DOI:10.20894/IJDMTA.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.893 & GIF:0.787
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJDMTA provides online manuscript tracking system.

Every issue of Journal of IJDMTA is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJDMTA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJDMTA website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 6 Issue 1 Date of Publication:   June 2017

A Novel Method for User Authentication on Cloud Computing Using Face Recognition System

R.Prema,P.Shanmugapriya

Page(s):   03-05 ISSN:   2278-2397
DOI:   10.20894/IJDMTA.102.006.001.002 Publisher:   Integrated Intelligent Research (IIR)


  1. Akshay A. Pawle, Vrushsen P. Pawar,   "Face Recognition System FRS) on Cloud Computing for User Authentication",   International Journal of Soft Computing and Engine   ,Vol.3   ,Issue 4   ,2013
    View Artical

  2. Dr.S.HariGanesh, S.Ananthi,   "Enhancing User Security in Cloud Computing using Colour Palette Scheme (CPS)",   International Journal of Advanced Research in Comp   ,Vol.4   ,Issue 7   ,2015
    View Artical

  3. Parikshit Prasad, Badrinath Ojha, Rajeev Ranjan shahi,Ratan Lal,   "3 Dimensional Security in Cloud Computing",   IEEE   ,2011
    View Artical

  4. Chenguang Wang and et al,   "Study of Cloud Computing Security Based on Private Face Recognition",   IEEE   ,2010
    View Artical

  5. Cong Wang,Qian wang and Kui Ren and Wenjing Lou,   "Ensuring Data Storage Security in Cloud Computing,Quality of Service   ,2009
    View Artical

  6. Paul S. Wooley,Network Analyst, Tyco Electronics,   "Identifying Cloud Computing SecurityRisks   ,2011
    View Artical

  7. Turk, M.A., Pentland, A.P.,   "Face recognition using eigenfaces",   IEEE Computer Society Conference on Computer Visio   ,1991
    View Artical

  8. John Canny,   "A computational approach to edge detection. Pattern Analysis Intelligence",   IEEE Transactions on   ,1986
    View Artical

  9. Yogeshwari Chaudhari , Tanaya Dave, Sarita Barade, SupriyaMane, Prof.S.M.Sangve ,Prof.A.S.Devare,   "3-Layer Security Using Face Recognition in Cloud",   International Journal of ComputerScience and Netwo   ,Vol.1   ,Issue 3   ,2012
    View Artical

  10. A.Prema, Prof. Dr. M. V.RamanaMurthy,   "A Step Wise Procedure to Develop an Algorithm for Image Brightness Using Edge Detection Principles",   IOSR Journal of Computer Engineering   ,Vol.16   ,Issue 2   ,2014
    View Artical

  11. Al Morsy, M., Grundy, J. & Mueller, I,   "An analysis of the cloud computing security problem",   Paper presented at the 17th Asia-Pacific Software
    View Artical