SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
A survey paper on various biometric security system methods
Signaler
Partager
IRJET Journal
Fast Track Publications
Suivre
•
0 j'aime
•
49 vues
Ingénierie
https://irjet.net/archives/V3/i2/IRJET-V3I2226.pdf
Lire la suite
A survey paper on various biometric security system methods
•
0 j'aime
•
49 vues
IRJET Journal
Fast Track Publications
Suivre
Signaler
Partager
Ingénierie
https://irjet.net/archives/V3/i2/IRJET-V3I2226.pdf
Lire la suite
A survey paper on various biometric security system methods
1 sur 3
Télécharger maintenant
Recommandé
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for... par
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
106 vues
•
7 diapositives
Scale Invariant Feature Transform Based Face Recognition from a Single Sample... par
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
377 vues
•
7 diapositives
Internation Journal Conference par
Internation Journal Conference
Hemanth Kumar
283 vues
•
6 diapositives
IRJET- Automated Criminal Identification System using Face Detection and Reco... par
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET Journal
303 vues
•
5 diapositives
“Enhancing Iris Scanning Using Visual Cryptography” par
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
269 vues
•
4 diapositives
184 par
184
vivatechijri
16 vues
•
5 diapositives
Contenu connexe
Tendances
Bw33449453 par
Bw33449453
IJERA Editor
441 vues
•
5 diapositives
Security for Identity Based Identification using Water Marking and Visual Cry... par
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
45 vues
•
7 diapositives
M phil-computer-science-biometric-system-projects par
M phil-computer-science-biometric-system-projects
Vijay Karan
173 vues
•
3 diapositives
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm par
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
28 vues
•
20 diapositives
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel... par
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
468 vues
•
8 diapositives
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N... par
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
CSCJournals
236 vues
•
8 diapositives
Tendances
(18)
Bw33449453 par IJERA Editor
Bw33449453
IJERA Editor
•
441 vues
Security for Identity Based Identification using Water Marking and Visual Cry... par IRJET Journal
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
•
45 vues
M phil-computer-science-biometric-system-projects par Vijay Karan
M phil-computer-science-biometric-system-projects
Vijay Karan
•
173 vues
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm par IJECEIAES
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
•
28 vues
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel... par IJERD Editor
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
•
468 vues
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N... par CSCJournals
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
CSCJournals
•
236 vues
An overview of face liveness detection par ijitjournal
An overview of face liveness detection
ijitjournal
•
867 vues
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices par IRJET Journal
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal
•
17 vues
IRJET - A Survey on Biometric Voting System using Iris Recognition par IRJET Journal
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal
•
13 vues
IRJET- Advanced Two Factor Authentication using Image Processing par IRJET Journal
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal
•
33 vues
International Journal of Engineering and Science Invention (IJESI) par inventionjournals
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
•
249 vues
Highly Secured Bio-Metric Authentication Model with Palm Print Identification par IJERA Editor
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
•
57 vues
A Study of Iris Recognition par editor1knowledgecuddle
A Study of Iris Recognition
editor1knowledgecuddle
•
248 vues
AI Approach for Iris Biometric Recognition Using a Median Filter par NIDHI SHARMA
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
•
19 vues
An embedded finger vein recognition system par eSAT Publishing House
An embedded finger vein recognition system
eSAT Publishing House
•
465 vues
Ieeepro techno solutions ieee embedded project secure and robust iris recog... par srinivasanece7
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
srinivasanece7
•
286 vues
IRJET - Chatbot with Gesture based User Input par IRJET Journal
IRJET - Chatbot with Gesture based User Input
IRJET Journal
•
19 vues
IRJET- Free & Generic Facial Attendance System using Android par IRJET Journal
IRJET- Free & Generic Facial Attendance System using Android
IRJET Journal
•
25 vues
Similaire à A survey paper on various biometric security system methods
Bw33449453 par
Bw33449453
IJERA Editor
312 vues
•
5 diapositives
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB par
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
9 vues
•
47 diapositives
I017335457 par
I017335457
IOSR Journals
