SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                                                International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                    Volume 1, Issue 4, June 2012



                     A Multimodal Biometric System Using
                            Fingerprint and Face
                                         Sona Aggarwal,                                     Yogita Gulati



  Abstract— Biometric identification system, which uses                          knowledge based authentication does not provide sufficient
physical or behavioral features to check a person’s identity,                    security. Biometric system uses physiological or behavioral
ensures much greater security than passwords and number                          characteristics for identification [6]. These characteristics are
systems. Biometric features such as face or fingerprint can be                   unique to each user. It is more reliable and has a higher
stored on a microchip in credit card, for example. A single                      discrimination capability than token based and knowledge-
feature, however, sometimes fails to be exact enough to                          based approaches, because the physiological or behavioral
identification. Another disadvantage of using only one feature is
                                                                                 characteristics are unique for every user. Currently different
that the chosen feature is not always readable; a multi-modal
identification that uses two different features face, and
                                                                                 types of biometric indicators are either widely used or are
fingerprint to identify people. With its two modalities, this                    under intensive evaluation, including face, fingerprint, iris,
achieves much greater accuracy than single-feature systems.                      gait, speech, key-stroke, hand geometry, facial thermo gram,
Even if one modality is somehow disturbed, the ether one                         signature, palm, etc. All these biometric indicators have their
modality still leads to an accurate identification. This article goes            own advantages and disadvantages in terms of the accuracy,
into detail about the use of face and fingerprint modalities for                 user acceptance etc.
identification.                                                                    In order to enable a biometric system to operate effectively
                                                                                 in different applications and environments, a multimodal
                                                                                 biometric system which makes a personal identification based
 Index Terms— Face Recognition, fingerprint Verification,
Performance Evaluation, Decision Fusion, Databases.
                                                                                 on multiple physiological or behavioral characteristics is
                                                                                 preferred. For example, a airport security system application
                            I.   INTRODUCTION                                    where a biometric system is used for passenger authentication
                                                                                 system. If a passenger cannot provide good finger print images
  In recent years, biometric authentication has been
                                                                                 (e.g. due to dust, dry finger, cuts, etc.) then the face may be
considerable improvement in reliability and accuracy, with
                                                                                 better biometric indicator. If the “background” is cluttered,
some of the traits offering better performance. However none
                                                                                 then the face location algorithm, which is necessary for face
of the biometrics are 100% accurate. Multimodal systems [7],
                                                                                 recognition, may not work very well. Then from these two
remove some of the drawbacks of the uni-biometric systems
                                                                                 indicators one of them may produce the accurate result.
by grouping the multiple sources of information. These
                                                                                 Some work on multimodal biometric system has already been
systems utilize more than one physiological or behavioral
characteristic for enrollment and identification/verification.                   replaced in the literature. Dieck mann et. al[5] have proposed
Biometric systems utilizing personal physiological or                            an abstract level fusion scheme: “2-from-3 approach”, which
behavioral characteristics[1] have become widely popular in                      integrate face, lip motion, and voice based on the principle that
providing security for information technology and entry to                       human user multiple clues to identify a person. Brunelli and
sensitive location like airports, governments, finance, health                   Falavian[1] have proposed a measurement level scheme and a
care, military, and any other type of business that connected                    hybrid rank/measurement level scheme to combine the outputs
by a network [4]. In today’s electronically wired information                    of sub-classes. Jain et. al[2] have combining the three
society there are a number of situations e.g., accessing                         indicators Face, Fingerprint, and Speech, which have
multiuser computer system which require an individual, these
                                                                                 sufficient performance to identify authenticated user. Kittler
approaches have a number of significant drawbacks. Tokens
                                                                                 et.al[10] have demonstrated the efficiency of an integration
 may be stolen, lost, forgotten. Passwords may be forgotten or
compromised. All these approaches are unable to differentiate                    strategy which fuses multiple snapshots of a single biometric
between a valid user and an imposter. Therefore, token or                        property using Bayesian framework. Bigun et. al[3] have
                                                                                 proposed a Bayesian integration scheme to combine different
Sona Aggarwal,M.Tech, Research Scholar, Dept. of Comp. Sc. &                     pieces of evidence. Maes et. al[11]have proposed to combine
Engineering, H.C,T,M, Kaithal,Kurukshetra University, India, e-
mail:sonaaggarwal56@yahool.com, M.No. 7206493254.
                                                                                 biometric data (e.g., voice) with non-biometric data (e.g.,
Yogita Gulati, M.Tech, Research Scholar, Dept. of Comp. Sc. & Engineering,       password) .
H.C,T,M,            Kaithal,Kurukshetra      University,     India,     e-
mail:yogitagulati1111@yahool.com, M.no. 9215653212



                                                                                                                                             699
                                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                            Volume 1, Issue 4, June 2012

