Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of Continue reading
Get Latest Final Year Computer Projects in your Email
Security Projects
Quantum Cryptography
Quantum Cryptography or Quantum Key Distribution (QKD) is a new technique that uses principle of quantum mechanics to generate the shared, secret key between sender and receiver (most commonly known as Alice and Bob). With the help of QKD, it is now possible to construct Continue reading
Secure Mobile Fingerprint Identification System
Recent terrorist attacks in countries such as the United States and Spain expose the degree to which most nations have neglected the value of “human intelligence” in fighting terrorist threats, opting instead to Continue reading
Modeling and Detection of Camouflaging Worm using IP Traceback
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their Continue reading
Image Enhancement and Minutiae Matching in Fingerprint Verification
Fingerprint image enhancement and minutiae matching are two key steps in an automatic fingerprint identification system. In this paper, we develop a fingerprint image enhancement algorithm based on Continue reading
Architecture for Secure SCADA and Distributed Control System(DCS) Networks
Industrial control systems are an integral part of the critical infrastructures of electric, water, oil/gas, chemicals, pipelines, and transportation. The capabilities of networking these systems provide Continue reading
Fingerprint Verification
The use of fingerprints for identification has been employed in law enforcement for about a century. A much broader application of fingerprints is for personal authentication, for instance to Continue reading
Data Leakage Detection – 1
Perturbation is a very useful technique where the data is modified and made ‘less sensitive ́ before being handed to agents. For example, one can add random noise to certain attributes, or one can Continue reading
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the Continue reading
Fingerprint Verification based on Fusion of Minutiae and Ridges using Strength Factors
With the increasing emphasis on the automatic personal identification applications, biometrics especially fingerprint identification is the most reliable and widely accepted Continue reading
Data Leakage Detection – 2
This paper contains the results of implementation of Data Leakage Detection Model. Currently watermarking technology is being used for the data protection. But this technology doesn’t provide the complete security against Continue reading