Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009108
K. Rahman, Maria Moosa Munnee, Shahriar Khan
Blackouts are among the last remaining major challenges in power systems. In this paper, publicly available data have been compiled into a dataset of large-scale blackouts that happened from 1965 to 2015. A formula has been devised to filter the largest blackouts by equally weighting the number of people affected and the total restoration. Analysis is then performed on the selected data points in order to find trends and patterns. This paper also explores the different causes that trigger initial disturbances in the power system; some of which eventually leads to a cascading effect and cause widespread power failures. Finally, region-wise risk analysis of different causes of large-scale blackouts as well as fault analysis have been performed
{"title":"Largest blackouts around the world: Trends and data analyses","authors":"K. Rahman, Maria Moosa Munnee, Shahriar Khan","doi":"10.1109/WIECON-ECE.2016.8009108","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009108","url":null,"abstract":"Blackouts are among the last remaining major challenges in power systems. In this paper, publicly available data have been compiled into a dataset of large-scale blackouts that happened from 1965 to 2015. A formula has been devised to filter the largest blackouts by equally weighting the number of people affected and the total restoration. Analysis is then performed on the selected data points in order to find trends and patterns. This paper also explores the different causes that trigger initial disturbances in the power system; some of which eventually leads to a cascading effect and cause widespread power failures. Finally, region-wise risk analysis of different causes of large-scale blackouts as well as fault analysis have been performed","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009133
Ranjana S. Zinjore, R. Ramteke
This paper presents a methodology for recognition of handwritten Marathi and English Characters-Numerals using shape context descriptor. During pre-processing an algorithm is developed to extract the Marathi and English Characters-Numerals form grid formatted datasheets. The corresponding sample points around the boundary of a character are computed. This is followed by obtaining the centroid of the input image. Finally shape context is computed and shape context cost is used to minimize the matching distance between training images and test images. We have designed a graphical user interface for recognition of Characters-Numerals and obtained recognition accuracy in a range of 83% to 95%.
{"title":"Recognition of handwritten bilingual Characters-Numerals using shape context","authors":"Ranjana S. Zinjore, R. Ramteke","doi":"10.1109/WIECON-ECE.2016.8009133","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009133","url":null,"abstract":"This paper presents a methodology for recognition of handwritten Marathi and English Characters-Numerals using shape context descriptor. During pre-processing an algorithm is developed to extract the Marathi and English Characters-Numerals form grid formatted datasheets. The corresponding sample points around the boundary of a character are computed. This is followed by obtaining the centroid of the input image. Finally shape context is computed and shape context cost is used to minimize the matching distance between training images and test images. We have designed a graphical user interface for recognition of Characters-Numerals and obtained recognition accuracy in a range of 83% to 95%.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009125
C. Shahnaz, A. T. Minhaz
In this paper, we have proposed an apnea frame detection method based on the Empirical Mode Decomposition(EMD) of wavelet reconstructed delta wave of EEG signal. The method begins with wavelet transforming an EEG frame and reconstructing the low frequency delta wave from the approximate coefficients. EMD is carried on the reconstructed delta wave to generate intrinsic mode functions(IMF). Mean rate of variation and variance in the first five IMFs of the reconstructed delta wave are extracted as features from each frame. Finally SVM classifier is used to test the performance of the proposed method. From MIT-BIH sleep apnea database, the proposed method is tested with 13 overnight polysomnographic (PSG) records. The proposed method is applied on each patient and overall patients. We found accuracy, sensitivity and specificity rate of 80.43%, 85.59% and 77.87% respectively on overall patients. In conclusion, our proposed method is an efficient method for detecting apnea and non-apnea frames when only EEG signal is available and can be a great tool for PSG Sleep Apnea diagnosis.
