time delay, FAR are also discussed.
International Journal of Computer Sciences and Engineering, 2018
Advances in intelligent systems and computing, Sep 30, 2022
2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 2019
Nowadays, in every technology sector, security issues are one of major concerns. For resolving th... more Nowadays, in every technology sector, security issues are one of major concerns. For resolving these issue cryptographic features extraction algorithm is frequently used. The main feature in computer security is the cryptography techniques. In our work, multimodal biometric images are used as input and features like shape, size, edge and texture are extracted. This is executed by applying feature extraction algorithm like Gabor filter. In this paper we are explaining about multimodal biometrics its role and effect of Gabor Filter on multimodal biometrics images. We have discussed the implementation of modified Gabor Filter algorithm by using MATLAB on parameters such as age and gender. We have also discussed other parameters like key size, input size, time taken, simulation, memory requirement, CPU usage, matching algorithm, time delay, false acceptance rate, false rejection rate.
ICT Analysis and Applications
Biometrics is the term used in computer science and network security for identification, verifica... more Biometrics is the term used in computer science and network security for identification, verification and access control of human by using their behavioural and physiological characteristics. Attendance in educational institutions, industries will require more paper work and time. To reduce this, biometric system is used. Biometric Studies commonly used Fingerprints, Face, Iris , Voice, Signature, Vascular, Retinal, DNA and Hand geometry recognition and verification. Different types of technologies used in biometric system to increase the system performance and then system become secure; simple easy and time saving comparisons are happened. This paper gives information about technologies used in Biometric system.
Cryptography is becoming slowly but surely a more important feature of computer security. In ever... more Cryptography is becoming slowly but surely a more important feature of computer security. In every field of technology, there are major issues of security but these issues overcome by using cryptographic algorithms. Biometric images are used as input and then the features like shape, size, edge, and texture are extracted. This is done by applying feature extraction algorithms and advanced encryption standard algorithm on Fingerprints, Iris, faces, and palm print simultaneously. In this paper, we have explained the information about multimodal biometrics, limitations of the DES algorithm on the encryption process of multimodal biometric images, Solution to these problems, and the role of AES in multimodal. We have discussed the implementation of the AES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Major issues in multimodal biometrics such as matc...
International Journal of Advanced Research in Computer Science and Software Engineering, 2013
Green computing, also called green technology, is the environmentally sustainable to use of compu... more Green computing, also called green technology, is the environmentally sustainable to use of computers and related resources like-monitors, printer, storage devices, networking and communication systems-efficiently and effectively with minimal or no impact on the environment. Green computing whose goals are to reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. Computers today not only used in offices but also at homes. As the number of computers is increasing day by day, so is the amount of electricity consumed by them which in turn is increasing the carbon content in atmosphere. This problem has been realized by people and measures are being taken which help in minimizing the power usage of computers. Therefore , this can be called as Green Computing. We use Green Computing because it-reduced energy usage from green computing techniques translates into lower carbon dioxide emissions, stemming from a reduction in the fossil fuel used in power plants and transportation, Conserving resources means less energy is required to produce, use, and dispose of products ,Saving energy and resources saves money .Green computing even includes changing government policy to encourage recycling and lowering energy use by individuals and businesses.
International Journal of Advanced Research in Computer Science and Software Engineering, 2014
The definition of E-Governance is the use of Information and communication technology to provide ... more The definition of E-Governance is the use of Information and communication technology to provide the improvement in government services , transactions, interaction with citizens, land revenue, business and other parts of government. This paper investigates the applicability and potential use of biometrics for E-Government services. In this paper we also identify the requirements of biometrics in e-governance, recognition techniques and what are the possible attacks on biometric systems. We also provide some solutions to reduce the vulnerabilities in the system. A number of biometric traits have been developed and are used to authenticate the person's identity. A biometric system can be either an 'identification' system or a 'verification' (authentication) system. Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. Here we identify the requirements of biometrics in e-governance and also define how it is applicable and what are the possible attacks on biometric systems