A survey paper on various biometric security system methods

IRJET Journal
IRJET JournalFast Track Publications

https://irjet.net/archives/V3/i2/IRJET-V3I2226.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1279
A survey paper on Various biometric security system methods
Ms. Shraddha S. Giradkar1, Dr. N. K. Choudhari2
1 M. Tech student , Dept. of Electronics & Communication Engineering, Priyadarshini Bhagwati college of
Engineering , Maharashtra, India
2Principal & Professor, Dept. of Electronics & Communication Engineering , Priyadarshini Bhagwati college of
Engineering , Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -- Security is the major problem in a day to day
life. Many high level industry uses biometric security for
recognition of their employees such as iris, thumb ,face etc.
There are so many systems available for security, but that
systems are not so reliable. To ensure the actual presence of a
real trait against a fake self generated sample biometric
system is used. This developing system is reliable and precise.
In this project we present a software and hardwarebasedfake
detection method which can be used in multibiometric system
to detect different fraudulent access attempts. This paper
focuses on iris recognition, fingerprint recognition and face
recognition. In this survey we present an overview of various
biometric methods for security.
KeyWords: Iris recognition, face recognition,
fingerprint recognition, biometrics, security
1.INTRODUCTION
The science and technology of measuring and analyzing
biological data is referred as Biometric. Biometrics are that
kind of system which can provide more security to user.Any
fake trait can capture the characteristics and behaviour of
human beings. But every human being has theirownunique
identity. That is why it can not easily copied by anyone.
There are many biometric securitysystems availablesuchas
iris recognition ,fingerprint recognition, face recognition,
signature recognition, voice recognition, hand geometry
recognition,etc.
In biometric security system there is no need to remember
passwords or PINs ,so there is no chance of stolen or
forgotten the passwords or PIN, therefore it is more secure
system than any other security systems.Generallybiometric
system have three steps i.e. receiving data, encryption and
analysis of received data.
2. Various Methods Of Biometric security systems:
A] In the year 2003, the authors Salil prabhakar, Sharath
Pankanti and Anil k. Jain [5] proposed the biometric security
and privacy system for fingerprint recognition. The paper
proposed the approach of enrollment, verification and
identification to provide confidentiality and security. In
proposed Scheme the enrollment module first enroll the
person into biometric database. During enrollment process
,the persons characteristics are first scan by the biometric
reader to produce digital representation. In verification
process already enrolled person claims an identity and
system then start verification based on their characteristics.
After that identification task identifies the claim persons
identity.
But the drawback of this method is that there are two types
of errors were introduced : wrong biometric measurement
from two different individuals to be from same persons and
wrong biometric measurement from same persons to be
from two different individuals.
B] Watermarking Scheme for iris:
Authors Jing Dong and Tieniu Tan proposed a biometric
security system for iris recognition. In year 2008, they
studied two methods for iris recognition, namely
protection of iris template by hiding the mincoverimages as
watermarks and watermarking the images of iris.
Experimental results suggest embedding of watermark in
iris images does not provide better performance instead of
that recognition performance drops significantly if iris
watermark suffers due to severe attack[1].
C] Canny Edge detection Technique for iris:
In year 2011,the authors Bhavana chouhan and Shailaja
Shukla proposed a biometric security systemwhichis based
on automatic identification of an individual .Iris recognition
totally depend on unique attribute and characteristics of an
individual.
Basically it focuses on image segmentation and feature
extraction. Especially the iris recognition system depend on
edge detection. Most commonly used tool of image