Multimodal biometric system which integrates face and                   recognition, iii) decision fusion. Fingerprint verification is
fingerprint to make a personal identification[13]. The                  responsible for matching the input fingerprint against the
combination of these two specific biometric traits is based on          fingerprint templates stored in the database to obtain the
the fact they have been used routinely in many communities.             fingerprint matching score. Face verification is responsible for
Most of the successful commercial biometric systems
currently rely on both fingerprint and face. These biometric            matching the input face against the face templates stored in the
indicators complement one another in their advantages and               database to obtain the face matching score. The decision
strengths. While fingerprint provides an extremily high                 fusion integrates the matching scores from fingerprint
verification accurate result, it is difficult for an untrained          verification, face recognition to establish the final decision.
human to match fingerprints. Face, on the other hand, is                The only valid user can access the system.
routinely used by all of us in our daily recognition tasks. Face
and fingerprint verification system is targeted for verification
applications to authenticate the identity claimed by a user such
in a multiuser account authentication. The block diagram of
verification system is shown in figure1, which mainly consists
of four components (i) Acquisition module (ii) enrollment
module (iii) template database (iv) verification module. The
acquisition module is responsible for acquiring data samples


         Identity Claim                                              Enrollment Module

                                                                                    Face Extractor
         Image Acquisition                          Database Browser
         Module
                                                                                    Minutiae Extractor




                                                        Template Database                              Eigenspace
                                                                                                                          Accept/Reject
                                                                                                       Projection &
                                                                                                       HMM Training

                                                        Face Locator                Eigenspace
                                                                                    Comparison
                                                                                                              Decision
                                                                                                              Fusion
                                                        Minutiae                    Minutiae
                                                        Extractor                   Matching

Figure 1: The block diagram of multimodal biometric system
using face and fingerprint.

of face, fingerprints of a user who intends to access the
                                                                                                 II.    FORMULATION
system. The enrollment module is system management which
                                                                          Let β denote a given biometric system, and let ɸ 1, ɸ 2, ….ɸ n
includes user enrollment, training, user update etc. The
                                                                        denote the templates of the n users enrolled in β, who are
template database is a physical database which contains all the         labeled by numerical indicators, 1, 2, 3….n. Assume, for
template records of the user. The verification module is                simplicity, that each enrolled user has only one template (for
responsible for authenticating the identity claimed by a user at        each type of indicator) stored in the system. So the template
the point – of – access. The verification process essentially           for ith user, ɸ i ={ ɸ i1, ɸ i2 }, has two components, where ɸ i1,
consists of three stages: i) Fingerprint verification, ii) face         ɸ i2 are the template for fingerprint and face respectively. Let
                                                                                                                                     700
                                                   All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                             Volume 1, Issue 4, June 2012

(ɸ 0, I) denote the biometric indicator and the identity claimed          fingerprint image and the minutiae matching module
by a user. Again ɸ 0 has two components, ɸ 0 = { ɸ 01, ɸ 12 },            determines the similarity of two minutiae patterns.
corresponding to the measurements of the two biometric                    Let ɸ i1 denote the minutiae pattern extracted from the input
indicators. The claimed identity, I, either belongs to category           fingerprint image with claimed identity I and ɸ i1 the Ith
w1 or category w2, where w1 indicates that the user claims a              fingerprint template stored in the database. The similarity
true identity ( a genuine user ) and w2 that the user claims a            function between an input fingerprint ɸ 01 and a template is
false identity ( an imposter). The biometric system β matches             defined as follows.
ɸ 0 against ɸ 1 to determine which category, w1 or w2 the



                      
claimed identity I falls in, i.e.
                                                                                                            100C 2
                                                                             F     1 , 1            
                                                   
