Evaluation of MPI Implementations on Grid-connected Clusters using an Emulated WAN Environment
CCGRID '03 Proceedings of the 3st International Symposium on Cluster Computing and the Grid
Parallel Programming: Techniques and Applications Using Networked Workstations and Parallel Computers (2nd Edition)
Performance Evaluation of Fingerprint Verification Systems
IEEE Transactions on Pattern Analysis and Machine Intelligence
PeerCluster: A Cluster-Based Peer-to-Peer System
IEEE Transactions on Parallel and Distributed Systems
Digital Image Processing: PIKS Scientific Inside
Digital Image Processing: PIKS Scientific Inside
Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
Performance Analysis of High Performance Computing Applications on the Amazon Web Services Cloud
CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science
A tutorial on fingerprint recognition
ASB'03 Proceedings of the 1st international conference on Advanced Studies in Biometrics
Adaptive performance for VVoIP implementation in cloud computing environment
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III
An FFT-based technique for translation, rotation, and scale-invariant image registration
IEEE Transactions on Image Processing
Hi-index | 0.00 |
In this paper, we implement a Parallel Distributed Phase Correlation algorithm for fingerprint verification through Cloud computing services. The algorithm is proposed to be hosted by Cloud Computing Services with Quality of Service (QoS) and Quality of Protection (QoP). We also propose 128-bit encryption for security and privacy of individuals' fingerprints and the Wavelet Scalar Quantization (WSQ) compression method. Fingerprint scanners from various manufactures have different specifications in image capture size, etc. Standards need to be set on the specifications, for image size, for storage, for transmission, for interoperability of various verification algorithms, and protection.