Work place: Department of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India
E-mail: srinivasan_gasc@yahoo.com
Website:
Research Interests: Computer Architecture and Organization, Computer Networks, Information Security, Network Security, Information-Theoretic Security
Biography
Dr. B. SRINIVASAN M.C.A., M.Phil., M.B.A., Ph.D., Associate Professor, PG & Research Department of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India. He received his Ph.D. Degree in Computer Science from Vinayaka Missions University in 11.11.2010. He has author or co-authored more than 45 international journal article publications. He has authored or co-authored more than 75 technical papers and conference presentations. He is a reviewer for several scientific e-journals. His research interests include automated biometrics, computer networking, Internet security, and performance evaluation.
By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijigsp.2014.03.08, Pub. Date: 8 Feb. 2014
Biometrics identification methods have proved to be very efficient, more natural and easy for users than traditional methods of human identification. Biometrics methods truly identify humans, not keys and cards they posses or passwords they should remember. Ear on the other hand, has a more uniform distribution of color, so almost all information is conserved when converting the original image into gray scales. We propose the ear as a biometric and investigate it with both 2D and 3D data. The ICP-based algorithm also demonstrates good scalability with size of dataset. These results are encouraging in that they suggest a strong potential for 3D ear shape as a biometric. Multi-biometric 2D and 3D ear recognition are also explored. The proposed automatic ear detection method will integrate with the current system, and the performance will be evaluated with the original one. The investigation of ear recognition under less controlled conditions will focus on the robustness and variability of ear biometrics. Multi-modal biometrics using 3D ear images will be explored, and the performance will be compared to existing biometrics experimental results.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijieeb.2013.05.02, Pub. Date: 8 Nov. 2013
Transportation industry in general and maritime transportation industry in particular are not exception in this regard. Customers, partners, agents, collaborators, shippers, port operators, suppliers and service agencies are involved in the ship transport industry supply chain, and one of the major requirements in such a supply chain in which all concerned parties are scattered all over the world, is the high speed transferring of data between them. In maritime transportation procurement process plays an essential role. In this study based on the literature review, seven most frequently mentioned factors found. These performance factors were: Cost, visibility of supply chain, cycle time, procurement control, inventory management and purchasing errors which were influenced by implementing E-Procurement. An attempt has been made in this research to find the performance effect of e-procurement implementation in ship management companies.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijitcs.2013.12.11, Pub. Date: 8 Nov. 2013
Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage the palm prints and the palm print database module is designed to store their palm prints and the person details in the database. The feature extraction module is proposed to extract the ordinal measurements for the palm prints. The verification module is designed to verify the palm print with the personal identification record. The recognition module is proposed to find out the relevant person associated with the palm print image. The proposed palm print recognition scheme uses the intensity and brightness to measure the ordinal measurement. The ordinal measures are estimated for the 4 x 4 regions of the palm print images.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijcnis.2013.12.10, Pub. Date: 8 Oct. 2013
The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The electronic passport is the privacy and security risks that arise by embedding with biometric technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijisa.2013.10.10, Pub. Date: 8 Sep. 2013
Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijieeb.2013.02.06, Pub. Date: 8 Aug. 2013
Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijigsp.2013.05.08, Pub. Date: 28 Apr. 2013
The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris recognition uses iris patterns for personnel identification. The system steps are capturing iris patterns; determining the location of iris boundaries; converting the iris boundary to the stretched polar coordinate system; extracting iris code based on texture analysis. The system has been implemented and tested using dataset of number of samples of iris data with different contrast quality. The developed algorithm performs satisfactorily on the images, provides 93% accuracy. Experimental results show that the proposed method has an encouraging performance.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijcnis.2013.05.04, Pub. Date: 8 Apr. 2013
Biometric passports issued nowadays have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris. The electronic passport is the privacy and security risks that arise by embedding RFID technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijisa.2013.05.10, Pub. Date: 8 Apr. 2013