processing for edge detection is canny edge detection
technique which detects edges very robust .Canny edge
detection technique detects unnecessary eges which does
not provide appropriate result. This feature extraction
method is unable to collect useful information from the
image of iris that is not properly segmented[2].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1280
D] AdaBoost algorithm for face and Retinex
algorithm for iris:
Authors Yeong Gon Kim ,Kwang Yong Shin, Eui Chul Lee and
Kang Ryoung Park in the year 2012 proposed scheme on
recognition of face and both irises. In the proposed scheme
the face regions are detected by using AdaBoost algorithm
where as eye regions are detected by using rapid eye
detection. After that the size normalization is performed to
remove the variations occured in detected facial region and
Retinex algorithm is used to normalized the illumination.
Then facial features are acquired by using principal
component analysis from normalized result of facial region.
At the end matching score of Euclidean distance is
calculated which is required as an input to support vector
machine.
In case of iris recognition, region of iris is segmented by
using integer based CED and with an eyelid/eyelash
detection technique. Finally matching score of Hamming
distance is calculated and applied as an input to support
vector machine.
The drawback of this method is that in case of iris
recognition if an iris regions of an individuals are more
covered by eyelid/eyelashes can affect the performance of
system. In case of face recognition ,facial images of severe
rotation and extreme facial expression such as surprise can
affect the performance of system[3].
E] Fingerprint and Iris recognition using Fuzzy
Logic Scheme:
In year 2013, authors Mohamad Abdolahi,MajidMohamadi,
Mehdi Jafari studied the biometric security fusion system
using fingerprint and iris with fuzzy logic. In the fingerprint
recognition, bifurcations and terminates are stored and
recognised as one feature, so that each minutia can be easily
determined , identified and stored with parameters X,Y and
its tangent angle. In addition to proposed method, two 64
bits code is used, one for terminates and another for
bifurcations which collectively combine them to 128 bits
unique code. After getting 128 bit code from new image of
fingerprint it starts comparing with the code stored in
database and starts finding code with minimum difference.
This difference number is then stored in fuzzy logic engine.
Iris is a part of eye, which control the amount of light
entering in to pupil. In case iris recognition the first obtain
the image of iris with good resolution which is referred as
image acquisition. In segmentation ,first find out the size of
image and centre pixel by dividing row and column. So that
pixel is in the pupil region and its clear pupil is the part of
eye that is why it can move to the right side of pixel
with a high amount of difference intensityandmark it, move
left to the pixel with a high amount of difference intensity
and mark it and find the centre of these points. Do the same
and find top and bottom and centre of them. Now with these
centre and peripheral acquired points we can find the real
pupil centre with centre point and maximum distance
drawing a pupil circle performing the same task to find the
iris region and extract iris from eye image. In this way
segmentation is carried out .After that gabor filterisusedfor
feature extraction. After compairing the new images of iris
with the stored database by using hamming code algorithm,
code obtained with minimum difference is stored in fuzzy
logic engine[4].
To overcome the drawbacks of previouspapers,Theauthors
Javier Galbally, Sébastien Marcel and Julian Fierrez [6]in the
year 2014 they proposed a scheme where iris, fingerprint,
face are used as an input to the system which is then
compared with stored database. If applied image is matched
with stored database of any of three inputs then data is
transferred to the microcontroller by wireless technology
using transreceiver. By making comparative analysis with
previous papers this paper achieved better performance in
terms of security.
3. CONCLUSIONS
Preserving Security is very important nowadays. Various
methods of biometrics has been heavily researched in the