{"title":"Sleep Apnea frame detection based on Empirical Mode Decomposition of delta wave extracted from wavelet of EEG signals","authors":"C. Shahnaz, A. T. Minhaz","doi":"10.1109/WIECON-ECE.2016.8009125","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009125","url":null,"abstract":"In this paper, we have proposed an apnea frame detection method based on the Empirical Mode Decomposition(EMD) of wavelet reconstructed delta wave of EEG signal. The method begins with wavelet transforming an EEG frame and reconstructing the low frequency delta wave from the approximate coefficients. EMD is carried on the reconstructed delta wave to generate intrinsic mode functions(IMF). Mean rate of variation and variance in the first five IMFs of the reconstructed delta wave are extracted as features from each frame. Finally SVM classifier is used to test the performance of the proposed method. From MIT-BIH sleep apnea database, the proposed method is tested with 13 overnight polysomnographic (PSG) records. The proposed method is applied on each patient and overall patients. We found accuracy, sensitivity and specificity rate of 80.43%, 85.59% and 77.87% respectively on overall patients. In conclusion, our proposed method is an efficient method for detecting apnea and non-apnea frames when only EEG signal is available and can be a great tool for PSG Sleep Apnea diagnosis.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132886054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009119
S. Kunte, M. Bhawalkar, N. Gopalakrishnan, Y. Nerkar, G. Vaidya
Due to recent developments in the area of power electronics, use of special machines like permanent magnet machines, doubly fed induction machines has been increased in variable speed applications. Brushless doubly fed reluctance machine (BDFRM) is another interesting machine which can prove its suitability for variable speed applications due to numerous advantages over other machines. BDFRM can be designed for different pole configurations as well as rotor configurations. In this paper three different pole configurations of BDFRM with salient pole rotor are designed using FEM Software Ansys Maxwell and compared using FEM based simulations. The simulation study shows that 4-8-6 configuration shows fairly promising results for variable speed conditions.
{"title":"Selection of suitable pole configuration of BDFRM for variable speed applications","authors":"S. Kunte, M. Bhawalkar, N. Gopalakrishnan, Y. Nerkar, G. Vaidya","doi":"10.1109/WIECON-ECE.2016.8009119","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009119","url":null,"abstract":"Due to recent developments in the area of power electronics, use of special machines like permanent magnet machines, doubly fed induction machines has been increased in variable speed applications. Brushless doubly fed reluctance machine (BDFRM) is another interesting machine which can prove its suitability for variable speed applications due to numerous advantages over other machines. BDFRM can be designed for different pole configurations as well as rotor configurations. In this paper three different pole configurations of BDFRM with salient pole rotor are designed using FEM Software Ansys Maxwell and compared using FEM based simulations. The simulation study shows that 4-8-6 configuration shows fairly promising results for variable speed conditions.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133152056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009111
Gyanappa A. Walikar, R. Biradar, G. D
In this paper, we propose topology based adaptive hybrid multicast routing (THMR) mechanism in mobile ad hoc networks. With the help of technique derived from Computational Intelligence (CI) discipline, Topology Change Rate (TCR) is predicted based on link behavior and node mobility for both proactive and reactive routing region in MANETs. We design a Reinforcement Learning (LR) based Q-Learning (QL) algorithm to tune the routing period (RP) in accordance with topology change rate. Simulation evaluation for Packet Delivery Ratio (PDR), and control overhead has been performed in NS-2. We observe that THMR outperforms other standard protocols for performance parameters like Packet Delivery Ratio, and Control overhead.
{"title":"Topology based adaptive hybrid multicast routing in mobile ad hoc networks","authors":"Gyanappa A. Walikar, R. Biradar, G. D","doi":"10.1109/WIECON-ECE.2016.8009111","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009111","url":null,"abstract":"In this paper, we propose topology based adaptive hybrid multicast routing (THMR) mechanism in mobile ad hoc networks. With the help of technique derived from Computational Intelligence (CI) discipline, Topology Change Rate (TCR) is predicted based on link behavior and node mobility for both proactive and reactive routing region in MANETs. We design a Reinforcement Learning (LR) based Q-Learning (QL) algorithm to tune the routing period (RP) in accordance with topology change rate. Simulation evaluation for Packet Delivery Ratio (PDR), and control overhead has been performed in NS-2. We observe that THMR outperforms other standard protocols for performance parameters like Packet Delivery Ratio, and Control overhead.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121859142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009113
R. P., S. Menon
The paper deals with design and analysis of a Substrate Integrated Waveguide (SIW) based antenna by providing an Array of Circular Cavity. The cavity is allowed to radiate by providing Half-Ring Shaped Slots on the surface. Based on the analysis, a Peak Gain of 10.5dBi is obtained at a frequency of 19.6GHz for a 4 element array.
{"title":"High gain Substrate Integrated Waveguide based slot antenna using Circular Cavity Array","authors":"R. P., S. Menon","doi":"10.1109/WIECON-ECE.2016.8009113","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009113","url":null,"abstract":"The paper deals with design and analysis of a Substrate Integrated Waveguide (SIW) based antenna by providing an Array of Circular Cavity. The cavity is allowed to radiate by providing Half-Ring Shaped Slots on the surface. Based on the analysis, a Peak Gain of 10.5dBi is obtained at a frequency of 19.6GHz for a 4 element array.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121331642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009124
N. Sharmin, M. S. Alam, Shafika Showkat Moni
In multi-hop Wireless Sensor Network (WSN), nodes closer to Base Station (BS) need to relay traffic from other nodes of the network which makes their energy depleted very fast and causes an energy hole in the network. Moreover, energy consumption among nodes is not balanced due to non-uniform distribution of nodes and it causes some node to drain out their energy faster than other nodes in the network. In WSN, this energy hole problem plays a key factor to reduce the lifetime of the network as data cannot be sent from other sensor nodes to the BS although the residual energy in the network remains high. In this paper, we propose a new scheme WEMER, based on WEdge MERging, to reduce energy holes in the network. In WEMER, the whole network is divided into many small equiangular wedges. When the residual energy of all the nodes within a wedge becomes less than 40% of their initial energy, thereby increasing the probability of energy holes creation, this wedge merges with the neighboring wedge to thwart the energy holes formation. Simulation results show that our proposed scheme balances the energy consumption among nodes and achieves much longer lifetime than the existing scheme like PEGASIS and CCS.
{"title":"WEMER: An energy hole mitigation scheme in Wireless Sensor Networks","authors":"N. Sharmin, M. S. Alam, Shafika Showkat Moni","doi":"10.1109/WIECON-ECE.2016.8009124","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009124","url":null,"abstract":"In multi-hop Wireless Sensor Network (WSN), nodes closer to Base Station (BS) need to relay traffic from other nodes of the network which makes their energy depleted very fast and causes an energy hole in the network. Moreover, energy consumption among nodes is not balanced due to non-uniform distribution of nodes and it causes some node to drain out their energy faster than other nodes in the network. In WSN, this energy hole problem plays a key factor to reduce the lifetime of the network as data cannot be sent from other sensor nodes to the BS although the residual energy in the network remains high. In this paper, we propose a new scheme WEMER, based on WEdge MERging, to reduce energy holes in the network. In WEMER, the whole network is divided into many small equiangular wedges. When the residual energy of all the nodes within a wedge becomes less than 40% of their initial energy, thereby increasing the probability of energy holes creation, this wedge merges with the neighboring wedge to thwart the energy holes formation. Simulation results show that our proposed scheme balances the energy consumption among nodes and achieves much longer lifetime than the existing scheme like PEGASIS and CCS.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009086
Nandawadekar Ajit Dattu, G. Deepthi, Gawade Santosh Pundlik
An induction or asynchronous motor is an AC electric motor in which the electric current in the rotor is needed to produce torque is induced by electromagnetic induction from the magnetic field of the stator winding. The induction machine is used in a wide variety of applications as a means of converting electric power to mechanical work. It is without doubt the workhorse of the electric power industry. As we know that induction motor is nothing but generalized rotating transformer. This same concept can be used to implement the motor as welding transformer. Welding transformer required low voltage and high current for joining of two metal parts by electrical arc welding. So some modification can be done in the stator winding of induction motor which may cause induction motor act as welding transformer. Also the same motor can be implemented for operating on the single phase as well as three phase supply. The running and starting winding of the single phase operation are placed in the same slots that are used for the three phase operation. So at a time anyone of them can be used to supply or produce excitation in order to employ rotation of rotor. In this paper the construction, winding designing scheme for stator and results of redesigned machine are presented.
{"title":"Multifunctional induction machine","authors":"Nandawadekar Ajit Dattu, G. Deepthi, Gawade Santosh Pundlik","doi":"10.1109/WIECON-ECE.2016.8009086","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009086","url":null,"abstract":"An induction or asynchronous motor is an AC electric motor in which the electric current in the rotor is needed to produce torque is induced by electromagnetic induction from the magnetic field of the stator winding. The induction machine is used in a wide variety of applications as a means of converting electric power to mechanical work. It is without doubt the workhorse of the electric power industry. As we know that induction motor is nothing but generalized rotating transformer. This same concept can be used to implement the motor as welding transformer. Welding transformer required low voltage and high current for joining of two metal parts by electrical arc welding. So some modification can be done in the stator winding of induction motor which may cause induction motor act as welding transformer. Also the same motor can be implemented for operating on the single phase as well as three phase supply. The running and starting winding of the single phase operation are placed in the same slots that are used for the three phase operation. So at a time anyone of them can be used to supply or produce excitation in order to employ rotation of rotor. In this paper the construction, winding designing scheme for stator and results of redesigned machine are presented.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009099
A. Mani, Rebeka Mukherjee
FOSS is an acronym for Free and Open Source Software. The FOSS 2013 survey primarily targets FOSS contributors and relevant anonymized dataset is publicly available under CC by SA license. In this study, the dataset is analyzed from a critical perspective using statistical and clustering techniques (especially multiple correspondence analysis) with a strong focus on women contributors towards discovering hidden trends and facts. Important inferences are drawn about development practices and other facets of the free software and OSS worlds.
