Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where M. James Stephen is active.

Publication


Featured researches published by M. James Stephen.


International Journal of Computer Applications | 2013

Simple League Championship Algorithm

M. James Stephen; Prasad Reddy P. V. G. D

is a lot of discussion in the literature on the advantages of one soft computing technique over the other. Number of new meta heuristic algorithms are made available for solving different optimization problems. But always there is some ambiguity in deciding which technique is better than the other to solve a specific optimization problem in a particular context. A new methodology has been proposed in this paper which provides some theoretical frame work to use multiple optimization techniques at the same time onto a single optimization problem. This new approach has been implemented to solve image enhancement problem in a fingerprint. First the methodology of this new approach has been described then the application of the proposed methodology is presented with some experimental results.


IOSR Journal of Computer Engineering | 2013

Towards Accurate Estimation of Fingerprint Ridge Orientation Using BPNN and Ternarization

P. V. G. D. Prasad Reddy; M. James Stephen

Accurate estimation of ridge orientation is a crucial step in fingerprint image enhancement because the performance of a minutiae extraction algorithm and matching heavily relies on the quality of the input fingerprint images, which in turn relies on proper estimation of ridge orientation. When ridge structure is not clear in a noisy fingerprint image, ridge orientation estimation becomes tough and it is considered as one of the most challenging tasks in fingerprint image enhancement process. A new methodology based on neural network approach and Ternarization for ridge orientation estimation is proposed in this paper. In the present work a trained Back Propagation Neural Network (BPNN) is used for accurate ridge orientation. The advantage with the Ternarization process is that it eradicates the false ridge orientation for which the neural network wrongly responds with the larger value and at the same time, it keeps the correct ridge orientation blocks intact without making them blur. This helps in qualitative extraction of minutiae points from the fingerprint image. The experimental results have shown that the proposed method for estimating ridge orientation works far better than the traditional gradient based approach.


Archive | 2012

Removal of False Minutiae with Fuzzy Rules from the Extracted Minutiae of Fingerprint Image

M. James Stephen; P. V. G. D. Prasad Reddy; Vadlamani Kartheek; Ch. Suresh; Suresh Chandra Satapathy

Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. Minutiae are the two most prominent and well-accepted classes of fingerprint features arising from local ridge discontinuities: ridge endings and ridge bifurcations. In today’s world minutia matching is most popular and modern technology for fingerprint matching. .If there is enough minutia point in one fingerprint image that are corresponding to other fingerprint image, then it is most likely that both images are from the same finger print. In this paper, we proposed a complete system for minutiae extraction and removing the false minutiae from the extracted ones.


International Journal of Machine Learning and Computing | 2012

Enhancing Fingerprint Image through Ridge Orientation with Neural Network Approach and Ternarization for Effective Minutiae Extraction

M. James Stephen; P. V. G. D. Prasad Reddy

Among the various biometric identifications available, fingerprints authentication is the oldest and the most reliable source of authentication. Identification of fingerprints basically relies on minutiae extraction. In most cases the finger print images that are obtained are of poor quality due to various reasons such as scars, dirt, non-uniform ink intensity and skin diversities. So enhancement of image prior to extraction increases the consistency. In this paper a new methodology was proposed for finger print image enhancement where the process begins with ridge orientation using neural network approach that follows dividing the image into white block, black block and grey block, which is called ternarisation, which is a new methodology to deal with uncertainty of minutiae. Then the image is binarised using the concept of pixel aggregation. And finally thinning is applied before proceeding to effective minutiae extraction.


Archive | 2012

More Secured Text Transmission with Dual Phase Message Morphing Algorithm

M. James Stephen; P. V. G. D. Prasad Reddy; Ch. Demudu Naidu; Sampangi Sonali; Ch. Heymaraju

In this global village, where with the advancements in the field of communications, ensuring security to the data being transmitted has become very vital. These safety and security issues contributed to the outgrowth of secret communication. While encryption simply encodes the data making it difficult for the layman to understand, Steganography deals with hiding data within another data making them unaware of it. Both concepts ensure data security but in different forms. These two approaches when unified provide much better security to the data than that provided by either of encryption or Steganography.


International Journal of Computer Applications | 2012

Deploying Access Control using Extended XACML in Open Web Service Environment

Thirumaran. M; Dhavachelvan. P; Divya. A; Ch. Demudu Naidu; S. Pallam Setty; M. James Stephen; S. K. Prashanth; Ch. Suresh; Smita V. Khangar; Latesh G. Malik; Pukhraj P. Shrishrimal; Ratnadeep R. Deshmukh; Vishal B. Waghmare; S. Asif Hussain; M. N. Giri Prasad; D. Satyanarayana; Jacinth Salome J; R M Suresh; V. N. Ganvir; Atul P. Dwivedi; Vishal Gulati; Kulwant Singh; Puneet Katyal

Now a days web services have a greater role in development of software systems. Generally, web server wants to determine which access can be granted and communicate with requesterfor open web service environment. These systems are designed to be open and web servers does not have determined conditions for communicate to the access requester. Such consideration makes traditional access control not applicable, which depends upon requester identification and authentication. Typically, XACML language is proposed for define the access control policy. It does not support novel features and not suitable in practice. In this paper, we extend the current XACML by providing novel features for controlling access in interoperable and flexible way, and then illustrate how such concepts can be deployed. Also, extend the standard XACML architecture to incorporate the new features for open web service systems


International Journal of Computer Applications | 2013

Fingerprint Image Enhancement through Particle Swarm Optimization

M. James Stephen; P. V. G. D. Prasad Reddy; V. Vasavi


Archive | 2011

Implementation of Easy Fingerprint Image Authentication with Traditional Euclidean and Singular Value Decomposition Algorithms

M. James Stephen


Archive | 2012

Classification Based Image Segmentation Approach

M. James Stephen; D. Siva Phanindra; Anil Neerukonda


International Journal of Computer Applications | 2012

Steganography Detection using Functional Link Artificial Neural Networks

Ch. Demudu Naidu; S. Pallam Setty; M. James Stephen; S. K. Prashanth; Ch. Suresh

Collaboration


Dive into the M. James Stephen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ch. Demudu Naidu

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar

Ch. Suresh

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar

Pukhraj P. Shrishrimal

Dr. Babasaheb Ambedkar Marathwada University

View shared research outputs
Top Co-Authors

Avatar

Ratnadeep R. Deshmukh

Dr. Babasaheb Ambedkar Marathwada University

View shared research outputs
Top Co-Authors

Avatar

Sampangi Sonali

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar

Suresh Chandra Satapathy

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar

Suresh Chittineni

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar

Vadlamani Kartheek

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar

Vishal B. Waghmare

Dr. Babasaheb Ambedkar Marathwada University

View shared research outputs
Researchain Logo
Decentralizing Knowledge