SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012



  Designing an Efficient Multimodal Biometric System
          using Palmprint and Speech Signal
                                             Mahesh P.K.1, M.N. Shanmukha Swamy2
                                         1
                                           JSS Research Foundation, SJCE, Mysore, India
                                                  Email: mahesh24pk@gmail.com
                                         2
                                           JSS Research Foundation, SJCE, Mysore, India
                                                    Email: mnsjce@gmail.com

Abstract— This paper proposes a multimodal biometric system             features using modified canonical form method for palmprint
using palmprint and speech signal. In this paper, we propose a          and Subband Cepstral Coefficients for speech. Integrating
novel approaches for both the modalities. We extract the                these two features at fusion level, which gives better
features using Subband Cepstral Coefficients for speech signal
                                                                        performance and better accuracy. Which gives better
and Modified Canonical method for palmprint. The individual
feature score are passed to the fusion level. Also we have
                                                                        performance and better accuracy for both traits (speech signal
proposed a new fusion method called weighted score. This                & palmprint).
system is tested on clean and degraded database collected by                The rest of this paper is organized as fallows. Section 2
the authors for more than 300 subjects. The results show                presents the system structure, which is used to increase the
significant improvement in the recognition rate.                        performance of individual biometric trait; multiple classifiers
                                                                        are combined using matching scores. Section 3 presents
Index Terms—Multimodal biometrics, Speech signal,                       feature extraction method used for speech signal and section
Palmprint, Fusion                                                       4 for palmprint. Section 5, the individual traits are fused at
                                                                        matching score level based on weighted sum of score
                       I. INTRODUCTION                                  technique. Finally, the experimental results are given in section
    A unimodal biometric authentication, which identifies an            6. Conclusions are given in the last section.
individual person using physiological and/or behavioral
characteristics, such as palmprint, face, fingerprints, hand                                 II. SYSTEM OVERVIEW
geometry, iris, retina, vein and speech. These methods are                  The block diagram of a multimodal biometric system using
more reliable and capable than knowledge-based (e.g.                    two (palm and speech) modalities for human recognition
Password) or token-based (e.g. Key) techniques. Since                   system is shown in Figure 1. It consists of three main blocks,
biometric features are hardly stolen or forgotten.                      that of Preprocessing, Feature extraction and Fusion.
    However, a single biometric feature sometimes fails to be           Preprocessing and feature extraction are performed in parallel
exact enough for verifying the identity of a person. By                 for the two modalities. The preprocessing of the audio signal
combining multiple modalities enhanced performance                      under noisy conditions includes signal enhancement, tracking
reliability could be achieved. Due to its promising applications        environment and channel noise, feature estimation and
as well as the theoretical challenges, multimodal biometric             smoothing [4]. The preprocessing of the palmprint typically
has drawn more and more attention in recent years [1].                  consists of the challenging problems of detecting and
Speech Signal and palmprint multimodal biometrics are                   tracking of the palm and the important palm features.
advantageous due to the use of non-invasive and low-cost                    Further, features are extracted from the training and testing
speech and image acquisition. In this method we can easily              images and speech signal respectively, and then matched to
acquire palmprint images using digital cameras, touchless               find the similarity between two feature sets. The matching
sensors and speech signal using microphone. Existing studies            scores generated from the individual recognizers are passed
in this approach [2, 3] employ holistic features for palmprint          to the decision module where a person is declared as genuine
and speech signal representation and results are shown with             or an imposter.
different techniques of fusion and algorithms.
    Multimodal system also provides anti-spooling measures               III. SUBBAND BASED CEPSTRAL COEFFICIENTS AND GAUSSIAN
by making it difficult for an intruder to spool multiple biometric                          MIXTURE MODEL
traits simultaneously. However, an integration scheme is
required to fuse the information presented by the individual            A. Subband Decomposition via Wavelet Packets
modalities.                                                                 A detailed discussion of wavelet analysis is beyond the
    This paper presents a novel fusion strategy for personal            scope of this paper and we therefore refer interested readers
identification using speech signal and palmprint features at            to a more complete discussion presented in [5]. In continuous
the features level fusion Scheme. The proposed paper shows              time, the Wavelet Transform is defined as the inner product
that integration of speech signal and palmprint biometrics              of a signal x(t) with a collection of wavelet functions yab(t) in
can achieve higher performance that may not be possible                 which the wavelet functions are scaled(by a) and translated
using a single biometric indicator alone. We extract the
© 2012 ACEEE                                                       76
DOI: 01.IJSIP.03.01.7
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


(by b) versions of the prototype wavelet y(t).




                                 Figure 1. Block diagram of the proposed multimodal biometric verification system

                  t b
    a,b (t )        dt                                          (1)
                   a 
                   1                     t b
  W x (a, b)                  x (t ) *      dt                  (2)
                    a   
                                            a 
Discrete time implementation of wavelets and wavelet packets
are based on the iteration of two channel filter banks which
are subject to certain constraints, such as low pass and/or
high pass branches on each level followed by a sub sampling-
by-two unit. Unlike the wavelet transform which is obtained
by iterating on the low pass branch, the filterbank tree can be
iterated on either branch at any level, resulting in a tree
structured filterbank which we call a wavelet packet filterbank
tree. The resultant transform creates a division of the
frequency domain that represents the signal optimally with
respect to the applied metric while allowing perfect
reconstruction of the original signal. Because of the nature
of the analysis in the frequency domain it is also called
subband decomposition where subbands are determined by
a wavelet packet filterbank tree.
B. Wavelet Packet Transform Based Feature Extraction
Procedure
    Here, speech is assumed to be sampled at 8 kHz. A frame                                       Figure 2. Wavelet Packet Tree
size of 24msec with a 10msec skip rate is used to derive the                The subband signal energies are computed for each frame
Subband based Cepstral Coefficients features, whereas a                     as,
20msec frame with the same skip rate is used to derive the
MFCCs. We have used the same configuration proposed in
[6] for MFCC. Next, the speech frame is Hamming windowed                         Si 
                                                                                           mel
                                                                                                  (W )(i), m 
                                                                                                              