FOSS是Free and Open Source Software的缩写。自由/开源软件2013调查主要针对自由/开源软件贡献者,相关的匿名数据集在SA许可的CC下公开可用。在本研究中,数据集使用统计和聚类技术(特别是多重对应分析)从批判的角度进行分析,重点关注女性贡献者,以发现隐藏的趋势和事实。重要的推论是关于开发实践和自由软件和OSS世界的其他方面。
{"title":"A study of FOSS 2013 survey data using clustering techniques","authors":"A. Mani, Rebeka Mukherjee","doi":"10.1109/WIECON-ECE.2016.8009099","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009099","url":null,"abstract":"FOSS is an acronym for Free and Open Source Software. The FOSS 2013 survey primarily targets FOSS contributors and relevant anonymized dataset is publicly available under CC by SA license. In this study, the dataset is analyzed from a critical perspective using statistical and clustering techniques (especially multiple correspondence analysis) with a strong focus on women contributors towards discovering hidden trends and facts. Important inferences are drawn about development practices and other facets of the free software and OSS worlds.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/WIECON-ECE.2016.8009080
Manjari Benhar Peethala, S. Kulkarni
The security of digital information over the internet has gained prominence over the years due to the flourishing e-commerce. The traditional ways of personal identification like knowledge-based methods (i.e. passwords, ID cards) and token based methods no longer suffice the need of secure transmission of critical data online. To overcome this shortcoming, Biometrics can be used instead of passwords or pins. Although, Biometric Authentication adds up to the online security aspect but it can be vulnerable to various attacks over the open networks. Hence, Biometric Cryptosystems are proposed to improve the security of biometric authentication systems and to create revocable representations of individuals. On the other hand, Steganography techniques play a vital role in hiding encrypted biometric data behind random carrier. The proposed system is worked on a readymade database of ten fingerprint samples and focusses on providing enhanced security to the biometric fingerprint data in two levels (i.e. Biometric Cryptosystem followed by Steganography) before it is transmitted online to the Authenticator. At the Authenticator side, the identification process is carried out using Hamming distance or Euclidean distance. Furthermore, this system gives an effective TAR of almost 99% with time complexity of RC4 key generation algorithm as low as 18 msec.
{"title":"Integrating Biometric Cryptosystem with steganography for authentication","authors":"Manjari Benhar Peethala, S. Kulkarni","doi":"10.1109/WIECON-ECE.2016.8009080","DOIUrl":"https://doi.org/10.1109/WIECON-ECE.2016.8009080","url":null,"abstract":"The security of digital information over the internet has gained prominence over the years due to the flourishing e-commerce. The traditional ways of personal identification like knowledge-based methods (i.e. passwords, ID cards) and token based methods no longer suffice the need of secure transmission of critical data online. To overcome this shortcoming, Biometrics can be used instead of passwords or pins. Although, Biometric Authentication adds up to the online security aspect but it can be vulnerable to various attacks over the open networks. Hence, Biometric Cryptosystems are proposed to improve the security of biometric authentication systems and to create revocable representations of individuals. On the other hand, Steganography techniques play a vital role in hiding encrypted biometric data behind random carrier. The proposed system is worked on a readymade database of ten fingerprint samples and focusses on providing enhanced security to the biometric fingerprint data in two levels (i.e. Biometric Cryptosystem followed by Steganography) before it is transmitted online to the Authenticator. At the Authenticator side, the identification process is carried out using Hamming distance or Euclidean distance. Furthermore, this system gives an effective TAR of almost 99% with time complexity of RC4 key generation algorithm as low as 18 msec.","PeriodicalId":412645,"journal":{"name":"2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)","volume":"58 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}