127 vues
•
4 diapositives
Biometric.docx par
Biometric.docx
ShubhamYadav769267
3 vues
•
18 diapositives
D56021216 par
D56021216
IJERA Editor
139 vues
•
5 diapositives
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem par
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor
198 vues
•
5 diapositives
Similaire à A survey paper on various biometric security system methods
(20)
Bw33449453 par IJERA Editor
Bw33449453
IJERA Editor
•
312 vues
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB par Maria Perkins
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
•
9 vues
I017335457 par IOSR Journals
I017335457
IOSR Journals
•
127 vues
Biometric.docx par ShubhamYadav769267
Biometric.docx
ShubhamYadav769267
•
3 vues
D56021216 par IJERA Editor
D56021216
IJERA Editor
•
139 vues
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem par IJERA Editor
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor
•
198 vues
8 g iris-recognition_system par sukanya thatamsetty
8 g iris-recognition_system
sukanya thatamsetty
•
1.9K vues
A comparison of multiple wavelet algorithms for iris recognition 2 par IAEME Publication
A comparison of multiple wavelet algorithms for iris recognition 2
IAEME Publication
•
838 vues
Criminal Face Identification par IRJET Journal
Criminal Face Identification
IRJET Journal
•
45 vues
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection par IRJET Journal
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
•
64 vues
Iris Biometric Based Person Identification Using Deep Learning Technique par IRJET Journal
Iris Biometric Based Person Identification Using Deep Learning Technique
IRJET Journal
•
6 vues
A04820104 par IOSR-JEN
A04820104
IOSR-JEN
•
263 vues
Face Recognition Smart Attendance System: (InClass System) par IRJET Journal
Face Recognition Smart Attendance System: (InClass System)
IRJET Journal
•
13 vues
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME... par IJNSA Journal
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
•
501 vues
Intelligent multimodal identification system based on local feature fusion be... par nooriasukmaningtyas
Intelligent multimodal identification system based on local feature fusion be...
nooriasukmaningtyas
•
3 vues
Biometric Iris Recognition Based on Hybrid Technique par ijsc
Biometric Iris Recognition Based on Hybrid Technique
ijsc
•
4 vues
IRJET-Human Face Detection and Identification using Deep Metric Learning par IRJET Journal
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
•
28 vues
Paper id 25201496 par IJRAT
Paper id 25201496
IJRAT
•
289 vues
IRJET- Survey of Iris Recognition Techniques par IRJET Journal
IRJET- Survey of Iris Recognition Techniques
IRJET Journal
•
53 vues
Advanced Authentication Scheme using Multimodal Biometric Scheme par Editor IJCATR
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR
•
455 vues
Plus de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL par
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
19 vues
•
7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vues
•
7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
7 vues
•
5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vues
•
11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vues
•
6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vues
•
5 diapositives
Plus de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL par IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
19 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
7 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vues
Heart Failure Prediction using Different Machine Learning Techniques par IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel par IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vues
Metro Development and Pedestrian Concerns par IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... par IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vues
Data Analytics and Artificial Intelligence in Healthcare Industry par IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... par IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
36 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... par IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 vues
Development of Effective Tomato Package for Post-Harvest Preservation par IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” par IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vues
Understanding the Nature of Consciousness with AI par IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada par IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... par IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vues
Enhancing Real Time Communication and Efficiency With Websocket par IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
4 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... par IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vues
Dernier
What is Unit Testing par
What is Unit Testing
Sadaaki Emura
23 vues
•
25 diapositives
LFA-NPG-Paper.pdf par
LFA-NPG-Paper.pdf
harinsrikanth
40 vues
•
13 diapositives
MSA Website Slideshow (16).pdf par
