Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
K.S.K.GUPTA U.SRIKANTH
VISAKHAPATNAM VISAKHAPATNAM
Email:gupta043@gmail.com Email:sri_srikanth4all@yahoo.co.in
4.1E-commerce Applications:
E-commerce developers are exploring the use of
biometrics to more accurately verify a trading party’s
identity.
4.2 Covert Surveillance:
Facial and body recognition biometric techniques come
in to picture automatically to identify known suspects
entering buildings or traversing crowed security areas
Figure1. such as airports.
During enrollment:
Capture the biometrics, which has to be stored in the 5.Types of Biometric security technologies:
database; 5.1 Finger scan:
Process the biometric, extract and enroll the Finger-scan biometrics is base on the distinctive
biometric template; characteristics of the human fingerprint. A fingerprint
Store the template in a local repository, a central image is read from a capture device, features are
repository, or a portable token such as a smart card. extracted from the image, and a template is created.
During access to database: Fingerprints are used in forensic applications: large-
4) Live-scan the biometric feature; scale, one-to-many searches on databases of up to
5) Process the biometric and extract the biometric millions of fingerprints. These searches can be done
template; within only a few hours by using AFIS (Automated
6) Match the scanned biometric against stored Fingerprint Identification Systems). The basic in both
templates; finger scan and finger prints is that the curvatures,
7) Incase of successful verification; provide a deltas, crossovers, pores, loops etc, are of a person are
matching score to business application; captured and stored in the database in digitized for and
8) Record a secure audit trail with respect to system are encrypted in cases of authentication or
use identification .
Glow theData
red light
k) STEP 8: The person is authorized for voting base
Password indicator
l) STEP 9: The corresponding pin is noted as voted
8.2.2 Algorithm 2: spoken
m) STEP 1: A request is sent to the database
querying it to send the password file from the OS
security files.
n) The passwords are received in an encrypted from Speech processing
(DES-data Encryption Standards). circuit.
0) STEP 2: The person is requested to speak his
password.
p) STEP3: the vocal password spoken in the above Operating system
step is converted into textual password by the speech searches for
processing circuit security file
q)STEP-4:This password is compared with
password file from step 1.
IF match is found Textual password
THEN,
ELSE,
Voting is denied
r) STEP5: Exit.
(o)
stop
Figure 4.flowchart-2
9.Conclusion
Multimodal Biometric Voting System