FACE IDENTIFICATION USING WAVELET TRANSFORM & PCA
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): DINESH SHARMA , NAINA GOEL , PURNIMA K SHARMA , JASLEEN KAUR
Abstract: Face recognition has recently attracted increasing attention and is beginning to be applied in a variety of domains, predominantly for security. In the past few decades’ people used to create some passwords, key words or some other security measures to prevent maltransactions. But now a days with the advanced technology it is better to know the persons physical identity by recognizing some physical features. Because of the problem with traditional password/PIN system, biometric based technologies gained advantage. Face recognition is one of the biometric based technologies which use human faces for authentification. We use wavelet transform for the decomposition of images. Principal Component Analysis is used for the actual recognition. We considered Eigen faces as principal components Face images are projected onto a feature space (“face space”) that best encodes the variation among known face images. This approach transforms face images into a small set of characteristic feature imag
- Publication Date: 24-Feb-2013
- DOI: 10.15224/978-981-07-5461-7-23
- Views: 0
- Downloads: 0
DETECTION OF IP ADDRESS SPACE EXHAUSTION ATTACK TO ADDRESS ALLOCATION SCHEMES IN MANET
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): MOHIT SATI , KINNARI VAISHNAV
Abstract: Mobile Adhoc Network (MANET) is a network without any infrastructure and no central authority. Absence of central authority makes MANET more vulnerable to various security attacks. MANET uses one of the address allocation schemes for configuration of new node. Address allocation schemes have several threats e.g. Address space exhaustion attack, IP spoofing, Address conflict threat, Address spoofing threat, etc. This paper suggests a novel approach that uses routing table based solution to detect address space exhaustion attack. Our solution uses three fields of routing table: destination address, hop count, hop limit. An ensuring mechanism is suggested in this paper to ensure detection of address space exhaustion in the network.
- Publication Date: 24-Feb-2013
- DOI: 10.15224/978-981-07-5461-7-24
- Views: 0
- Downloads: 0