                                                                                                                                    (3)
and pre-emphasized.                                                                                 Ni
    The proposed tree assigns more subbands between low
to mid frequencies while keeping roughly a log-like                              : Wavelet packet transform of signal x,
                                                                            W
distribution of the subbands across frequency. The wavelet                  i :subband frequency index (i=1,2...L),
packet transform is computed for the given wavelet tree,                    Ni : number of coefficients in the ith subband.
which results in a sequence of subband signals or equivalently
the wavelet packet transform coefficients, at the leaves of the             C. Subband based Cepstral Coefficients
Tree. In effect, each of these subband signals contains only                    As in MFCCs the derivation of coefficients is performed
restricted frequency information due to inherent bandpass                   in two stages. The first stage is the computation filterbank
filtering. The wavelet packet tree is given in Figure 2. The                energies and the second stage would be the decorrelation of
energy of the sub-signals for each subband is computed and                  the log filterbank energies with a DCT to obtain the MFCC.
then scaled by the number of transform coefficients in that                 The derivation of the Subband Based Cepstral coefficients
subband.                                                                    follows the same process except that the filterbank energies
© 2012 ACEEE                                                    77
DOI: 01.IJSIP.03.01.7
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


are derived using the wavelet packet transform rather than                                                    tractibility where the complete Gaussian mixture density is
the short-time Fourier transform. It will be shown that these                                                 represented by only the mean vectors, covariance matrices
features outperform MFCCs. We attribute this to the compu-                                                    and mixture weights from all component densities.
tation of subband signals with smooth filters. The effect of
filtering as a result of tracing through the low-pass/high-pass                                                IV. FEATURE EXTRACTION USING MODIFIED CANONICAL FORM
branches of the wavelet packet tree, is much smoother due to                                                                          METHOD
the balance in time-frequency representation. We believe that
                                                                                                                 Features are the attributes or values extracted to get the
this will contribute to improved speech/speaker characteriza-
                                                                                                              unique characteristics from the image and speech signal.
tion over MFCC. Subband Based Cepstral coefficients are
derived from subband energies by applying the Discrete Co-                                                    A. Palmprint feature extraction methodology
sine Transformation:                                                                                              Details of the algorithm are as follows:
            L                                                                                                 1) Identify hand image from background
                        n(i  0.5) 
SBC (n)   log Si cos             , n  1,...n '                                                              Our designed system is such that palmprint images are
          i 1              L                                                                               captured using contact-less without pegs, keeping the im-
                                                                                                   (4)        age background relatively uniform and relatively low inten-
where n’ is the number of SBC coefficients and L is the total                                                 sity when compared to the hand image. Using the statistical
number of frequency bands. Because of the similarity to root-                                                 information of the background, the algorithm estimates an
cepstral [7] analysis, they are termed as subband based                                                       adaptive threshold to segment the image of the hand from
cepstral coefficients.                                                                                        the background. Pixels with intensity above the threshold
                                                                                                              are considered to be part of the hand image.




    Figure 3. Block diagram for Wavelet Packet Transform based
                    feature extraction procedure

D. The Gaussian Mixture Model
   In this study, a Gaussian Mixture Model approach
proposed in [8] is used where speakers are modeled as a
mixture of Gaussian densities. The use of this model is
                                                                                                                       Figure 4. Schematic diagram of image alignment
motivated by the interpretation that the Gaussian
components represent some general speaker-dependent
spectral shapes and the capability of Gaussian mixtures to
model arbitrary densities.
   The Gausssian Mixture Model is a linear combination of
M Gaussian mixture densities, and given by the equation,
                     M
                                
         p( x |  )   pi bi ( x )                                                             (5)
                                 i 1

                                                     
Where        x is a D-dimensional random vector, bi ( x) , i=1,...M
are the component densities and pi, i=1,…M are the mixture                                                                     Figure 5. Segmentation of ROI
weights. Each component density is a D-dimensional                                                            2)Locate region-of-interest
Gaussian function of the form                                                                                     The palm area is extracted from the binary image of the
                                                                                                              hand. After translating the original image into binary image,
                          1                     1   1                                                 we find two key positioning points in the palmprint image
bi ( x )                                   exp  ( x   )T  ( x   )        
               (2 ) D / 2 | i |1/ z            2           i                                              using automatic detecting method. The first valley in the
                                                                                                              graph is the gaps between little finger and ring finger, Key
                                                                                                   (6)
                                                                                                              Point 1. The third valley in the graph is the gaps between
             