recent years. This survey summarizes the various methods
and algorithm used for biometric recognition like iris,
fingerprint and face.
By making use of image quality measurement it is very easy
to identify the real and fake user because fake identities few
different features than the original one it always consists of
different colour, general artifacts, luminancelevels,quantity
of information and quantity of sharpness, which may be
found in both types of images, structural distortions and
natural appearance. Multibiometric system is a challenging
system than unibiometric system aswell asitismoresecure.
This paper focuses on only three biometric system such as
face recognition, iris recognition, fingerprint recognition.
This type of multibiometric system is used for various
applications. In futureformakingthismultibiometricsystem
more reliable and secure then add one more type of
biometric system and try to make system more improving.
REFERENCES
[1] Jing Dong, Tieniu Tan," Effects of Watermarking on Iris
Recognition Performance", 10th Intl Conf. on
Control, Automation, Robotics and Vision, Hanoi,
Vietnam, 17–20 December 2008
[2] Bhawna chouhan, shailja shukla." Iris Recognition
System using canny edge detection for Biometric
Identification", Interrnational Journal of engineering
Sciences and Technology (IJEST),ISSN:0975-5462Vol.
3 No. I Jan 2011
[3] Yeong Gon Kim, Kwang Yong Shin, Eui Chul Lee and
Kang Ryoung Park ''Multimodal Biometric System
Based on the Recognition of Face and Both Irises''
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1281
International Journal of Advanced Robotic system
2012, Vol. 9, 65:2012
[4] Mohamad Abdolahi, Majid Mohamadi, Mehdi Jafari ''
Multimodal Biometric system FusionUsingFingerprint
and Iris with Fuzzy Logic '' International Journal of Soft
Computing and Engineering (IJSCE) ISSN: 2231-2307,
Volume-2, Issue-6, January 2013 504
[5] Salil prabhakar, Sharath Pankanti and Anil k. Jain,''
Biometric Recognition: Security and Privacy
Concerns",published by the IEEE computer society
1540-7993/03/2003
[6] Javier Galbally, Sébastien Marcel and Julian Fierrez,''
Image Quality Assessment for Fake Biometric
Detection: Application to Iris, Fingerprint,and Face
Recognition",IEEE Transactions on Image Processing
vol. 23, no. 2, feb2014
[7] A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric
template security,” EURASIP J. Adv. Signal Process., vol.
2008, pp. 113–129, Jan. 2008.
[8] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J.
Ortega-Garcia,“A high performancefingerprintliveness
detection method based on quality related features,”
Future Generat. Comput. Syst., vol. 28, no. 1, 2012.
[9] K. A. Nixon, V. Aimale, and R. K. Rowe, “Spoof detection
schemes,” Handbook of Biometrics. New York, NY, USA:
Springer-Verlag, 2008, pp. 403–423.2009
[10] M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, B. Muntoni,
G. Fadda, et al., “Competitiononcountermeasuresto2D
facial spoofing attacks,”
in Proc. IEEE IJCB, Oct. 2011, pp. 1–6.
[11] J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M.
Martinez-Diaz,“Evaluation of direct attacks to
fingerprint verification systems,”J. Telecommun. Syst.,
vol. 47, nos. 3–4, pp. 243–254, 2011.
[12] A. Anjos and S. Marcel, “Counter-measures to photo
attacks in face recognition: A public database and a
baseline,” in Proc. IEEE IJCB, Oct. 2011, pp. 1–7.
[13] (2010). Trusted Biometrics Under Spoofing Attacks
(TABULA RASA) [Online]. Available:
http://www.tabularasa-euproject.org/
[14] J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D.
Maltoni, J. Fierrez, et al., “An evaluation of direct and
indirect attacks using fake fingers generated from ISO
templates,” Pattern Recognit. Lett., vol. 31,no. 8, pp.
725–732, 2010.
[15] J. Hennebert, R. Loeffel, A. Humm,andR.Ingold,“A new
forgery scenario based on regaining dynamics of
signature,” in Proc. IAPR ICB, vol. Springer LNCS-4642.
2007, pp. 366–375.
[16] A. Hadid, M. Ghahramani, V. Kellokumpu, M.
Pietikainen, J. Bustard, and M. Nixon, “Can gait
biometrics be spoofed?” in Proc. IAPR ICPR, 2012, pp.
3280–3283.
[17] Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli,
“Evaluation of serial and parallel multibiometric
systems under spoofing attacks,” in Proc. IEEE 5th Int.
Conf. BTAS, Sep. 2012, pp. 283–288.