MSA Website Slideshow (16).pdf
msaucla
46 vues
•
8 diapositives
SWM L1-L14_drhasan (Part 1).pdf par
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
48 vues
•
150 diapositives
How I learned to stop worrying and love the dark silicon apocalypse.pdf par
How I learned to stop worrying and love the dark silicon apocalypse.pdf
Tomasz Kowalczewski
24 vues
•
66 diapositives
SWM L15-L28_drhasan (Part 2).pdf par
SWM L15-L28_drhasan (Part 2).pdf
MahmudHasan747870
28 vues
•
93 diapositives
Dernier
(20)
What is Unit Testing par Sadaaki Emura
What is Unit Testing
Sadaaki Emura
•
23 vues
LFA-NPG-Paper.pdf par harinsrikanth
LFA-NPG-Paper.pdf
harinsrikanth
•
40 vues
MSA Website Slideshow (16).pdf par msaucla
MSA Website Slideshow (16).pdf
msaucla
•
46 vues
SWM L1-L14_drhasan (Part 1).pdf par MahmudHasan747870
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
•
48 vues
How I learned to stop worrying and love the dark silicon apocalypse.pdf par Tomasz Kowalczewski
How I learned to stop worrying and love the dark silicon apocalypse.pdf
Tomasz Kowalczewski
•
24 vues
SWM L15-L28_drhasan (Part 2).pdf par MahmudHasan747870
SWM L15-L28_drhasan (Part 2).pdf
MahmudHasan747870
•
28 vues
NEW SUPPLIERS SUPPLIES (copie).pdf par georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou
•
14 vues
Wire Rope par Iwiss Tools Co.,Ltd
Wire Rope
Iwiss Tools Co.,Ltd
•
9 vues
String.pptx par Ananthi Palanisamy
String.pptx
Ananthi Palanisamy
•
47 vues
Deutsch Crimping par Iwiss Tools Co.,Ltd
Deutsch Crimping
Iwiss Tools Co.,Ltd
•
21 vues
Electrical Crimping par Iwiss Tools Co.,Ltd
Electrical Crimping
Iwiss Tools Co.,Ltd
•
21 vues
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... par IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES
•
12 vues
802.11 Computer Networks par TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
9 vues
Codes and Conventions.pptx par IsabellaGraceAnkers
Codes and Conventions.pptx
IsabellaGraceAnkers
•
7 vues
Investor Presentation par eser sevinç
Investor Presentation
eser sevinç
•
20 vues
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
19 vues
CHEMICAL KINETICS.pdf par AguedaGutirrez
CHEMICAL KINETICS.pdf
AguedaGutirrez
•
8 vues
IWISS Catalog 2022 par Iwiss Tools Co.,Ltd
IWISS Catalog 2022
Iwiss Tools Co.,Ltd
•
24 vues
13_DVD_Latch-up_prevention.pdf par Usha Mehta
13_DVD_Latch-up_prevention.pdf
Usha Mehta
•
10 vues
Digital Watermarking Of Audio Signals.pptx par AyushJaiswal781174
Digital Watermarking Of Audio Signals.pptx
AyushJaiswal781174
•
8 vues
A survey paper on various biometric security system methods
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1279 A survey paper on Various biometric security system methods Ms. Shraddha S. Giradkar1, Dr. N. K. Choudhari2 1 M. Tech student , Dept. of Electronics & Communication Engineering, Priyadarshini Bhagwati college of Engineering , Maharashtra, India 2Principal & Professor, Dept. of Electronics & Communication Engineering , Priyadarshini Bhagwati college of Engineering , Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -- Security is the major problem in a day to day life. Many high level industry uses biometric security for recognition of their employees such as iris, thumb ,face etc. There are so many systems available for security, but that systems are not so reliable. To ensure the actual presence of a real trait against a fake self generated sample biometric system is used. This developing system is reliable and precise. In this project we present a software and hardwarebasedfake detection method which can be used in multibiometric system to detect different fraudulent access attempts. This paper focuses on iris recognition, fingerprint recognition and face recognition. In this survey we present an overview of various biometric methods for security. KeyWords: Iris recognition, face recognition, fingerprint recognition, biometrics, security 1.INTRODUCTION The science and technology of measuring and analyzing biological data is referred as Biometric. Biometrics are that kind of system which can provide more security to user.Any fake trait can capture the characteristics and behaviour of human beings. But every human being has theirownunique identity. That is why it can not easily copied by anyone. There are many biometric securitysystems availablesuchas iris recognition ,fingerprint recognition, face recognition, signature recognition, voice recognition, hand geometry recognition,etc. In biometric security system there is no need to remember passwords or PINs ,so there is no chance of stolen or forgotten the passwords or PIN, therefore it is more secure system than any other security systems.Generallybiometric system have three steps i.e. receiving data, encryption and analysis of received data. 2. Various Methods Of Biometric security systems: A] In the year 2003, the authors Salil prabhakar, Sharath Pankanti and Anil k. Jain [5] proposed the biometric security and privacy system for fingerprint recognition. The paper proposed the approach of enrollment, verification and identification to provide confidentiality and security. In proposed Scheme the enrollment module first enroll the person into biometric database. During enrollment process ,the persons characteristics are first scan by the biometric reader to produce digital representation. In verification process already enrolled person claims an identity and system then start verification based on their characteristics. After that identification task identifies the claim persons identity. But the drawback of this method is that there are two types of errors were introduced : wrong biometric measurement from two different individuals to be from same persons and wrong biometric measurement from same persons to be from two different individuals. B] Watermarking Scheme for iris: Authors Jing Dong and Tieniu Tan proposed a biometric security system for iris recognition. In year 2008, they studied two methods for iris recognition, namely protection of iris template by hiding the mincoverimages as watermarks and watermarking the images of iris. Experimental results suggest embedding of watermark in iris images does not provide better performance instead of that recognition performance drops significantly if iris watermark suffers due to severe attack[1]. C] Canny Edge detection Technique for iris: In year 2011,the authors Bhavana chouhan and Shailaja Shukla proposed a biometric security systemwhichis based on automatic identification of an individual .Iris recognition totally depend on unique attribute and characteristics of an individual. Basically it focuses on image segmentation and feature extraction. Especially the iris recognition system depend on edge detection. Most commonly used tool of image processing for edge detection is canny edge detection technique which detects edges very robust .Canny edge detection technique detects unnecessary eges which does not provide appropriate result. This feature extraction method is unable to collect useful information from the image of iris that is not properly segmented[2].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1280 D] AdaBoost algorithm for face and Retinex algorithm for iris: Authors Yeong Gon Kim ,Kwang Yong Shin, Eui Chul Lee and Kang Ryoung Park in the year 2012 proposed scheme on recognition of face and both irises. In the proposed scheme the face regions are detected by using AdaBoost algorithm where as eye regions are detected by using rapid eye detection. After that the size normalization is performed to remove the variations occured in detected facial region and Retinex algorithm is used to normalized the illumination. Then facial features are acquired by using principal component analysis from normalized result of facial region. At the end matching score of Euclidean distance is calculated which is required as an input to support vector machine. In case of iris recognition, region of iris is segmented by using integer based CED and with an eyelid/eyelash detection technique. Finally matching score of Hamming distance is calculated and applied as an input to support vector machine. The drawback of this method is that in case of iris recognition if an iris regions of an individuals are more covered by eyelid/eyelashes can affect the performance of system. In case of face recognition ,facial images of severe rotation and extreme facial expression such as surprise can affect the performance of system[3]. E] Fingerprint and Iris recognition using Fuzzy Logic Scheme: In year 2013, authors Mohamad Abdolahi,MajidMohamadi, Mehdi Jafari studied the biometric security fusion system using fingerprint and iris with fuzzy logic. In the fingerprint recognition, bifurcations and terminates are stored and recognised as one feature, so that each minutia can be easily determined , identified and stored with parameters X,Y and its tangent angle. In addition to proposed method, two 64 bits code is used, one for terminates and another for bifurcations which collectively combine them to 128 bits unique code. After getting 128 bit code from new image of fingerprint it starts comparing with the code stored in database and starts finding code with minimum difference. This difference number is then stored in fuzzy logic engine. Iris is a part of eye, which control the amount of light entering in to pupil. In case iris recognition the first obtain the image of iris with good resolution which is referred as image acquisition. In segmentation ,first find out the size of image and centre pixel by dividing row and column. So that pixel is in the pupil region and its clear pupil is the part of eye that is why it can move to the right side of pixel with a high amount of difference intensityandmark it, move left to the pixel with a high amount of difference intensity and mark it and find the centre of these points. Do the same and find top and bottom and centre of them. Now with these centre and peripheral acquired points we can find the real pupil centre with centre point and maximum distance drawing a pupil circle performing the same task to find the iris region and extract iris from eye image. In