Where  denotes the mean vector and  i denotes the                                                           middle finger and index finger, Key Point 2. The key point is
covariance matrix. The mixture weights satisfy the law of total                                               circled in Figure 4. The hand image is rotated by θ degrees.
                                                                                                              The hand images are rotated to align the hand images into a
                           M
                                                                                                              predefined direction. θ is calculated using the key points as
probability,             p        i    =1. The major advantage of this                                       shown in the Figure 4. Since the size of the original image is
                          i 1



representation of speaker models is the mathematical                                                          large, a smaller hand image is cropped out from the original
                                                                                                              hand image after image alignment using key points. Figure 5
© 2012 ACEEE                                                                                             78
DOI: 01.IJSIP.03.01.7
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


shows the proposed image alignment and ROI selection                    The following steps are considered for the feature extraction:
method.                                                                         Select the palm image for the input
                                                                                Pre-process the image
B. Modified Canonical Form Method
                                                                                Determine the eigen values and eigen vectors of
    The “Eigenpalm” method proposed by Turk and Pentland                           the image
[9][10] is based on Karhunen-Loeve Expression and we are                         Use the canonical form for the feature extraction.
motivated by this work for efficiently representing picture of
images. The Eigen method presented by Turk and Pentland                 C. Euclidean Distance
finds the principal components (Karhunen-Loeve Expression)                 Let an arbitrary instance X be described by the feature
of the image distribution or the eigenvectors of the covariance         vector
matrix of the set of images. These eigenvectors can be thought                                                                       (13)
as set of features, which together characterized between
images                                                                  Where ar(x) denotes the value of the rth attribute of instance x.
    Let a image I (x, y) be a two dimensional array of intensity        Then the distance between two instances xi and xj is defined
values or a vector of dimension n. Let the training set of
images be I1, I2, I3,…….In. The average image of the set is             to be d ( xi , x j ) ;
defined by
                                                                                                                                     (14)
                                                            (7)
                                                                        D. Score Normalization
Each image differed from the average by the vector.
                                                                           This step brings both matching scores between 0 and 1
                                                             (8)        [11]. The normalization of both the scores are done by
This set of very large vectors is subjected to principal                                   MS Speech  min Speech
component analysis which seeks a set of K orthonormal                        N Speech                                              (15)
vectors Vk, K=1,…...., K and their associated eigenvalues                                 max Speech  min Speech
k which best describe the distribution of data. The vectors
Vk and scalars k are the eigenvectors and eigenvalues of                                 MS Palm  min Palm
                                                                             N Palm                                                (16)
the covariance matrix:                                                                    max Palm  min Palm
                                                                        Where minSpeech and maxSpeech are the minimum and maximum
                                                             (9)        scores for speech signal recognition and min Palmprint and
                                                                        maxPalmprint are the corresponding values obtained from
Where the matrix                                      finding           palmprint trait.
the eigenvectors of matrix Cnxn is computationally intensive.           E. Generation of Similarity Scores
However, the eigenvectors of C can determine by first finding
                                                                            Note that the normalized score of palmprint which is
the eigenvectors of much smaller matrix of size NxN and taking
                                                                        obtained through Haar Wavelet gives the information of
a linear combination of the resulting vectors [4].
                                                                        dissimilarity between the feature vectors of two given images
    The modified canonical method proposed in this paper is
                                                                        while the normalized score from speech signal gives a
based on Eigen values and Eigen vectors. These Eigen valves             similarity measure. So to fuse both the score, there is a need
can be thought a set of features which together characterized           to make both the scores as either similarity or dissimilarity
between images.                                                         measure. In this paper, the normalized score of palmprint is
Let be the normalized modal matrix of I, the diagonal matrix            converted to similarity measure by
is given by
                                                                                   '
                                                            (10)
                                                                                 N Palm  1  N Palm                                (17)

                                                                                                     V. FUSION
      ˆ      Vkij
Where P            and                                                     The biometrics systems are integrated at multi-modality
              Xi                                                        level to improve the performance of the verification system.
                           2
                                                                        At multi-modality level, matching score are combined to give
      X i  sqrt ( Vkij ) , i, j=1,2,3,….n                (11)         a final score. The following steps are performed for fusion:
                                                                        1 . Given a query image and speech signal as input, features
Then the quadratic form Q is given by
                                                                             are extracted by the individual recognition and then the
                                                            (12)             matching score of each individual trait is calculated.
                                                                        2 . The weights a and b are calculated using FAR and FRR.
                                                                        3 . Finally, the final score after combining the matching score

© 2012 ACEEE                                                       79
DOI: 01.IJSIP.03.01.7
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


