Computer - Sciene

Fingerprint Recognition by Using Pores Extraction

Fingerprints are the oldest and most broadly used form of biometric identification. Everyone is known to have unique, immutable fingerprints.Fingerprint identification and recognition are considered popular technique in many security and law enforcement applications. Many systems rely on the matching of fingerprints using various methods and algorithms based on find position and orientation of ridge endings and bifurcations within the fingerprint image in both levels (level 2 and level 3).

English

Share Audio Cryptography Using DCT Transform

An Effective and secure protection of sensitive information is the primary concern in communication systems or network storage systems, it is important for any information process to ensure data is not being tampered. To achieve confidentiality and integrity of multimedia information, various Secret Sharing Schemes (SSS) have been developed.This thesis presents a (2,n) threshold Secret Sharing Scheme, which is one of the types of SSS and a special  kind of  (k, n) threshold scheme.

English

Personal Assistant Email Agent

Email is one of the most useful communication tools over the Internet; Email can be an effective knowledge management tool which conveniently enables fast and accurate communication. On the other side, the increasing volume of email threatens to cause a state of “email overload” at which the volume of messages exceeds individuals’ capacity to process them. The recent phenomena of email-overloading in daily life and business have created new problems to users.

English