Type of Material: | Thesis |
Title: | Gradient Boosted Non Rigid Registration for Finger Vein Authentication |
Researcher: | KHARABE SHWETAMBARI RAVINDRA |
Guide: | NALINI, C |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2019 |
Language: | English |
Subject: | Computer Science | Computer Science Theory and Methods | Engineering and Technology | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2019; D14CS542 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454689 | |
003 | IN-AhILN | |
005 | 2024-09-18 14:21:59 | |
008 | __ | 240918t2019||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454689 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aKHARABE SHWETAMBARI RAVINDRA|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein |
245 | __ | |aGradient Boosted Non Rigid Registration for Finger Vein Authentication |
260 | __ | |aChennai|bBharath University, Chennai|c2019 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2019|oD14CS542 |
520 | __ | |aIn the present era of development in electronic world it is reasonably difficult to secure the personal information. Considering the limitation of the uni-modal biometrics authentication the appropriate selection of modality plays important role for authentication. With the advancement and growth of modern society, recognizing identity of humans and protecting their information security is a social key problem, which needs to be addressed in the current era of information technology. Traditionally there are two methods of identifying humans - based on known contents (passwords, secrets codes, etc.) and processing (certificates, credentials, smart cards, keys, etc.). Many abusing methods were practiced in the recent past due to the development of infrastructural equipment, fraud, misuse, cracks and hackings. Individual s passwords are often cracked, misused by others and forgotten which adds further to the complication of traditional methods. Thus, there is an emerging need for better recognition system whic |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aComputer Science |
653 | __ | |aComputer Science Theory and Methods |
653 | __ | |aEngineering and Technology |
700 | __ | |aNALINI, C|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/310743|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.