of each trait is calculated by weighted sum of score technique.                                     CONCLUSIONS
                     a  MS Palm  b  MS Speech                              Biometric systems are widely used to overcome the
       MS fusion                                            (18)         traditional methods of authentication. But the unimodal
                                   2                                      biometric system fails in case of biometric data for particular
Where a and b are the weights assigned to both the traits.                trait. This paper proposes a new method in selecting and
The final matching score (MSfusion) is compared against a                 dividing the ROI for analysis of palmprint. The new method
certain threshold value to recognize the person as genuine                utilizes the maximum palm region of a person to attain feature
or an imposter.                                                           extraction. More importantly, it can cope with slight variations,
                                                                          in terms of rotation, translation, and size difference, in images
                   VI. EXPERIMENTAL RESULTS                               captured from the same person. The experimental results show
    This section shows the experimental results of our                    that the performance of palmprint-based unimodal system
approach with Modified Canonical method and Subband                       and speech-based unimodal system fails to meet the
based Cepstral coefficients for palmprint and Speech                      requirement. Fusion at the matching-score level is used to
respectively. We evaluate the proposed multimodal system                  improve the performance of the system. The psychological
on a data set including more than 300 subjects taking 6                   effects of such multimodal system should also not be
different samples, also we have experimented with two                     disregarded and it is likely that a system using multiple
different conditions (Cleaned and Degraded data). The                     modalities would seem harder to cheat to any potential
training database contains a palmprint images and speech                  impostors.
signal for each individual for each subject.                                  In the future we plan to test whether setting the user
    The comparison of both unimodal systems (palm and                     specific weights to different modalities can be used to improve
speech modality) and a bimodal system is given in Table 1 &               a system’s performance.
2. It can be seen that the fusion of palmprint and speech
features improves the verification score. The experiments                                            REFERENCES
show that EER is reduced to 3.54% in clean database and                   [1] A. A. Ross, K. Nandakumar, and A. K. Jain. Handbook of
9.17% in degraded database.                                                    Multibiomtrics. Springer-Verlag, 2006.
                                                                          [2] Mahesh P.K. and M.N. Shanmukhaswamy. Comprehensive
 TABLE I. THE FAR AND FRR O F PALMPRINT AND SPEECH SIGNAL IN CLEAN
                     AND DEGRADED C ONDITIONS
                                                                               Framework to Human Recognition Using Palmprint and Speech
                                                                               Signal. In Springer-Verlag Berlin Heideberg 2011.
                                                                          [3] Mahesh P.K. and M.N. Shanmukhaswamy. Integration of
                                                                               multiple cues for human authentication system. In Procedia
                                                                               Computer Science, Volume 2, 2010, Pages 188-194.
                                                                          [4] Jr., J. D., Hansen, J., and Proakis, J. Discrete Time Processing
                                                                               of Speech Signals, second ed. IEEE Press, New York, 2000.
                                                                          [5] O. Rioul and M. Vetterli, “Wavelets and Signal Processing,
                                                                               “IEEE Signal Proc. Magazine, vol. 8(4), pp. 11-38, 1991.
                                                                          [6] D. A. Reynolds and R. C. Rose, “Robust Text_Independent
                                                                               Speaker Identification Using Gaussian Mixture Speaker
                                                                               Models” IEEE Transactions on SAP, vol.3, pp, 72-83, 1995.
                                                                          [7] P. Alexandre and P. Lockwood, “Root cepstral analysis: A
                                                                               unified view: Application to speech processing in car noise
                                                                               environments,” Speech Communication, v.12, pp. 277-
                                                                               288,1993.
             TABLE II. T HE FAR AND FRR AFTER FUSION                      [8] D. A. Reynolds, “Experimental Evaluation of Features for
                                                                               Robust Speaker Identification,” IEEE Transactions on SAP,
                                                                               vol. 2. Pp. 639-643,1994.
                                                                          [9] Turk and A. Pentland, “Face Recognition using Eigenfaces”,
                                                                               in Proceeding of International Conference on Pattern
                                                                               Recognition, pp. 591-1991.
                                                                          [10] Turk and A. Pentland, “Face Recognition using Eigenfaces”,
                                                                               Journals of Cognitive Neuroscience, March 1991.
                                                                          [11] A. K. Jain, K. Nandakumar, & A. Ross, Score Normalization
                                                                               in multimodal biometric systems. The Journal of Pattern
                                                                               Recognition Society, 38(12), 2005, 2270-2285.




© 2012 ACEEE                                                         80
DOI: 01.IJSIP.03.01.7

Contenu connexe

Tendances

SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesIDES Editor
 
Paper id 252014146
Paper id 252014146Paper id 252014146
Paper id 252014146IJRAT
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelIDES Editor
 
A Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak TransformA Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak TransformCSCJournals
 
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnAutomatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnijcsa
 
Analysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition TechniquesAnalysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition Techniquesidescitation
 
Speaker identification using mel frequency
Speaker identification using mel frequency Speaker identification using mel frequency
Speaker identification using mel frequency Phan Duy
 
A novel speech enhancement technique
A novel speech enhancement techniqueA novel speech enhancement technique
A novel speech enhancement techniqueeSAT Publishing House
 
Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...
Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...
Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...CSCJournals
 
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...IJECEIAES
 
Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...IJECEIAES
 
Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...Made Artha
 
Convolutional Neural Network and Feature Transformation for Distant Speech Re...
Convolutional Neural Network and Feature Transformation for Distant Speech Re...Convolutional Neural Network and Feature Transformation for Distant Speech Re...
Convolutional Neural Network and Feature Transformation for Distant Speech Re...IJECEIAES
 

Tendances (19)

SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
 
1801 1805
1801 18051801 1805
1801 1805
 
Paper id 252014146
Paper id 252014146Paper id 252014146
Paper id 252014146
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
 
A Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak TransformA Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak Transform
 
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnAutomatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnn
 
Analysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition TechniquesAnalysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition Techniques
 
speech enhancement
speech enhancementspeech enhancement
speech enhancement
 
Speaker identification using mel frequency
Speaker identification using mel frequency Speaker identification using mel frequency
Speaker identification using mel frequency
 
H010234144
H010234144H010234144
H010234144
 
A novel speech enhancement technique
A novel speech enhancement techniqueA novel speech enhancement technique
A novel speech enhancement technique
 
Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...
Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...
Real-time DSP Implementation of Audio Crosstalk Cancellation using Mixed Unif...
 
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
 
Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...
 
Bz25454457
Bz25454457Bz25454457
Bz25454457
 
Nq2422332236
Nq2422332236Nq2422332236
Nq2422332236
 
Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...Design of dfe based mimo communication system for mobile moving with high vel...
Design of dfe based mimo communication system for mobile moving with high vel...
 
Convolutional Neural Network and Feature Transformation for Distant Speech Re...
Convolutional Neural Network and Feature Transformation for Distant Speech Re...Convolutional Neural Network and Feature Transformation for Distant Speech Re...
Convolutional Neural Network and Feature Transformation for Distant Speech Re...
 

