Year : 2018
Text Summarization
Cite this Research Publication : N. Lalithamani, “Text Summarization”, Journal of Advanced Research in Dynamical and Control Systems, vol. 10, no. 3, pp. 1368-1372, 2018.
Publisher : Journal of Advanced Research in Dynamical and Control Systems
Year : 2017
Survey on Non-obstructive and Continuous user Authentication on Mobile Devices
Cite this Research Publication : N. Lalithamani, “Survey on Non-obstructive and Continuous user Authentication on Mobile Devices”, Pakistan Journal of Biotechnology, vol. 14, no. 2, pp. 318-322, 2017.
Publisher : Pakistan Journal of Biotechnology
Year : 2017
A Survey for Securing Online Payment Transaction using Biometrics Authentication
Cite this Research Publication : H. M. Priya and N. Lalithamani, “A Survey for Securing Online Payment Transaction using Biometrics Authentication”, Advances in Intelligent Systems and Computing, vol. 517, pp. 81-91, 2017.
Publisher : Advances in Intelligent Systems and Computing
Year : 2017
Palm Print and Palm Vein Biometric Authentication System
Cite this Research Publication : A. J. Siddharth, Prabha, A. P. Hari, Srinivasan, T. J., and N. Lalithamani, “Palm Print and Palm Vein Biometric Authentication System”, Advances in Intelligent Systems and Computing, vol. 517, pp. 539-545, 2017.
Publisher : Advances in Intelligent Systems and Computing
Year : 2017
Optimal NN Based Multimodal Biometric Authentication Using Palm and Finger Knuckle Images
Cite this Research Publication : N. Lalithamani, “Optimal NN Based Multimodal Biometric Authentication Using Palm and Finger Knuckle Images”, International Journal of Pure and Applied Mathematics, vol. 117, no. 10, pp. 37-41, 2017.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2017
Finger Knuckle Biometric Authentication using Convolution Neural Network
Cite this Research Publication : N. Lalithamani, “Finger Knuckle Biometric Authentication using Convolution Neural Network”, International Journal of Pure and Applied Mathematics, vol. 117, no. 10, pp. 31-35, 2017.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2016
Simulation of multimodal biometrics with cryptosystem in hospital suites
Cite this Research Publication : N. Lalithamani and B, S., “Simulation of multimodal biometrics with cryptosystem in hospital suites”, Pakistan Journal of Biotechnology, vol. 13, no. 2, pp. pp.138-142, 2016.
Publisher : Pakistan Journal of Biotechnology.
Year : 2016
Countermeasures for indirect attack for iris based biometric authentication
Cite this Research Publication : N. Lalithamani and R, S., “Countermeasures for indirect attack for iris based biometric authentication”, Indian Journal of Science and Technology , 2016.
Publisher : Indian Journal of Science and Technology
Year : 2016
Automatic scraper of celebrity images from heterogeneous websites based on face recognition and sorting for profiling
Cite this Research Publication : S. K and N. Lalithamani, “Automatic scraper of celebrity images from heterogeneous websites based on face recognition and sorting for profiling”, International Journal of control theory and applications, vol. 9, no. 2, pp. 1409-1420, 2016.
Publisher : International Journal of control theory and applications.
Year : 2015
A Survey process of attacks on iris based recognition for biometric authentication
Cite this Research Publication : N. Lalithamani and R, S., “A Survey process of attacks on iris based recognition for biometric authentication”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. pp.1466-1470, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem
Cite this Research Publication : N. Lalithamani and M, S., “Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem”, Imaging Science Journal , vol. 63, no. 2, pp. pp.111-118, 2015.
Publisher : Imaging Science Journal
Year : 2015
Microbots in Biofield: A Cancer Warrior
Cite this Research Publication : R. G., T, R., and N. Lalithamani, “Microbots in Biofield: A Cancer Warrior”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. pp.4236-4239, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2015
A hybrid model for ranking uncertain distributed database”, International Journal of Applied Engineering Research
Cite this Research Publication : N. Lalithamani, S, S., and PA, D., “A hybrid model for ranking uncertain distributed database”, International Journal of Applied Engineering Research”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. pp.1424-1428, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Face Recognition and Tracking on Video Streams
Cite this Research Publication : N. Lalithamani, Arunprasad, P., Gowthamraj, R., and Guruprasath, A., “Face Recognition and Tracking on Video Streams”, International Journal of Applied Engineering Research, vol. 10, no. 45, pp. 31860-31863, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Dual encryption algorithm to improve security in hand vein and palm vein-based biometric recognition
Cite this Research Publication : N. Lalithamani and M, S., “Dual encryption algorithm to improve security in hand vein and palm vein-based biometric recognition”, Journal of medical imaging and health informatics, vol. 5, no. 3, pp. pp.545-551, 2015.
Publisher : Journal of medical imaging and health informatics
Year : 2014
Technique to Generate Face and Palm Vein-Based Fuzzy Vault for Multi-Biometric Cryptosystem
Cite this Research Publication : N. Lalithamani and M., S., “Technique to Generate Face and Palm Vein-Based Fuzzy Vault for Multi-Biometric Cryptosystem”, Machine Graphics Vision Journal, vol. 23, pp. 97-114, 2014.
Publisher : Machine Graphics Vision Journal
Year : 2009
An Effective Scheme for Generating Irrevocable Cryptographic Key from Cancelable Fingerprint Templates
Cite this Research Publication : N. Lalithamani and Dr. Soman K. P., “An Effective Scheme for Generating Irrevocable Cryptographic Key from Cancelable Fingerprint Templates”, Int. J. Comput. Sci. Netw. Secur, vol. 9, no. 3, pp. 183-193, 2009.
Publisher : Int. J. Comput. Sci. Netw. Secur
Year : 2009
Irrevocable cryptographic key generation from cancelable fingerprint templates: An enhanced and effective scheme
Cite this Research Publication : N. Lalithamani and Dr. Soman K. P., “Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme”, European Journal of Scientific Research, 2009.
Publisher : European Journal of Scientific Research