Manvjeet Kaur
PEC University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Manvjeet Kaur.
International Journal of Computer Applications | 2010
Manvjeet Kaur; Sanjeev Sofat; Deepak Saraswat
Security is a very important aspect in the biometric system. There are number attacks and there remedial solutions discussed in the literature on different modules of biometrics system and communication links among them. But still the researchers are not able to secure every module of a biometric system against these attacks. Template and database are the very important parts of biometric systems and attacker mostly attack on template and database of biometric system so securing them is a very crucial issue these days. In this research paper our focus is on template and data base security in biometrics system and we develop a system to encrypt and decrypt the biometric image using helper data of a fingerprint and password to make it secure so that even if someone gains access to the encrypted image stored in the database he will not able to reproduce the original image from it and it will be useless for him.
ieee international conference on engineering and technology | 2016
Ajay Mittal; Kanika Kumar; Sarina Dhamija; Manvjeet Kaur
Driver fatigue is one of the most common reasons for deadly road accidents around the world. Continuous monotonous driving for long hours without rest causes drowsiness and consequently fatal road accidents. Automatic driver drowsiness detection can prevent a vast number of sleep persuaded road accidents, and hence can save precious lives. Number of techniques for driver drowsiness detection has been examined in the recent past. This paper presents a survey of these techniques. These techniques detect the driver drowsiness by observing the driving pattern. Abnormalities in driving pattern is hypothesized as a drowsiness state of driver. Various measures such as subjective, behavioral, physiological, and vehicular have been used for this purpose. The comparative analysis of these techniques indicates that behavioral measures are easy to acquire and does not disturb the driver as they are non-invasive. Among various behavioral measures, head movement measure is found to be most precise and effective.
international conference on recent advances in engineering computational sciences | 2014
Parul Sood; Manvjeet Kaur
Security of cryptographic keys is an important issue in todays unprotected world. Most reliable solution of this problem is state of art fuzzy vault which is an application of bio-cryptosystems. These systems use biometric trait for locking and unlocking the keys. During unlocking, it is necessary to do alignment of query biometric data with enrolled biometric data because of large variation in two samples of a biometric trait of a user taken over the short span of time. Complexity of alignment is increased due to absence of original fingerprint template during alignment. Thats why helper data or additional information is required for alignment. There are number of techniques developed for automatic alignment of fingerprints till now. This paper gives the review of most of those methods.
international conference on recent advances in engineering computational sciences | 2015
Tanvi; Neelam Goel; Manvjeet Kaur
In this paper, a review of soft computing techniques in biometrics is presented. Biometrics has become one of the most promising authentication techniques in the last few years but issues like False Acceptance Rate, False Rejection Rate still prevails in biometrics. An efficient biometric system has higher recognition rate, tolerance for imprecision, uncertainty and noisy data. Recently, Soft Computing has gained wide popularity in biometric recognition where it has helped in improving the recognition rate to a great extent. Various soft computing techniques like fuzzy logic, evolutionary algorithm and artificial neural network has increasingly being used for the construction of efficient biometric systems. This paper first presents the introduction to biometrics along with the issues involved in it. A brief description of various soft computing techniques for feature extraction, fusion, feature optimization, improvement of recognition rate in biometrics is provided. Finally future research areas are presented.
advances in computing and communications | 2015
Deepika Bansal; Sanjeev Sofat; Manvjeet Kaur
Biometric system is a security model which could not be easily cracked or penetrated as compared to the traditional methods like password, ID card to get information. Trait information storage of a particular person in the database makes it vulnerable to template database attack. Fuzzy vault is a popular biometric cryptosystem technique that provides security to the biometric templates. The challenge faced by fuzzy vault is it sans the potential of cancellability and diversity which restricts its implementation in real applications. With great efforts of researchers, some approaches are designed to provide cancellability and diversity in the fuzzy vault. This paper provides insight about such approaches and a proposed technique which verge to satisfy issues regarding template protection scheme. Proposed technique is applied on the fingerprint trait.
Turkish Journal of Electrical Engineering and Computer Sciences | 2018
Manvjeet Kaur; Sanjeev Sofat
Biometric technology is rapidly being adopted in wide variety of security applications. However, the system itself is not completely foolproof and is vulnerable to many attacks. Some of the attacks on the biometric system are very severe, one of which is the attack on template security. In spite of the various template security techniques presented in the literature, none of them is able to provide security, diversity, revocability, and good performance simultaneously to the biometric system. Fuzzy vault is one of the most promising bio-cryptographic techniques to prevent the template data from being misused. To make the fuzzy vault practically realizable in real-life applications especially for large databases, the chaff generation time needs to be reduced to a greater extent. This work focuses on decreasing the chaff generation time to reduce the overall vault creation time. The approach presented in the paper has also been tested on real-time dedicated hardware using fingerprint data acquired in real time by using a fingerprint sensor Verifier 300LC to bridge the gap between the research and real-time application scenarios.
Archive | 2018
Abhay Panwar; Parveen Singla; Manvjeet Kaur
Biometric Systems are the personal identification systems that use behavioral and physiological characteristics of a person. One of the main concerns in biometrics systems is template security. Fuzzy vault, a bio-cryptosystem, is used to provide security to the stored templates. Fuzzy vault has proven to be a very good security technique, nonetheless it lacks in providing revocability and security against correlation attacks. Thus for the enhancement of the security of fuzzy vault and to overcome the limitation of correlation attack, techniques like hybrid model and multimodal biometrics can be used. This paper gives a review of the above mentioned techniques, viz. hybrid and multimodal, and how they can be effective in enhancing the security of the system.
international conference on inventive computation technologies | 2016
Sareena; Ajay Mittal; Manvjeet Kaur
Colorectal cancer is a significant health problem in the world and is one of the major contributors in deaths by cancer. It is a malignant tumor that starts out as more likely to be non-cancerous but as the growth increases on the lining of colon wall it becomes carcinogenic. With regular screening colon cancer can be detected early, when treatment is more effective and CAD scheme with its recent advancements is an effective detection tool for detecting colon polyp cancer. Its mostly non-invasive nature has substantially contributed to improve the quality of treatment. Active research is still being carried out to increase the diagnostic accuracy of CAD scheme as well as reproducibility of mammographic clarification. This survey focuses on studying the techniques used in the computer-aided-diagnosis and analysis of colon polyp cancer. This literature survey presents various methods and the importance of CAD scheme.
2016 Sixth International Symposium on Embedded Computing and System Design (ISED) | 2016
Manvjeet Kaur; Sanjeev Sofat
Biometric Systems have an edge over the traditional security methods as they strengthen the level of security by authenticating only the genuine person. Various security breaches and their remedial solutions for biometric systems are proposed by eminent researchers. Template security is one of the major concerns in the field of Biometric Security. Fuzzy vault is a proven template protection scheme. The basis of the scheme is to bind the biometric information with the secret key and scramble it by adding random data to add more security. However, the scheme is vulnerable to the correlation attack. A successful correlation attack may lead to the recovery of genuine minutiae points in the input fingerprint, which may lead to the recreation of the input finger. The main focus of the current research work is to design a secure Fuzzy Vault scheme to prevent correlation attack. The proposed scheme combines fuzzy vault and hadamard transformation technique, providing the indemnity against correlation attack to an appreciable level.
International Journal of Computer Applications | 2012
Dhriti; Manvjeet Kaur