En vedette

Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combinesiva23143
 
Biometric steganography
Biometric steganographyBiometric steganography
Biometric steganographyPiyush Mittal
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 

En vedette (15)

Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combine
 
Biometric steganography
Biometric steganographyBiometric steganography
Biometric steganography
 
Biometric
BiometricBiometric
Biometric
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
rm ppt 2
rm ppt 2rm ppt 2
rm ppt 2
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similaire à Designing an Efficient Multimodal Biometric System using Palmprint and Speech Signal

A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueCSCJournals
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approachijsrd.com
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...TELKOMNIKA JOURNAL
 
Sentiment analysis by deep learning approaches
Sentiment analysis by deep learning approachesSentiment analysis by deep learning approaches
Sentiment analysis by deep learning approachesTELKOMNIKA JOURNAL
 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaIOSR Journals
 
Speaker Identification From Youtube Obtained Data
Speaker Identification From Youtube Obtained DataSpeaker Identification From Youtube Obtained Data
Speaker Identification From Youtube Obtained Datasipij
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxSandeep Kumar
 
Comparative Study of Different Techniques in Speaker Recognition: Review
Comparative Study of Different Techniques in Speaker Recognition: ReviewComparative Study of Different Techniques in Speaker Recognition: Review
Comparative Study of Different Techniques in Speaker Recognition: ReviewIJAEMSJORNAL
 
Intelligent Arabic letters speech recognition system based on mel frequency c...
Intelligent Arabic letters speech recognition system based on mel frequency c...Intelligent Arabic letters speech recognition system based on mel frequency c...
Intelligent Arabic letters speech recognition system based on mel frequency c...IJECEIAES
 
IRJET- Emotion recognition using Speech Signal: A Review
IRJET-  	  Emotion recognition using Speech Signal: A ReviewIRJET-  	  Emotion recognition using Speech Signal: A Review
IRJET- Emotion recognition using Speech Signal: A ReviewIRJET Journal
 
F EATURE S ELECTION USING F ISHER ’ S R ATIO T ECHNIQUE FOR A UTOMATIC ...
F EATURE  S ELECTION USING  F ISHER ’ S  R ATIO  T ECHNIQUE FOR  A UTOMATIC  ...F EATURE  S ELECTION USING  F ISHER ’ S  R ATIO  T ECHNIQUE FOR  A UTOMATIC  ...
F EATURE S ELECTION USING F ISHER ’ S R ATIO T ECHNIQUE FOR A UTOMATIC ...IJCI JOURNAL
 
Emotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechEmotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechIOSR Journals
 
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATIONENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATIONijaia
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classificationgerogepatton
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classificationgerogepatton
 
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITION
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITIONQUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITION
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITIONijma
 

Similaire à Designing an Efficient Multimodal Biometric System using Palmprint and Speech Signal (20)

D111823
D111823D111823
D111823
 
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
 
1801 1805
1801 18051801 1805
1801 1805
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...
 
Speaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract FeaturesSpeaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract Features
 
Sentiment analysis by deep learning approaches
Sentiment analysis by deep learning approachesSentiment analysis by deep learning approaches
Sentiment analysis by deep learning approaches
 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With Ica
 
Speaker Identification From Youtube Obtained Data
Speaker Identification From Youtube Obtained DataSpeaker Identification From Youtube Obtained Data
Speaker Identification From Youtube Obtained Data
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptx
 
Comparative Study of Different Techniques in Speaker Recognition: Review
Comparative Study of Different Techniques in Speaker Recognition: ReviewComparative Study of Different Techniques in Speaker Recognition: Review
Comparative Study of Different Techniques in Speaker Recognition: Review
 
Intelligent Arabic letters speech recognition system based on mel frequency c...
Intelligent Arabic letters speech recognition system based on mel frequency c...Intelligent Arabic letters speech recognition system based on mel frequency c...
Intelligent Arabic letters speech recognition system based on mel frequency c...
 
IRJET- Emotion recognition using Speech Signal: A Review
IRJET-  	  Emotion recognition using Speech Signal: A ReviewIRJET-  	  Emotion recognition using Speech Signal: A Review
IRJET- Emotion recognition using Speech Signal: A Review
 
F EATURE S ELECTION USING F ISHER ’ S R ATIO T ECHNIQUE FOR A UTOMATIC ...
F EATURE  S ELECTION USING  F ISHER ’ S  R ATIO  T ECHNIQUE FOR  A UTOMATIC  ...F EATURE  S ELECTION USING  F ISHER ’ S  R ATIO  T ECHNIQUE FOR  A UTOMATIC  ...
F EATURE S ELECTION USING F ISHER ’ S R ATIO T ECHNIQUE FOR A UTOMATIC ...
 
Emotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechEmotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio Speech
 
D04812125
D04812125D04812125
D04812125
 
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATIONENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classification
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classification
 
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITION
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITIONQUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITION
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITION
 

Plus de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Plus de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Dernier

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Designing an Efficient Multimodal Biometric System using Palmprint and Speech Signal

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Designing an Efficient Multimodal Biometric System using Palmprint and Speech Signal Mahesh P.K.1, M.N. Shanmukha Swamy2 1 JSS Research Foundation, SJCE, Mysore, India Email: mahesh24pk@gmail.com 2 JSS Research Foundation, SJCE, Mysore, India Email: mnsjce@gmail.com Abstract— This paper proposes a multimodal biometric system features using modified canonical form method for palmprint using palmprint and speech signal. In this paper, we propose a and Subband Cepstral Coefficients for speech. Integrating novel approaches for both the modalities. We extract the these two features at fusion level, which gives better features using Subband Cepstral Coefficients for speech signal performance and better accuracy. Which gives better and Modified Canonical method for palmprint. The individual feature score are passed to the fusion level. Also we have performance and better accuracy for both traits (speech signal proposed a new fusion method called weighted score. This & palmprint). system is tested on clean and degraded database collected by The rest of this paper is organized as fallows. Section 2 the authors for more than 300 subjects. The results show presents the system structure, which is used to increase the significant improvement in the recognition rate. performance of individual biometric trait; multiple classifiers are combined using matching scores. Section 3 presents Index Terms—Multimodal biometrics, Speech signal, feature extraction method used for speech signal and section Palmprint, Fusion 4 for palmprint. Section 5, the individual traits are fused at matching score level based on weighted sum of score I. INTRODUCTION technique. Finally, the experimental results are given in section A unimodal biometric authentication, which identifies an 6. Conclusions are given in the last section. individual person using physiological and/or behavioral characteristics, such as palmprint, face, fingerprints, hand II. SYSTEM OVERVIEW geometry, iris, retina, vein and speech. These methods are The block diagram of a multimodal biometric system using more reliable and capable than knowledge-based (e.g. two (palm and speech) modalities for human recognition Password) or token-based (e.g. Key) techniques. Since system is shown in Figure 1. It consists of three main blocks, biometric features are hardly stolen or forgotten. that of Preprocessing, Feature extraction and Fusion. However, a single biometric feature sometimes fails to be Preprocessing and feature extraction are performed in parallel exact enough for verifying the identity of a person. By for the two modalities. The preprocessing of the audio signal combining multiple modalities enhanced performance under noisy conditions includes signal enhancement, tracking reliability could be achieved. Due to its promising applications environment and channel noise, feature estimation and as well as the theoretical challenges, multimodal biometric smoothing [4]. The preprocessing of the palmprint typically has drawn more and more attention in recent years [1]. consists of the challenging problems of detecting and Speech Signal and palmprint multimodal biometrics are tracking of the palm and the important palm features. advantageous due to the use of non-invasive and low-cost Further, features are extracted from the training and testing speech and image acquisition. In this method we can easily images and speech signal respectively, and then matched to acquire palmprint images using digital cameras, touchless find the similarity between two feature sets. The matching sensors and speech signal using microphone. Existing studies scores generated from the individual recognizers are passed in this approach [2, 3] employ holistic features for palmprint to the decision module where a person is declared as genuine and speech signal representation and results are shown with or an imposter. different techniques of fusion and algorithms. Multimodal system also provides anti-spooling measures III. SUBBAND BASED CEPSTRAL COEFFICIENTS AND GAUSSIAN by making it difficult for an intruder to spool multiple biometric MIXTURE MODEL traits simultaneously. However, an integration scheme is required to fuse the information presented by the individual A. Subband Decomposition via Wavelet Packets modalities. A detailed discussion of wavelet analysis is beyond the This paper presents a novel fusion strategy for personal scope of this paper and we therefore refer interested readers identification using speech signal and palmprint features at to a more complete discussion presented in [5]. In continuous the features level fusion Scheme. The proposed paper shows time, the Wavelet Transform is defined as the inner product that integration of speech signal and palmprint biometrics of a signal x(t) with a collection of wavelet functions yab(t) in can achieve higher performance that may not be possible which the wavelet functions are scaled(by a) and translated using a single biometric indicator alone. We extract the © 2012 ACEEE 76 DOI: 01.IJSIP.03.01.7
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 (by b) versions of the prototype wavelet y(t). Figure 1. Block diagram of the proposed multimodal biometric verification system t b  a,b (t )     dt (1)  a  1  t b W x (a, b)   x (t ) *   dt                  (2) a   a  Discrete time implementation of wavelets and wavelet packets are based on the iteration of two channel filter banks which are subject to certain constraints, such as low pass and/or high pass branches on each level followed by a sub sampling- by-two unit. Unlike the wavelet transform which is obtained by iterating on the low pass branch, the filterbank tree can be iterated on either branch at any level, resulting in a tree structured filterbank which we call a wavelet packet filterbank tree. The resultant transform creates a division of the frequency domain that represents the signal optimally with respect to the applied metric while allowing perfect reconstruction of the original signal. Because of the nature of the analysis in the frequency domain it is also called subband decomposition where subbands are determined by a wavelet packet filterbank tree. B. Wavelet Packet Transform Based Feature Extraction Procedure Here, speech is assumed to be sampled at 8 kHz. A frame Figure 2. Wavelet Packet Tree size of 24msec with a 10msec skip rate is used to derive the The subband signal energies are computed for each frame Subband based Cepstral Coefficients features, whereas a as, 20msec frame with the same skip rate is used to derive the MFCCs. We have used the same configuration proposed in [6] for MFCC. Next, the speech frame is Hamming windowed Si   mel (W )(i), m    (3) and pre-emphasized. Ni The proposed tree assigns more subbands between low to mid frequencies while keeping roughly a log-like : Wavelet packet transform of signal x, W distribution of the subbands across frequency. The wavelet i :subband frequency index (i=1,2...L), packet transform is computed for the given wavelet tree, Ni : number of coefficients in the ith subband. which results in a sequence of subband signals or equivalently the wavelet packet transform coefficients, at the leaves of the C. Subband based Cepstral Coefficients Tree. In effect, each of these subband signals contains only As in MFCCs the derivation of coefficients is performed restricted frequency information due to inherent bandpass in two stages. The first stage is the computation filterbank filtering. The wavelet packet tree is given in Figure 2. The energies and the second stage would be the decorrelation of energy of the sub-signals for each subband is computed and the log filterbank energies with a DCT to obtain the MFCC. then scaled by the number of transform coefficients in that The derivation of the Subband Based Cepstral coefficients subband. follows the same process except that the filterbank energies © 2012 ACEEE 77 DOI: 01.IJSIP.03.01.7
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 are derived using the wavelet packet transform rather than tractibility where the complete Gaussian mixture density is the short-time Fourier transform. It will be shown that these represented by only the mean vectors, covariance matrices features outperform MFCCs. We attribute this to the compu- and mixture weights from all component densities. tation of subband signals with smooth filters. The effect of filtering as a result of tracing through the low-pass/high-pass IV. FEATURE EXTRACTION USING MODIFIED CANONICAL FORM branches of the wavelet packet tree, is much smoother due to METHOD the balance in time-frequency representation. We believe that Features are the attributes or values extracted to get the this will contribute to improved speech/speaker characteriza- unique characteristics from the image and speech signal. tion over MFCC. Subband Based Cepstral coefficients are derived from subband energies by applying the Discrete Co- A. Palmprint feature extraction methodology sine Transformation: Details of the algorithm are as follows: L 1) Identify hand image from background  n(i  0.5)  SBC (n)   log Si cos   , n  1,...n ' Our designed system is such that palmprint images are i 1  L  captured using contact-less without pegs, keeping the im-                                                                                                    (4) age background relatively uniform and relatively low inten- where n’ is the number of SBC coefficients and L is the total sity when compared to the hand image. Using the statistical number of frequency bands. Because of the similarity to root- information of the background, the algorithm estimates an cepstral [7] analysis, they are termed as subband based adaptive threshold to segment the image of the hand from cepstral coefficients. the background. Pixels with intensity above the threshold are considered to be part of the hand image. Figure 3. Block diagram for Wavelet Packet Transform based feature extraction procedure D. The Gaussian Mixture Model In this study, a Gaussian Mixture Model approach proposed in [8] is used where speakers are modeled as a mixture of Gaussian densities. The use of this model is Figure 4. Schematic diagram of image alignment motivated by the interpretation that the Gaussian components represent some general speaker-dependent spectral shapes and the capability of Gaussian mixtures to model arbitrary densities. The Gausssian Mixture Model is a linear combination of M Gaussian mixture densities, and given by the equation,  M  p( x |  )   pi bi ( x ) (5) i 1   Where x is a D-dimensional random vector, bi ( x) , i=1,...M are the component densities and pi, i=1,…M are the mixture Figure 5. Segmentation of ROI weights. Each component density is a D-dimensional 2)Locate region-of-interest Gaussian function of the form The palm area is extracted from the binary image of the hand. After translating the original image into binary image,  1  1   1    we find two key positioning points in the palmprint image bi ( x )  exp  ( x   )T  ( x   )         (2 ) D / 2 | i |1/ z  2 i  using automatic detecting method. The first valley in the graph is the gaps between little finger and ring finger, Key                                                                                                    (6) Point 1. The third valley in the graph is the gaps between  Where  denotes the mean vector and  i denotes the middle finger and index finger, Key Point 2. The key point is covariance matrix. The mixture weights satisfy the law of total circled in Figure 4. The hand image is rotated by θ degrees. The hand images are rotated to align the hand images into a M predefined direction. θ is calculated using the key points as probability, p i =1. The major advantage of this shown in the Figure 4. Since the size of the original image is i 1 representation of speaker models is the mathematical large, a smaller hand image is cropped out from the original hand image after image alignment using key points. Figure 5 © 2012 ACEEE 78 DOI: 01.IJSIP.03.01.7
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 shows the proposed image alignment and ROI selection The following steps are considered for the feature extraction: method.  Select the palm image for the input  Pre-process the image B. Modified Canonical Form Method  Determine the eigen values and eigen vectors of The “Eigenpalm” method proposed by Turk and Pentland the image [9][10] is based on Karhunen-Loeve Expression and we are  Use the canonical form for the feature extraction. motivated by this work for efficiently representing picture of images. The Eigen method presented by Turk and Pentland C. Euclidean Distance finds the principal components (Karhunen-Loeve Expression) Let an arbitrary instance X be described by the feature of the image distribution or the eigenvectors of the covariance vector matrix of the set of images. These eigenvectors can be thought (13) as set of features, which together characterized between images Where ar(x) denotes the value of the rth attribute of instance x. Let a image I (x, y) be a two dimensional array of intensity Then the distance between two instances xi and xj is defined values or a vector of dimension n. Let the training set of images be I1, I2, I3,…….In. The average image of the set is to be d ( xi , x j ) ; defined by (14) (7) D. Score Normalization Each image differed from the average by the vector. This step brings both matching scores between 0 and 1 (8) [11]. The normalization of both the scores are done by This set of very large vectors is subjected to principal MS Speech  min Speech component analysis which seeks a set of K orthonormal N Speech  (15) vectors Vk, K=1,…...., K and their associated eigenvalues max Speech  min Speech k which best describe the distribution of data. The vectors Vk and scalars k are the eigenvectors and eigenvalues of MS Palm  min Palm N Palm  (16) the covariance matrix: max Palm  min Palm Where minSpeech and maxSpeech are the minimum and maximum (9) scores for speech signal recognition and min Palmprint and maxPalmprint are the corresponding values obtained from Where the matrix finding palmprint trait. the eigenvectors of matrix Cnxn is computationally intensive. E. Generation of Similarity Scores However, the eigenvectors of C can determine by first finding Note that the normalized score of palmprint which is the eigenvectors of much smaller matrix of size NxN and taking obtained through Haar Wavelet gives the information of a linear combination of the resulting vectors [4]. dissimilarity between the feature vectors of two given images The modified canonical method proposed in this paper is while the normalized score from speech signal gives a based on Eigen values and Eigen vectors. These Eigen valves similarity measure. So to fuse both the score, there is a need can be thought a set of features which together characterized to make both the scores as either similarity or dissimilarity between images. measure. In this paper, the normalized score of palmprint is Let be the normalized modal matrix of I, the diagonal matrix converted to similarity measure by is given by ' (10) N Palm  1  N Palm (17) V. FUSION ˆ Vkij Where P  and The biometrics systems are integrated at multi-modality Xi level to improve the performance of the verification system. 2 At multi-modality level, matching score are combined to give X i  sqrt ( Vkij ) , i, j=1,2,3,….n (11) a final score. The following steps are performed for fusion: 1 . Given a query image and speech signal as input, features Then the quadratic form Q is given by are extracted by the individual recognition and then the (12) matching score of each individual trait is calculated. 2 . The weights a and b are calculated using FAR and FRR. 3 . Finally, the final score after combining the matching score © 2012 ACEEE 79 DOI: 01.IJSIP.03.01.7
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 of each trait is calculated by weighted sum of score technique. CONCLUSIONS a  MS Palm  b  MS Speech Biometric systems are widely used to overcome the MS fusion  (18) traditional methods of authentication. But the unimodal 2 biometric system fails in case of biometric data for particular Where a and b are the weights assigned to both the traits. trait. This paper proposes a new method in selecting and The final matching score (MSfusion) is compared against a dividing the ROI for analysis of palmprint. The new method certain threshold value to recognize the person as genuine utilizes the maximum palm region of a person to attain feature or an imposter. extraction. More importantly, it can cope with slight variations, in terms of rotation, translation, and size difference, in images VI. EXPERIMENTAL RESULTS captured from the same person. The experimental results show This section shows the experimental results of our that the performance of palmprint-based unimodal system approach with Modified Canonical method and Subband and speech-based unimodal system fails to meet the based Cepstral coefficients for palmprint and Speech requirement. Fusion at the matching-score level is used to respectively. We evaluate the proposed multimodal system improve the performance of the system. The psychological on a data set including more than 300 subjects taking 6 effects of such multimodal system should also not be different samples, also we have experimented with two disregarded and it is likely that a system using multiple different conditions (Cleaned and Degraded data). The modalities would seem harder to cheat to any potential training database contains a palmprint images and speech impostors. signal for each individual for each subject. In the future we plan to test whether setting the user The comparison of both unimodal systems (palm and specific weights to different modalities can be used to improve speech modality) and a bimodal system is given in Table 1 & a system’s performance. 2. It can be seen that the fusion of palmprint and speech features improves the verification score. The experiments REFERENCES show that EER is reduced to 3.54% in clean database and [1] A. A. Ross, K. Nandakumar, and A. K. Jain. Handbook of 9.17% in degraded database. Multibiomtrics. Springer-Verlag, 2006. [2] Mahesh P.K. and M.N. Shanmukhaswamy. Comprehensive TABLE I. THE FAR AND FRR O F PALMPRINT AND SPEECH SIGNAL IN CLEAN AND DEGRADED C ONDITIONS Framework to Human Recognition Using Palmprint and Speech Signal. In Springer-Verlag Berlin Heideberg 2011. [3] Mahesh P.K. and M.N. Shanmukhaswamy. Integration of multiple cues for human authentication system. In Procedia Computer Science, Volume 2, 2010, Pages 188-194. [4] Jr., J. D., Hansen, J., and Proakis, J. Discrete Time Processing of Speech Signals, second ed. IEEE Press, New York, 2000. [5] O. Rioul and M. Vetterli, “Wavelets and Signal Processing, “IEEE Signal Proc. Magazine, vol. 8(4), pp. 11-38, 1991. [6] D. A. Reynolds and R. C. Rose, “Robust Text_Independent Speaker Identification Using Gaussian Mixture Speaker Models” IEEE Transactions on SAP, vol.3, pp, 72-83, 1995. [7] P. Alexandre and P. Lockwood, “Root cepstral analysis: A unified view: Application to speech processing in car noise environments,” Speech Communication, v.12, pp. 277- 288,1993. TABLE II. T HE FAR AND FRR AFTER FUSION [8] D. A. Reynolds, “Experimental Evaluation of Features for Robust Speaker Identification,” IEEE Transactions on SAP, vol. 2. Pp. 639-643,1994. [9] Turk and A. Pentland, “Face Recognition using Eigenfaces”, in Proceeding of International Conference on Pattern Recognition, pp. 591-1991. [10] Turk and A. Pentland, “Face Recognition using Eigenfaces”, Journals of Cognitive Neuroscience, March 1991. [11] A. K. Jain, K. Nandakumar, & A. Ross, Score Normalization in multimodal biometric systems. The Journal of Pattern Recognition Society, 38(12), 2005, 2270-2285. © 2012 ACEEE 80 DOI: 01.IJSIP.03.01.7