this way segmentation is carried out .After that gabor filterisusedfor feature extraction. After compairing the new images of iris with the stored database by using hamming code algorithm, code obtained with minimum difference is stored in fuzzy logic engine[4]. To overcome the drawbacks of previouspapers,Theauthors Javier Galbally, Sébastien Marcel and Julian Fierrez [6]in the year 2014 they proposed a scheme where iris, fingerprint, face are used as an input to the system which is then compared with stored database. If applied image is matched with stored database of any of three inputs then data is transferred to the microcontroller by wireless technology using transreceiver. By making comparative analysis with previous papers this paper achieved better performance in terms of security. 3. CONCLUSIONS Preserving Security is very important nowadays. Various methods of biometrics has been heavily researched in the recent years. This survey summarizes the various methods and algorithm used for biometric recognition like iris, fingerprint and face. By making use of image quality measurement it is very easy to identify the real and fake user because fake identities few different features than the original one it always consists of different colour, general artifacts, luminancelevels,quantity of information and quantity of sharpness, which may be found in both types of images, structural distortions and natural appearance. Multibiometric system is a challenging system than unibiometric system aswell asitismoresecure. This paper focuses on only three biometric system such as face recognition, iris recognition, fingerprint recognition. This type of multibiometric system is used for various applications. In futureformakingthismultibiometricsystem more reliable and secure then add one more type of biometric system and try to make system more improving. REFERENCES [1] Jing Dong, Tieniu Tan," Effects of Watermarking on Iris Recognition Performance", 10th Intl Conf. on Control, Automation, Robotics and Vision, Hanoi, Vietnam, 17–20 December 2008 [2] Bhawna chouhan, shailja shukla." Iris Recognition System using canny edge detection for Biometric Identification", Interrnational Journal of engineering Sciences and Technology (IJEST),ISSN:0975-5462Vol. 3 No. I Jan 2011 [3] Yeong Gon Kim, Kwang Yong Shin, Eui Chul Lee and Kang Ryoung Park ''Multimodal Biometric System Based on the Recognition of Face and Both Irises''
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1281 International Journal of Advanced Robotic system 2012, Vol. 9, 65:2012 [4] Mohamad Abdolahi, Majid Mohamadi, Mehdi Jafari '' Multimodal Biometric system FusionUsingFingerprint and Iris with Fuzzy Logic '' International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013 504 [5] Salil prabhakar, Sharath Pankanti and Anil k. Jain,'' Biometric Recognition: Security and Privacy Concerns",published by the IEEE computer society 1540-7993/03/2003 [6] Javier Galbally, Sébastien Marcel and Julian Fierrez,'' Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint,and Face Recognition",IEEE Transactions on Image Processing vol. 23, no. 2, feb2014 [7] A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, pp. 113–129, Jan. 2008. [8] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia,“A high performancefingerprintliveness detection method based on quality related features,” Future Generat. Comput. Syst., vol. 28, no. 1, 2012. [9] K. A. Nixon, V. Aimale, and R. K. Rowe, “Spoof detection schemes,” Handbook of Biometrics. New York, NY, USA: Springer-Verlag, 2008, pp. 403–423.2009 [10] M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, B. Muntoni, G. Fadda, et al., “Competitiononcountermeasuresto2D facial spoofing attacks,” in Proc. IEEE IJCB, Oct. 2011, pp. 1–6. [11] J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz,“Evaluation of direct attacks to fingerprint verification systems,”J. Telecommun. Syst., vol. 47, nos. 3–4, pp. 243–254, 2011. [12] A. Anjos and S. Marcel, “Counter-measures to photo attacks in face recognition: A public database and a baseline,” in Proc. IEEE IJCB, Oct. 2011, pp. 1–7. [13] (2010). Trusted Biometrics Under Spoofing Attacks (TABULA RASA) [Online]. Available: http://www.tabularasa-euproject.org/ [14] J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D. Maltoni, J. Fierrez, et al., “An evaluation of direct and indirect attacks using fake fingers generated from ISO templates,” Pattern Recognit. Lett., vol. 31,no. 8, pp. 725–732, 2010. [15] J. Hennebert, R. Loeffel, A. Humm,andR.Ingold,“A new forgery scenario based on regaining dynamics of signature,” in Proc. IAPR ICB, vol. Springer LNCS-4642. 2007, pp. 366–375. [16] A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikainen, J. Bustard, and M. Nixon, “Can gait biometrics be spoofed?” in Proc. IAPR ICPR, 2012, pp. 3280–3283. [17] Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, “Evaluation of serial and parallel multibiometric systems under spoofing attacks,” in Proc. IEEE 5th Int. Conf. BTAS, Sep. 2012, pp. 283–288.
Télécharger maintenant