Robust tracking of persons in real-world environments and in real-time is a common goal in many video applications. In this paper a computational system for the real-time tracking of multiple persons in natural environments is presented. Face detection has diverse applications especially as an identification solution which can meet the crying needs in security areas. The region extractor is based on the integration of skin-color, motion and silhouette features, while the face detector uses a simple, rule-based face detection algorithm and SVM. Exemplary results of the integrated system working in real-world video sequences. New intelligent processing methods, as well as security requirements make multiple-person tracking a hot area. This application is robust tracking in real-world environments and in real-time.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijcnis.2013.02.06, Pub. Date: 8 Feb. 2013
Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting services than conventional paper-based voting methods. A receipt-free e-voting scheme based on the virtual voting booth that can be implemented with a smart card. Receipt-freeness is achieved by distributing the voting procedure between the voter and the smart card. By using smart cards to randomize part of content of the ballot, the voter cannot construct a receipt. The voter and the smart card jointly contribute randomness for the encryption of the ballot. To provide convenience to voters, sufficient voting facilities are supplied in sufficient public voting booths.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijitcs.2013.03.10, Pub. Date: 8 Feb. 2013
Electronic passports (e-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper consider only those passport scenarios whose passport protocols base on public-key cryptography, certificates, and a public key infrastructure without addressing the protocols itself detailed, but this is no strong constraint. Furthermore assume the potential passport applier to use ordinary PCs with Windows or Linux software and an arbitrary connection to the Internet. Technological securities issues are to be found in several dimension, but below paper focus on hardware, software, and infrastructure as some of the most critical issues.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijcnis.2012.08.07, Pub. Date: 8 Aug. 2012
The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The deployment of biometric technologies, countries need to test and evaluate its systems since the International Civil Aviation Organization (ICAO) provides the guidelines, but the implementation is up to each issuing country. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijigsp.2012.08.06, Pub. Date: 8 Aug. 2012
Biometrics is measurable characteristics specific to an individual. Face detection has diverse applications especially as an identification solution which can meet the crying needs in security areas. While traditionally 2D images of faces have been used, 3D scans that contain both 3D data and registered color are becoming easier to acquire. Before 3D face images can be used to identify an individual, they require some form of initial alignment information, typically based on facial feature locations. We follow this by a discussion of the algorithms performance when constrained to frontal images and an analysis of its performance on a more complex dataset with significant head pose variation using 3D face data for detection provides a promising route to improved performance.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijitcs.2012.02.06, Pub. Date: 8 Mar. 2012
Biometrics is physical or behavior characteristics that can be used for human identification. We propose the ear as a biometric and investigate it with both 2D and 3D data. The ICP-based algorithm also demonstrates good scalability with size of dataset. These results are encouraging in that they suggest a strong potential for 3D ear shape as a biometric. Multi-biometric 2D and 3D ear recognition are also explored. The proposed automatic ear detection method will integrate with the current system, and the performance will be evaluated with the original one. The investigation of ear recognition under less controlled conditions will focus on the robustness and variability of ear biometrics. Multi-modal biometrics using 3D ear images will be explored, and the performance will be compared to existing biometrics experimental results.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijcnis.2012.02.08, Pub. Date: 8 Mar. 2012
Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure, biometric and Radio Frequency Identification to support various cryptographic, as this is considered the basic tools to prove the authenticity and integrity of the Machine Readable Travel Documents. The large-scale worldwide PKI is construction, by means of bilateral trust relationships between Countries. Investigate the good practices, which are essential for the establishment of a global identification scheme based on e-passports. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan P.NARENDRAN
DOI: https://doi.org/10.5815/ijieeb.2012.01.03, Pub. Date: 8 Feb. 2012
Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
[...] Read more.By V.K. Narendira Kumar B. Srinivasan
DOI: https://doi.org/10.5815/ijmecs.2012.01.06, Pub. Date: 8 Jan. 2012
Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called,represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics face and fingerprints. The privacy and security implications of this impending worldwide experiment in biometrics face and fingerprints authentication technology. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and face and fingerprint biometric passport using ASP.Net.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals