Biometric Cc Cam for Identifying a Particular Object or Person Initially

نویسندگان

  • T. V. M. Sairam
  • D. Sreenivasulu
چکیده

Biometrics is not novel to everyone. But we are eager to follow the features provided by biometrics for our security in offices and in any other security required areas. But we are not bothering about the nation security. Today the biometric cc cam is not completely available for our nation security. So we tried to propose a new concept in biometric cc cams to protect our nation. Biometric cc cam is used to trace capture all the pottages and they are stored in the database of control room. If any attacks occurred they will search for proofs at that stage. But we are proposing cc cam with an inbuilt chip which consists of the pottages of most wanted persons and it have the capability of ringing an alarm when any one of those persons whose information is pre stored with a chip. This alarm alerts whole area and also the control room. With this camera we can easily trace the terrorists and any wanted persons. These cams also have the capability of storing large amount pottages per second. If any squad want proves they will approach these cams pottages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Human Identification by Ear Biometric System

Ear biometric for identification of human is quite complex task. It’s use either uni-modal or multi-modal approach in order to authenticate a person. A uni-modal biometric system involves a single source of biometric to identify a person. This paper is based on uni-modal approach with ear as a biometric trait for recognizing a person. In this paper, an experimental approach is used for identify...

متن کامل

Analysis of various Biometric Techniques

Biometrics is automated methods for identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic has the capability to reliably distinguish between an authorized person and an imposter. Since biometric characteristics are distinctive, can not be forgotten or lost, and the person to be authenticated needs to be physically present at the point o...

متن کامل

Identification versus Verification

This appendix expands on information presented in Chapter Two. It begins with a definition of biometrics and related terms, and then describes the steps in the biometric authentication process, reviews issues of template management and storage, and addresses testing issues. The appendix concludes with a brief review of mainstream biometric applications. 1 DEFINITIONS A biometric is any measurab...

متن کامل

Evaluation of Periocular over Face Biometric: A Case Study

Recognition of a person through his face is the primitive mean of human identification. Identifying a person through face biometric have grown its importance through the last decade and researchers have attempted to find unique facial feature-points. Facial data also contains change with expression and age, which makes recognition through face difficult. And there has developed a stringent nece...

متن کامل

Secure Iris Authentication Using Visual Cryptography

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013