                                                                                     0    I

                          w ,if F  0 1  ,                                1
                                                                                                             PQ
            I             1
                          w2 , otherwise ,                                                                                      0
                                                                                                                                            (2)
                                                                          Where P and Q are the total number of minutiae in ɸ       1   and ɸ i1
                                                              (1)
                                                                          respectively and C is the total number of corresponding
  Where ƒ (ɸ , ɸ ) is a function which measures the similarity
              0   1
                                                                          minutiae pairs between ɸ 01 and ɸ i1 established by the minutiae
between ɸ 0 and ɸ 1 and € is a threshold.
  For a claimed identity I which can be in either w1 or w2, the           matching algorithm [8].
biometric system may determine whether I is in w1 or w2.
Therefore, there are a total of four possible outcomes: (i) a                  B. Face Recognition
claimed identity in w1 is determined to be in w1, (ii) a claimed          Robust face recognition systems are in great demand to help
identity in w1 is determined to be in w2, (iii) a claimed                 fight crime and terrorism. There are two major tasks in face
identity in w2 is determined to be in w1, (iv) a claimed                  recognition (i) face location and, (ii) face recognition. Face
identity in w2 is determined to be in w2. Outcome (I)                     location finds whether there is a face in the input image and if
corresponds to a genuine user being accepted, outcome (ii)                so, the location of the face in the image. Face recognition finds
Outcome (i) corresponds to a genuine user being rejected, (iii)           the similarity between the enrolled face and the stored
corresponds to an imposter being accepted, Outcome (iv)                   templates to determine the identity of the user. In this system,
corresponds to an imposter being rejected. Obviously,                     the eigenspace approach [9] is used.
outcomes (i) and (IV) are correct whereas outcomes (ii) and                 The eigenspace based recognition method is divided into two
(iii) are incorrect. Ideally, a biometric system should make              stages (i) training stage and, (ii) operational stage. In the
only accurate decisions. Due to large intraclass variations in            training stage, a set of orthonormal images that best describe
the acquired digital representation of the biometric indicator            the distribution of the training facial images in a lower
decisions are unavoidable. Typically (i) false acceptance rate            dimensional eigenspace is calculated. Then, the training facial
(FAR) and (ii) false reject rate (FRR) are used to characterize           images are project onto the eigenspace to generate the
the performance of a biometric system. The false acceptance               representation of the facial images in the eigenspace. In the
rate corresponds to the probability of outcome (iv) and the               operational stage a detected facial images is projected onto the
false reject rate is defined as the probability of outcome (ii).          same eigenspace and the similarity between the input facial
The lower the values of the FAR and FRR, the more reliable is             image and the template is, thus calculated in the eigenspace.
the decision made by the system are determined by the                     Let ɸ 02 denote the representation of the input face image with
inherent interclass and the intraclass variations of the indicator        claimed identity I and ɸ i2 denote the representation of the Ith
and the design (e.g., feature extraction, decision making) of             template. The similarity function between ɸ 02 and ɸ i1 is
the system.                                                               defined as follows:
                                                                                      F  0 , 2    2 , 0 ,
                                                                                       2   2
                                                                                                I        I
                                                                                                              2
    A. Fingerprint Verification                                                                                                             (3)

  Fingerprint recognition identifies people by using the                    Where ǁ •‖ denote the L2 norm.
impression made by the minute ridge formations or patterns
                                                                               C. Decision Fusion
found on the fingertips. Fingerprinting takes an image of a
person’s fingertips and records its characteristics – whorls,
                                                                            The final decision made by the system is based on
arches and loops are recorded along with patterns of ridges,
                                                                          integration of the decisions made by the fingerprint
furrows and minutiae. Information is processed as an image
                                                                          verification module, the face recognition module. If the output
and further encoded as a computer algorithm. The two most
                                                                          module of each level is category based, either W1 (claimed
prominent ridge characteristics, called minutiae are (i) ridge
                                                                          identity is true) or W2 (claimed identity is false). Which is not
ending and, (ii) ridge bifurcation. Fingerprint verification
                                                                          associated with any confidence, then the integration of these
depends on the comparison of minutiae and their relationships
                                                                          multiple decisions can only be performed at an abstract level,
to make a personal identification. This usually consists of two
                                                                          in which a majority rule can be employed to reach a more
stages [8]. (i) Minutiae extraction and (ii) minutiae matching.
                                                                          reliable decision [12]. If the output of each module is similar
The minutiae extraction module extracts minutiae from input
                                                                          value, then more accurate decisions can be made at a rank

                                                                                                                                           701
                                                     All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                           International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                               Volume 1, Issue 4, June 2012

level or at measurement level by accumulating associated with              biometrics with the restriction that fingers be placed
each individual decision.                                                  approximately at the center of the scanner and the orientation
  Let X1, X2 be the random variables used to indicate the                  of fingers be within 900. The face images were acquired using
similarity (dissimilarity) between an input and a template for             a Panasonic video camera under normal indoor lighting
fingerprint verification, face recognition respectively. Let Pj            conditions. The rotation of the face was restricted to [-250,
(Xj|Wi), where j=1, 2 and i = 1, 2 be the class- conditional               +250] and the scaling factor was allowed to be in the internal
probability density functions of X1, X2. Assume that X1, X2                [0.90, 1.10]. Examples of acquired fingerprint images and face
are statically independent. Then, the joint class- conditional             images are shown in figure 2. A test database involving 25
probability density function X1 and X2 has the following                   users (a subset of the 30 users in the training set) that were
form:                                                                      available during the second round of data, collection was
                                                                           collected . For each user, 15 fingerprint images

      P  X 1 , X 2 wi    Pj  X j wi  , i  1, 2
                            2


                            j 1
                                                               (4)

  Depending on the application requirement on verification
accuracy, any one of a number of different statistical decision
theory frameworks can be used. In biometrics, the
performance requirements usually specified in terms of the
FAR. In this case, the decision fusion scheme should establish
a decision boundary which satisfies the FAR and minimizes
the FRR. Let R2 denote two dimensional space spanned by
(X1, X2); R21 and R22 denote the W1 region and W2 region
respectively (R21+ R22) ; ϵ 0 denote the pre specified FAR.
According to the Neyman Pearson rule, a given observation,                  (a total of 375 images), 10 face images (a total of 250
X0 = (X01, X02), is classified as:                                         samples) were collected.
                                                                             The receiver operating curve of face recognition, and
                    w1 ,if P  X10 , X 2
                             1
                                        0
                                               w1    >                   fingerprint verification are plotted in figure 3, in which the
   X 10 , X 2    w2 ,otherwise, ,X 2
                            P  X1                  
                                  0     0
             0                                 w2                          authentic acceptance rate (percentage) of genuine user being
                   
                             2

                                                                           accepted, i.e. , 1- FRR) is plotted against FAR. We can
                   
                                                              (5)
                                                                           conclude from this test the integration of fingerprints and face
                                                                           leads to an improvement in verification performance.
 Where λ is the minimum value that satisfies the following:

                  P  X 1 , X 2 w1 
                                                                                IV. CONCLUSION

         
                   1
                                       and                                   In this paper the integration of face and fingerprint are
                  P  X 1 , X 2 w2 
                   2                                                       discussed. The unimodal biometric system where one
                                                              (6)          biometric trait is used not produced the accurate result. The
                                                                           combination of more than one biometric trait is multimodal
                                                                           that produces the efficient result. If one biometric trait is fail
 0        R1   P  X 1 , X 2 w2 dX 1dX 2
                   2
                                                                           to identify the person then the other biometric trait is useful.
                                                              (7)          By combining multiple biometric traits, the performance of
                                                                           biometric system can be improved. The multimodal biometrics
    III. PERFORMANCE EVALUATION                                            is very popular in these days due to its performance and
                                                                           advance level of security. Though some complexity also exists
  The performance benchmark assesses the capability of the                 in multimodal system which reduces its acceptability in many
system at the point of identification, which depends how the               areas.
system is used, how the users cooperate with the system, how
the system produce the accurate result etc, . A test which                                                 REFERENCES
                                                                                [1]. Jain, A.K., Bolle, R., Pankanti, S., eds: Biometrics Personal
simulates the operating environment is needed to access the                          identification in Networked security. Kluwer Academic Publishers
performance benchmark of an implemented system. We have                              (1999).
evaluated the performance of face and fingerprint recognition                   [2]. Anil Jain, Lin Hong, Yatin Kulkarni: A Multimodal Biometric
                                                                                     System using Fingerprint, Face, and Speech , East cansina, MI
on a small piece of data                                                             48824-1226.
  A. Databases                                                                  [3]. E.S. Bigun, J.Bigun, B.Duc, and S.Fischer.Expert Conciliation for
  A training database of fingerprints and faces of 30 users                          multimodal person authentication systems by Baysian statistics. In
                                                                                     proc, 1st international conf. on audio video-based personal
collected. For each user, 10 fingerprint images (a total 300                         authentication, pages 327-334, crans-montana Switzerland, march
images), 10 face images (a total 300 images), were acquired                          1997.
using an optical fingerprint scanner manufactured by digital
                                                                                                                                                 702
                                                     All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                         Volume 1, Issue 4, June 2012

     [4]. Multimodal biometric identification for large user population using
           fingerprint, face and iris recognition. IEEE print ISBN-0-7695-
           2479-6.
     [5]. U. Dieckman P. Plankensteiner, and T. Wagner Sesam: A
           biometric person identification system using sensor fusion, pattern
           recognition letters, 18(9) : 827-833, 1997.
     [6]. A. Jain, R. Bolle, and S. Pankanti, biometrics: Personal
           identification is networked society, Kluwer Academic Published,
           Boston, 1998.
     [7]. A.K. Jain and A.Ross, “ Multibiometric Systems”, communications
           of the ACM, 47(1), pp. 34 - 40, 2004.
     [8]. A. Jain, L. Hong, and R. Bolle. On-line finger-print verification.
           IEEE Trans. Pattern Anal. And Machine Intell., 19(4) :302-314,
           1997.
     [9]. M. Kirby and L. Sirvich. Application of the Karhunen-Loeve
           procedure for the characteristics of human faces. IEEE Trans.
           PAMI, 12(1) : 103-108, 1990.
     [10]. J. Kittler, Y. Li, J. Mates and M.U. Sanchez Combiniy evidence in
           multimodal personal identity recognition system. In pros, 1st
           international conf. on audio video-based personal authentication,
           pages 327-334, crans-montana Switzerland, march 1997.
     [11]. S. Maes and H. Beigi. Open sesame! Speech, password or key to
           secure your door? In Proc. 3rd Asian Conference on Computer
           Vision, pages 531-541, Hong Kong, China, 1998.
     [12]. Y.A.Zuev and S.K. Ivanov. The voting as a way to increase the
           decision reliability. In Proc. Foundations of Information/Decision
           Fusion with Applications to Engineering Problems, pages 206-210,
           Washington, D.C., August 1996.
     [13]. L. Hong and a. Jain. Integrating faces and fingerprints for personal
           identification. In proc.




      Sona Aggarwal is pursuing her M.Tech
  in Computer Science and Engineering
 fromHaryana College of Technology &
 Management, Kaithal. She obtained her
 Master in Computer Application Degree
 from     Punjab     Technical     University,
Jalandhar in 2009.


   Yogita Gulati is pursuing her M.Tech
in Computer Science and Engineering
from Haryana College Of Technology &
Management, Kaithal. She obtained her
Bachelor of Technology degree in
computer science and engineering from
N.C.C.E, Israna in 2010.




                                                                                                                                                703
                                                               All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

(2009) Effect of human-biometric sensor interaction on fingerprint matching p...
(2009) Effect of human-biometric sensor interaction on fingerprint matching p...(2009) Effect of human-biometric sensor interaction on fingerprint matching p...
(2009) Effect of human-biometric sensor interaction on fingerprint matching p...International Center for Biometric Research
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...Alexander Decker
 
2.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 202.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 20Alexander Decker
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...International Center for Biometric Research
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 

Tendances (18)

(2009) Effect of human-biometric sensor interaction on fingerprint matching p...
(2009) Effect of human-biometric sensor interaction on fingerprint matching p...(2009) Effect of human-biometric sensor interaction on fingerprint matching p...
(2009) Effect of human-biometric sensor interaction on fingerprint matching p...
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
 
2.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 202.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 20
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
A04820104
A04820104A04820104
A04820104
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
 
G0333946
G0333946G0333946
G0333946
 

En vedette (9)

22 27
22 2722 27
22 27
 
18 23
18 2318 23
18 23
 
106 110
106 110106 110
106 110
 
51 59
51 5951 59
51 59
 
213 221
213 221213 221
213 221
 
331 340
331 340331 340
331 340
 
172 179
172 179172 179
172 179
 
134 138
134 138134 138
134 138
 
158 162
158 162158 162
158 162
 

Similaire à 699 703

(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...International Center for Biometric Research
 
(2007) The impact of fingerprint force on image quality and the detection of ...
(2007) The impact of fingerprint force on image quality and the detection of ...(2007) The impact of fingerprint force on image quality and the detection of ...
(2007) The impact of fingerprint force on image quality and the detection of ...International Center for Biometric Research
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET Journal
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSOVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSAM Publications
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...ijtsrd
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...International Center for Biometric Research
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 

Similaire à 699 703 (20)

(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
Pdf1
Pdf1Pdf1
Pdf1
 
(2007) The impact of fingerprint force on image quality and the detection of ...
(2007) The impact of fingerprint force on image quality and the detection of ...(2007) The impact of fingerprint force on image quality and the detection of ...
(2007) The impact of fingerprint force on image quality and the detection of ...
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of Fingerprint
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSOVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
(2009) Statistical Analysis Of Fingerprint Sensor Interoperability
(2009) Statistical Analysis Of Fingerprint Sensor Interoperability(2009) Statistical Analysis Of Fingerprint Sensor Interoperability
(2009) Statistical Analysis Of Fingerprint Sensor Interoperability
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric System
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

