Qualification: 
Ph.D, MCA, MPhil
n_lalitha@cb.amrita.edu

Lalithamani N. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Biometrics and Image Processing.

Publications

Publication Type: Journal Article

Year of Publication Title

2018

N. Lalithamani, “Text Summarization”, Journal of Advanced Research in Dynamical and Control Systems, vol. 10, no. 3, pp. 1368-1372, 2018.

2017

N. Lalithamani, “Finger Knuckle Biometric Authentication using Convolution Neural Network”, International Journal of Pure and Applied Mathematics, vol. 117, no. 10, pp. 31-35, 2017.[Abstract]


To ensure security of confidentiality maintained complex systems; biometrics has become the most efficient solution, which refers to the automatic identification of a person based on their physiological or behavioral characteristics. This paper proposes a Biometric Authentication system using deep learning concepts, where the finger knuckle of the user is considered to enhance the security of the system. This model can recognize an authorized user based on major finger knuckle pattern using Convolution Neural Network (CNN) and extracts the features and are optimally compared with the trained images. The CNN is trained by back propagation algorithm with stochastic gradient descent and minibatch learning with the help of Neural Network Toolbox in MATLAB, which can provide accurate output than any other algorithms used for authentication.

More »»

2017

N. Lalithamani, “Survey on Non-obstructive and Continuous user Authentication on Mobile Devices”, Pakistan Journal of Biotechnology, vol. 14, no. 2, pp. 318-322, 2017.

2017

N. Lalithamani, “Optimal NN Based Multimodal Biometric Authentication Using Palm and Finger Knuckle Images”, International Journal of Pure and Applied Mathematics, vol. 117, no. 10, pp. 37-41, 2017.[Abstract]


The recognizable proof and authentication are finished by passwords, stick number, which is effectively broken by others. Biometrics is an effective and remarkable device in light of the useful and behavioral qualities of the individuals keeping in mind the end goal to demonstrate their authentication. One of the present patterns in biometric human recognizable proof is the improvement of new creating modalities.. For authentication four distinct modules are considered. This work diverse element as are considered to combination process highlight level combination used recognized the biometrics with help optimal Neural Network (NN), here shrouded layer and neuron optimization process Gray wolf optimization (GWO) system is utilized. From the process the trial results are contrasting with existing way to deal with demonstrate our proposed display as best for biometric authentication process.

More »»

2017

A. J. Siddharth, Prabha, A. P. Hari, Srinivasan, T. J., and N. Lalithamani, “Palm Print and Palm Vein Biometric Authentication System”, Advances in Intelligent Systems and Computing, vol. 517, pp. 539-545, 2017.[Abstract]


The modern computing technology has a huge dependence on biometrics to ensure strong personal authentication. The mode of this work is to increase accuracy with less data storage and providing high security authentication system using multimodal biometrics. The proposed biometric system uses two modalities, palm print and palm vein. The preprocessing steps begin with image acquisition of palm print and palm vein images using visible and infrared radiations, respectively. From the acquired image, region of interest (ROI) is extracted. The extracted information is encrypted using encryption algorithms. By this method of encryption, after ROI extraction, the storage of data consumes less memory and also provides faster access to the information. The encrypted data of both modalities are fused using advanced biohashing algorithm. At the verification stage, the image acquired is subjected to ROI extraction, encryption and biohashing procedures. The biohash code is matched with the information in database using matching algorithms, providing fast and accurate output. This approach will be feasible and very effective in biometric field.

More »»

2017

H. M. Priya and N. Lalithamani, “A Survey for Securing Online Payment Transaction using Biometrics Authentication”, Advances in Intelligent Systems and Computing, vol. 517, pp. 81-91, 2017.[Abstract]


In emerging lifestyle, people prefer online shopping as the most convenient way for purchasing their products. In order to provide secure transaction in e-commerce site, biometric features are incorporated in authentication. Biometric features are considered to be easier and secure because it solves the exasperation by the customer to recall the long account number and their password and it also has unique feature all over the globe. The use of biometrics authentication in online site provides more secure way of transaction than any other means [1–3]. In this work, we summarize the study of the various kinds of biometric traits that are used for online payment compared with one another.

More »»

2016

N. Lalithamani and B, S., “Simulation of multimodal biometrics with cryptosystem in hospital suites”, Pakistan Journal of Biotechnology, vol. 13, no. 2, pp. pp.138-142, 2016.

2016

S. K and N. Lalithamani, “Automatic scraper of celebrity images from heterogeneous websites based on face recognition and sorting for profiling”, International Journal of control theory and applications, vol. 9, no. 2, pp. 1409-1420, 2016.[Abstract]


Now days it has become trend to follow all the celebrities as we consider them as our role models. So instead of searching the images of various celebrities in different websites we can find them in a single website by sorting all the images. Reliable database of images is essential for any image recognition system. Through Internet we find all the required images. These images will serve as samples for automatic recognition system. With these images we do face detection, face recognition, face sorting using various techniques like local binary patterns, haar cascades. We make an overall analysis of the detector. Using opencv we detect and recognize images. Similarity matching is done to check how the images are related to each other. Collection of images is based on user defined templates, which are in web browser environment. With the help of this system one can give their requirement and the image of celebrity is displayed based on that

More »»

2016

N. Lalithamani and R, S., “Countermeasures for indirect attack for iris based biometric authentication”, Indian Journal of Science and Technology , 2016.

2015

N. Lalithamani, Arunprasad, P., Gowthamraj, R., and Guruprasath, A., “Face Recognition and Tracking on Video Streams”, International Journal of Applied Engineering Research, vol. 10, no. 45, pp. 31860-31863, 2015.

2015

N. Lalithamani, S, S., and PA, D., “A hybrid model for ranking uncertain distributed database”, International Journal of Applied Engineering Research”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. pp.1424-1428, 2015.

2015

N. Lalithamani and M, S., “Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem”, Imaging Science Journal , vol. 63, no. 2, pp. pp.111-118, 2015.

2015

N. Lalithamani and R, S., “A Survey process of attacks on iris based recognition for biometric authentication”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. pp.1466-1470, 2015.

2015

R. G., T, R., and N. Lalithamani, “Microbots in Biofield: A Cancer Warrior”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. pp.4236-4239, 2015.

2015

N. Lalithamani and M, S., “Dual encryption algorithm to improve security in hand vein and palm vein-based biometric recognition”, Journal of medical imaging and health informatics, vol. 5, no. 3, pp. pp.545-551, 2015.

2014

N. Lalithamani and M., S., “Technique to Generate Face and Palm Vein-Based Fuzzy Vault for Multi-Biometric Cryptosystem”, Machine Graphics Vision Journal, vol. 23, pp. 97-114, 2014.[Abstract]


Template security of biometric systems is a vital issue and needs critical focus. The importance lies in the fact that unlike passwords, stolen biometric templates cannot be revoked. Hence, the biometric templates cannot be stored in plain format and needs strong protection against any forgery. In this paper, we present a technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Here, initially the input images are pre-processed using various processes to make images fit for further processing. In our proposed method, the features are extracted from the processed face and palm vein images by finding out unique common points. The chaff points are added to the already extracted points to obtain the combined feature vector. The secret key points which are generated based on the user key input (by using proposed method) are added to the combined feature vector to have the fuzzy vault. For decoding, the multi-modal biometric template from palm vein and face image is constructed and is combined with the stored fuzzy vault to generate the final key. Finally, the experimentation is conducted using the palm vein and face database available in the CASIA and JAFFE database. The evaluation metrics employed are FMR (False Match Ratio) and GMR (Genuine Match Ratio). From the metric values obtained for the proposed system, we can infer that the system has performed well.

More »»

2009

N. Lalithamani and KP, S., “Irrevocable cryptographic key generation from cancelable fingerprint templates: An enhanced and effective scheme”, European Journal of Scientific Research, 2009.[Abstract]


The growing vastness of identity theft in our society has made the requirement of reliable information security mechanisms a priority. Even though information security can be accomplished with the help of a prevailing tool like cryptography, protecting the confidentiality of the cryptographic keys is one of the significant issues to be deal with. This predicament can be efficiently solved by the integration of biometrics with cryptography. Of late, the enhanced performance of cryptographic key generated from biometrics in terms of security has obtained massive reputation amongst the researchers and experimenters. However, there is a permanent association between the biometric and the user, in which modification is impossible. Hence, the biometric is gone eternally and possibly for all the applications which apply it, if there is a compromise of the biometric identifier. This may be solved by the construction of revocable biometric templates through cancelable biometrics. In this paper, we have proposed an approach to generate irrevocable cryptographic key from cancelable fingerprint templates, which performs in an efficient manner. Initially, the fingerprints are employed to extract the minutiae points which are transformed in an efficient manner to obtain deformed points. Subsequently, the deformed points are employed to generate the cancelable templates which are utilized for the extraction of irrevocable keys. It is highly impractical to acquire cancelable fingerprint templates and original fingerprints from the generated key owing to the fact that cryptographic key generated is irrevocable. We have utilized the fingerprints accessible from open sources to evaluate the efficacy of our approach. In addition, the protection analysis of the proposed method has been presented. More »»

Publication Type: Conference Proceedings

Year of Publication Title

2017

V. Subramanian, Choudhary, B. S. D., and N. Lalithamani, “A Survey of Extant Surveillance Systems using Biometrie Tracking”, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, Coimbatore, India, 2017.[Abstract]


Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments. Although current systems are remarkable, they are far from impeccable and are limited by several conditions. In short, there is still vast scope for major improvements in our extant systems. In this survey, we strive to provide a comprehensive review of the present literature and to propose a better model that would aim to solve the present limitations.

More »»

2017

N. Lalithamani, “Advances in Intelligent Systems and Computing”, Advances in Intelligent Systems and Computing, vol. 509. Springer Singapore, pp. pp 221 – 229, 2017.[Abstract]


The book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issue in big data and cloud computing, computation linguistics, cyber-physical systems as well as topics in intelligent information management. Written by active researchers, the different chapters are based on contributions presented at the workshop in intelligent systems and computing

More »»

Publication Type: Conference Paper

Year of Publication Title

2017

N. Lalithamani, “Ranking uncertain distributed databases at tuple level”, in Advances in Computational Intelligence - Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 509), 2017, vol. 509, pp. pp.221-229.[Abstract]


In distributed database system, the data are located at different locations. As the data are at multiple locations, it may not be accurate. It may contain uncertain values or even some data may be missing. Due to impreciseness and uncertainty in the data, occurrence of error becomes high. This makes the processing of the data difficult. There are many ways to handle uncertain databases. To obtain required data, ranking technique is used. One such technique is the top-k query method where the data are retrieved according to user input. This paper proposes an algorithm that ranks and retrieves the data in minimum time at tuple level. In addition, the number of records traversed during this ranking and retrieval process is minimized. The time taken for retrieval of the records is also analyzed.

More »»

2016

N. Lalithamani, “Gesture control using single camera for PC”, in Physics Procedia, 2016, vol. 78, pp. pp. 146-152.

2015

N. Lalithamani and M, S., “Embedding of iris data to hand vein images using watermarking technology to improve template protection in biometric recognition”, in Proceedings of 2015 IEEE International Conference on Electrical, Computer and Communication Technologies( ICECCT 2015), 2015.

2014

N. Lalithamani, Sukumaran, R., K, A., KK, S., V, D., and S, S., “A mixed-initiative approach for summarizing discussions coupled with sentimental analysis”, in ACM International Conference Proceeding Series, 2014.

2009

N. Lalithamani and KP, S., “Towards generating irrevocable key for cryptography from cancelable fingerprints”, in Proceedings 2009-2nd IEEE International Conference on Computer Science and Information Technology(ICCSIT 2009), 2009, pp. pp.563-568.

2009

N. Lalithamani and KP, S., “An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics”, in International Conference on Advances in Recent Technologies in Communication and Computing(ARTCom 2009), 2009, pp. pp.47-52, 2009.

Faculty Research Interest: