New Technology Applications: HideApp: http://vimeo.com/47440897 , (Joint Project with IIM Ahmedabad)

Page 7

names, addresses, messages, notes, future plans, pictures, etc., the security of these devices becomes highly essential. The methods for authentication for ensuring security can be categorized into three classes: something you know (alphanumeric password), something you have (tokens) and something you are (biometric property). Unlike the other two, the third cannot be stolen, forgotten or broken. Supporting that nowadays almost all cell phones have embedded camera phones and most of them are above 3.2 mega-pixel in resolution, which facilitates a decent finger recognition with actual error rate of around 4.5%.

Technological Flow (Fingerprint Recognition with Embedded Cameras on Mobile Phones) The flow of processes and information can be clearly seen through the figure below:

Source:“Fingerprint Recognition with Embedded Cameras on Mobile Phones� by Derawi M., Bian Yang B., and Busch C., Norwegian Information Security Laboratory, Gjvik University College.

Data Collection Users enrol themselves to the system and their data is stored in the database. The features are then used for comparison later by the application. These are registered users and the enrolled data will be used for all calculations henceforth.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.