699 703

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 A Multimodal Biometric System Using Fingerprint and Face Sona Aggarwal, Yogita Gulati Abstract— Biometric identification system, which uses knowledge based authentication does not provide sufficient physical or behavioral features to check a person’s identity, security. Biometric system uses physiological or behavioral ensures much greater security than passwords and number characteristics for identification [6]. These characteristics are systems. Biometric features such as face or fingerprint can be unique to each user. It is more reliable and has a higher stored on a microchip in credit card, for example. A single discrimination capability than token based and knowledge- feature, however, sometimes fails to be exact enough to based approaches, because the physiological or behavioral identification. Another disadvantage of using only one feature is characteristics are unique for every user. Currently different that the chosen feature is not always readable; a multi-modal identification that uses two different features face, and types of biometric indicators are either widely used or are fingerprint to identify people. With its two modalities, this under intensive evaluation, including face, fingerprint, iris, achieves much greater accuracy than single-feature systems. gait, speech, key-stroke, hand geometry, facial thermo gram, Even if one modality is somehow disturbed, the ether one signature, palm, etc. All these biometric indicators have their modality still leads to an accurate identification. This article goes own advantages and disadvantages in terms of the accuracy, into detail about the use of face and fingerprint modalities for user acceptance etc. identification. In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system which makes a personal identification based Index Terms— Face Recognition, fingerprint Verification, Performance Evaluation, Decision Fusion, Databases. on multiple physiological or behavioral characteristics is preferred. For example, a airport security system application I. INTRODUCTION where a biometric system is used for passenger authentication system. If a passenger cannot provide good finger print images In recent years, biometric authentication has been (e.g. due to dust, dry finger, cuts, etc.) then the face may be considerable improvement in reliability and accuracy, with better biometric indicator. If the “background” is cluttered, some of the traits offering better performance. However none then the face location algorithm, which is necessary for face of the biometrics are 100% accurate. Multimodal systems [7], recognition, may not work very well. Then from these two remove some of the drawbacks of the uni-biometric systems indicators one of them may produce the accurate result. by grouping the multiple sources of information. These Some work on multimodal biometric system has already been systems utilize more than one physiological or behavioral characteristic for enrollment and identification/verification. replaced in the literature. Dieck mann et. al[5] have proposed Biometric systems utilizing personal physiological or an abstract level fusion scheme: “2-from-3 approach”, which behavioral characteristics[1] have become widely popular in integrate face, lip motion, and voice based on the principle that providing security for information technology and entry to human user multiple clues to identify a person. Brunelli and sensitive location like airports, governments, finance, health Falavian[1] have proposed a measurement level scheme and a care, military, and any other type of business that connected hybrid rank/measurement level scheme to combine the outputs by a network [4]. In today’s electronically wired information of sub-classes. Jain et. al[2] have combining the three society there are a number of situations e.g., accessing indicators Face, Fingerprint, and Speech, which have multiuser computer system which require an individual, these sufficient performance to identify authenticated user. Kittler approaches have a number of significant drawbacks. Tokens et.al[10] have demonstrated the efficiency of an integration may be stolen, lost, forgotten. Passwords may be forgotten or compromised. All these approaches are unable to differentiate strategy which fuses multiple snapshots of a single biometric between a valid user and an imposter. Therefore, token or property using Bayesian framework. Bigun et. al[3] have proposed a Bayesian integration scheme to combine different Sona Aggarwal,M.Tech, Research Scholar, Dept. of Comp. Sc. & pieces of evidence. Maes et. al[11]have proposed to combine Engineering, H.C,T,M, Kaithal,Kurukshetra University, India, e- mail:sonaaggarwal56@yahool.com, M.No. 7206493254. biometric data (e.g., voice) with non-biometric data (e.g., Yogita Gulati, M.Tech, Research Scholar, Dept. of Comp. Sc. & Engineering, password) . H.C,T,M, Kaithal,Kurukshetra University, India, e- mail:yogitagulati1111@yahool.com, M.no. 9215653212 699 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Multimodal biometric system which integrates face and recognition, iii) decision fusion. Fingerprint verification is fingerprint to make a personal identification[13]. The responsible for matching the input fingerprint against the combination of these two specific biometric traits is based on fingerprint templates stored in the database to obtain the the fact they have been used routinely in many communities. fingerprint matching score. Face verification is responsible for Most of the successful commercial biometric systems currently rely on both fingerprint and face. These biometric matching the input face against the face templates stored in the indicators complement one another in their advantages and database to obtain the face matching score. The decision strengths. While fingerprint provides an extremily high fusion integrates the matching scores from fingerprint verification accurate result, it is difficult for an untrained verification, face recognition to establish the final decision. human to match fingerprints. Face, on the other hand, is The only valid user can access the system. routinely used by all of us in our daily recognition tasks. Face and fingerprint verification system is targeted for verification applications to authenticate the identity claimed by a user such in a multiuser account authentication. The block diagram of verification system is shown in figure1, which mainly consists of four components (i) Acquisition module (ii) enrollment module (iii) template database (iv) verification module. The acquisition module is responsible for acquiring data samples Identity Claim Enrollment Module Face Extractor Image Acquisition Database Browser Module Minutiae Extractor Template Database Eigenspace Accept/Reject Projection & HMM Training Face Locator Eigenspace Comparison Decision Fusion Minutiae Minutiae Extractor Matching Figure 1: The block diagram of multimodal biometric system using face and fingerprint. of face, fingerprints of a user who intends to access the II. FORMULATION system. The enrollment module is system management which Let β denote a given biometric system, and let ɸ 1, ɸ 2, ….ɸ n includes user enrollment, training, user update etc. The denote the templates of the n users enrolled in β, who are template database is a physical database which contains all the labeled by numerical indicators, 1, 2, 3….n. Assume, for template records of the user. The verification module is simplicity, that each enrolled user has only one template (for responsible for authenticating the identity claimed by a user at each type of indicator) stored in the system. So the template the point – of – access. The verification process essentially for ith user, ɸ i ={ ɸ i1, ɸ i2 }, has two components, where ɸ i1, consists of three stages: i) Fingerprint verification, ii) face ɸ i2 are the template for fingerprint and face respectively. Let 700 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 (ɸ 0, I) denote the biometric indicator and the identity claimed fingerprint image and the minutiae matching module by a user. Again ɸ 0 has two components, ɸ 0 = { ɸ 01, ɸ 12 }, determines the similarity of two minutiae patterns. corresponding to the measurements of the two biometric Let ɸ i1 denote the minutiae pattern extracted from the input indicators. The claimed identity, I, either belongs to category fingerprint image with claimed identity I and ɸ i1 the Ith w1 or category w2, where w1 indicates that the user claims a fingerprint template stored in the database. The similarity true identity ( a genuine user ) and w2 that the user claims a function between an input fingerprint ɸ 01 and a template is false identity ( an imposter). The biometric system β matches defined as follows. ɸ 0 against ɸ 1 to determine which category, w1 or w2 the  claimed identity I falls in, i.e. 100C 2 F  1 , 1     0 I w ,if F  0 1  , 1 PQ I 1 w2 , otherwise , 0 (2) Where P and Q are the total number of minutiae in ɸ 1 and ɸ i1 (1) respectively and C is the total number of corresponding Where ƒ (ɸ , ɸ ) is a function which measures the similarity 0 1 minutiae pairs between ɸ 01 and ɸ i1 established by the minutiae between ɸ 0 and ɸ 1 and € is a threshold. For a claimed identity I which can be in either w1 or w2, the matching algorithm [8]. biometric system may determine whether I is in w1 or w2. Therefore, there are a total of four possible outcomes: (i) a B. Face Recognition claimed identity in w1 is determined to be in w1, (ii) a claimed Robust face recognition systems are in great demand to help identity in w1 is determined to be in w2, (iii) a claimed fight crime and terrorism. There are two major tasks in face identity in w2 is determined to be in w1, (iv) a claimed recognition (i) face location and, (ii) face recognition. Face identity in w2 is determined to be in w2. Outcome (I) location finds whether there is a face in the input image and if corresponds to a genuine user being accepted, outcome (ii) so, the location of the face in the image. Face recognition finds Outcome (i) corresponds to a genuine user being rejected, (iii) the similarity between the enrolled face and the stored corresponds to an imposter being accepted, Outcome (iv) templates to determine the identity of the user. In this system, corresponds to an imposter being rejected. Obviously, the eigenspace approach [9] is used. outcomes (i) and (IV) are correct whereas outcomes (ii) and The eigenspace based recognition method is divided into two (iii) are incorrect. Ideally, a biometric system should make stages (i) training stage and, (ii) operational stage. In the only accurate decisions. Due to large intraclass variations in training stage, a set of orthonormal images that best describe the acquired digital representation of the biometric indicator the distribution of the training facial images in a lower decisions are unavoidable. Typically (i) false acceptance rate dimensional eigenspace is calculated. Then, the training facial (FAR) and (ii) false reject rate (FRR) are used to characterize images are project onto the eigenspace to generate the the performance of a biometric system. The false acceptance representation of the facial images in the eigenspace. In the rate corresponds to the probability of outcome (iv) and the operational stage a detected facial images is projected onto the false reject rate is defined as the probability of outcome (ii). same eigenspace and the similarity between the input facial The lower the values of the FAR and FRR, the more reliable is image and the template is, thus calculated in the eigenspace. the decision made by the system are determined by the Let ɸ 02 denote the representation of the input face image with inherent interclass and the intraclass variations of the indicator claimed identity I and ɸ i2 denote the representation of the Ith and the design (e.g., feature extraction, decision making) of template. The similarity function between ɸ 02 and ɸ i1 is the system. defined as follows: F  0 , 2    2 , 0 , 2 2 I I 2 A. Fingerprint Verification (3) Fingerprint recognition identifies people by using the Where ǁ •‖ denote the L2 norm. impression made by the minute ridge formations or patterns C. Decision Fusion found on the fingertips. Fingerprinting takes an image of a person’s fingertips and records its characteristics – whorls, The final decision made by the system is based on arches and loops are recorded along with patterns of ridges, integration of the decisions made by the fingerprint furrows and minutiae. Information is processed as an image verification module, the face recognition module. If the output and further encoded as a computer algorithm. The two most module of each level is category based, either W1 (claimed prominent ridge characteristics, called minutiae are (i) ridge identity is true) or W2 (claimed identity is false). Which is not ending and, (ii) ridge bifurcation. Fingerprint verification associated with any confidence, then the integration of these depends on the comparison of minutiae and their relationships multiple decisions can only be performed at an abstract level, to make a personal identification. This usually consists of two in which a majority rule can be employed to reach a more stages [8]. (i) Minutiae extraction and (ii) minutiae matching. reliable decision [12]. If the output of each module is similar The minutiae extraction module extracts minutiae from input value, then more accurate decisions can be made at a rank 701 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 level or at measurement level by accumulating associated with biometrics with the restriction that fingers be placed each individual decision. approximately at the center of the scanner and the orientation Let X1, X2 be the random variables used to indicate the of fingers be within 900. The face images were acquired using similarity (dissimilarity) between an input and a template for a Panasonic video camera under normal indoor lighting fingerprint verification, face recognition respectively. Let Pj conditions. The rotation of the face was restricted to [-250, (Xj|Wi), where j=1, 2 and i = 1, 2 be the class- conditional +250] and the scaling factor was allowed to be in the internal probability density functions of X1, X2. Assume that X1, X2 [0.90, 1.10]. Examples of acquired fingerprint images and face are statically independent. Then, the joint class- conditional images are shown in figure 2. A test database involving 25 probability density function X1 and X2 has the following users (a subset of the 30 users in the training set) that were form: available during the second round of data, collection was collected . For each user, 15 fingerprint images P  X 1 , X 2 wi    Pj  X j wi  , i  1, 2 2 j 1 (4) Depending on the application requirement on verification accuracy, any one of a number of different statistical decision theory frameworks can be used. In biometrics, the performance requirements usually specified in terms of the FAR. In this case, the decision fusion scheme should establish a decision boundary which satisfies the FAR and minimizes the FRR. Let R2 denote two dimensional space spanned by (X1, X2); R21 and R22 denote the W1 region and W2 region respectively (R21+ R22) ; ϵ 0 denote the pre specified FAR. According to the Neyman Pearson rule, a given observation, (a total of 375 images), 10 face images (a total of 250 X0 = (X01, X02), is classified as: samples) were collected. The receiver operating curve of face recognition, and  w1 ,if P  X10 , X 2 1 0 w1  > fingerprint verification are plotted in figure 3, in which the  X 10 , X 2    w2 ,otherwise, ,X 2 P  X1  0 0 0 w2 authentic acceptance rate (percentage) of genuine user being  2 accepted, i.e. , 1- FRR) is plotted against FAR. We can   (5) conclude from this test the integration of fingerprints and face leads to an improvement in verification performance. Where λ is the minimum value that satisfies the following: P  X 1 , X 2 w1  IV. CONCLUSION  1 and In this paper the integration of face and fingerprint are P  X 1 , X 2 w2  2 discussed. The unimodal biometric system where one (6) biometric trait is used not produced the accurate result. The combination of more than one biometric trait is multimodal that produces the efficient result. If one biometric trait is fail 0   R1 P  X 1 , X 2 w2 dX 1dX 2 2 to identify the person then the other biometric trait is useful. (7) By combining multiple biometric traits, the performance of biometric system can be improved. The multimodal biometrics III. PERFORMANCE EVALUATION is very popular in these days due to its performance and advance level of security. Though some complexity also exists The performance benchmark assesses the capability of the in multimodal system which reduces its acceptability in many system at the point of identification, which depends how the areas. system is used, how the users cooperate with the system, how the system produce the accurate result etc, . A test which REFERENCES [1]. Jain, A.K., Bolle, R., Pankanti, S., eds: Biometrics Personal simulates the operating environment is needed to access the identification in Networked security. Kluwer Academic Publishers performance benchmark of an implemented system. We have (1999). evaluated the performance of face and fingerprint recognition [2]. Anil Jain, Lin Hong, Yatin Kulkarni: A Multimodal Biometric System using Fingerprint, Face, and Speech , East cansina, MI on a small piece of data 48824-1226. A. Databases [3]. E.S. Bigun, J.Bigun, B.Duc, and S.Fischer.Expert Conciliation for A training database of fingerprints and faces of 30 users multimodal person authentication systems by Baysian statistics. In proc, 1st international conf. on audio video-based personal collected. For each user, 10 fingerprint images (a total 300 authentication, pages 327-334, crans-montana Switzerland, march images), 10 face images (a total 300 images), were acquired 1997. using an optical fingerprint scanner manufactured by digital 702 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [4]. Multimodal biometric identification for large user population using fingerprint, face and iris recognition. IEEE print ISBN-0-7695- 2479-6. [5]. U. Dieckman P. Plankensteiner, and T. Wagner Sesam: A biometric person identification system using sensor fusion, pattern recognition letters, 18(9) : 827-833, 1997. [6]. A. Jain, R. Bolle, and S. Pankanti, biometrics: Personal identification is networked society, Kluwer Academic Published, Boston, 1998. [7]. A.K. Jain and A.Ross, “ Multibiometric Systems”, communications of the ACM, 47(1), pp. 34 - 40, 2004. [8]. A. Jain, L. Hong, and R. Bolle. On-line finger-print verification. IEEE Trans. Pattern Anal. And Machine Intell., 19(4) :302-314, 1997. [9]. M. Kirby and L. Sirvich. Application of the Karhunen-Loeve procedure for the characteristics of human faces. IEEE Trans. PAMI, 12(1) : 103-108, 1990. [10]. J. Kittler, Y. Li, J. Mates and M.U. Sanchez Combiniy evidence in multimodal personal identity recognition system. In pros, 1st international conf. on audio video-based personal authentication, pages 327-334, crans-montana Switzerland, march 1997. [11]. S. Maes and H. Beigi. Open sesame! Speech, password or key to secure your door? In Proc. 3rd Asian Conference on Computer Vision, pages 531-541, Hong Kong, China, 1998. [12]. Y.A.Zuev and S.K. Ivanov. The voting as a way to increase the decision reliability. In Proc. Foundations of Information/Decision Fusion with Applications to Engineering Problems, pages 206-210, Washington, D.C., August 1996. [13]. L. Hong and a. Jain. Integrating faces and fingerprints for personal identification. In proc. Sona Aggarwal is pursuing her M.Tech in Computer Science and Engineering fromHaryana College of Technology & Management, Kaithal. She obtained her Master in Computer Application Degree from Punjab Technical University, Jalandhar in 2009. Yogita Gulati is pursuing her M.Tech in Computer Science and Engineering from Haryana College Of Technology & Management, Kaithal. She obtained her Bachelor of Technology degree in computer science and engineering from N.C.C.E, Israna in 2010. 703 All Rights Reserved © 2012 IJARCET