Recommandé

Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for... par
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
106 vues7 diapositives
Scale Invariant Feature Transform Based Face Recognition from a Single Sample... par
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
377 vues7 diapositives
Internation Journal Conference par
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
283 vues6 diapositives
IRJET- Automated Criminal Identification System using Face Detection and Reco... par
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
303 vues5 diapositives
“Enhancing Iris Scanning Using Visual Cryptography” par
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
269 vues4 diapositives
184 par
184184
184vivatechijri
16 vues5 diapositives

Contenu connexe

Tendances

Bw33449453 par
Bw33449453Bw33449453
Bw33449453IJERA Editor
441 vues5 diapositives
Security for Identity Based Identification using Water Marking and Visual Cry... par
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
45 vues7 diapositives
M phil-computer-science-biometric-system-projects par
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
173 vues3 diapositives
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm par
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
28 vues20 diapositives
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel... par
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
468 vues8 diapositives
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N... par
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
236 vues8 diapositives

Tendances(18)

Security for Identity Based Identification using Water Marking and Visual Cry... par IRJET Journal
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal45 vues
M phil-computer-science-biometric-system-projects par Vijay Karan
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
Vijay Karan173 vues
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm par IJECEIAES
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES28 vues
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel... par IJERD Editor
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor468 vues
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N... par CSCJournals
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
CSCJournals236 vues
An overview of face liveness detection par ijitjournal
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
ijitjournal867 vues
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices par IRJET Journal
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal17 vues
IRJET - A Survey on Biometric Voting System using Iris Recognition par IRJET Journal
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal13 vues
IRJET- Advanced Two Factor Authentication using Image Processing par IRJET Journal
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal33 vues
International Journal of Engineering and Science Invention (IJESI) par inventionjournals
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
Highly Secured Bio-Metric Authentication Model with Palm Print Identification par IJERA Editor
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor57 vues
AI Approach for Iris Biometric Recognition Using a Median Filter par NIDHI SHARMA
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA19 vues
Ieeepro techno solutions ieee embedded project secure and robust iris recog... par srinivasanece7
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
srinivasanece7286 vues
IRJET - Chatbot with Gesture based User Input par IRJET Journal
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
IRJET Journal19 vues
IRJET- Free & Generic Facial Attendance System using Android par IRJET Journal
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
IRJET Journal25 vues

Similaire à A survey paper on various biometric security system methods

Bw33449453 par
Bw33449453Bw33449453
Bw33449453IJERA Editor
312 vues5 diapositives
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB par
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
9 vues47 diapositives
I017335457 par
I017335457I017335457
I017335457IOSR Journals
127 vues4 diapositives
Biometric.docx par
Biometric.docxBiometric.docx
Biometric.docxShubhamYadav769267
3 vues18 diapositives
D56021216 par
D56021216D56021216
D56021216IJERA Editor
139 vues5 diapositives
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem par
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
198 vues5 diapositives

Similaire à A survey paper on various biometric security system methods(20)

A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB par Maria Perkins
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins9 vues
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem par IJERA Editor
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor198 vues
A comparison of multiple wavelet algorithms for iris recognition 2 par IAEME Publication
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection par IRJET Journal
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal64 vues
Iris Biometric Based Person Identification Using Deep Learning Technique par IRJET Journal
Iris Biometric Based Person Identification Using Deep Learning TechniqueIris Biometric Based Person Identification Using Deep Learning Technique
Iris Biometric Based Person Identification Using Deep Learning Technique
IRJET Journal6 vues
A04820104 par IOSR-JEN
A04820104A04820104
A04820104
IOSR-JEN263 vues
Face Recognition Smart Attendance System: (InClass System) par IRJET Journal
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)
IRJET Journal13 vues
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME... par IJNSA Journal
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal501 vues
Intelligent multimodal identification system based on local feature fusion be... par nooriasukmaningtyas
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
Biometric Iris Recognition Based on Hybrid Technique par ijsc
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
ijsc4 vues
IRJET-Human Face Detection and Identification using Deep Metric Learning par IRJET Journal
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal28 vues
Paper id 25201496 par IJRAT
Paper id 25201496Paper id 25201496
Paper id 25201496
IJRAT289 vues
IRJET- Survey of Iris Recognition Techniques par IRJET Journal
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
IRJET Journal53 vues
Advanced Authentication Scheme using Multimodal Biometric Scheme par Editor IJCATR
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR455 vues

Plus de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL par
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
19 vues7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vues7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
7 vues5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vues11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vues6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vues5 diapositives

Plus de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL par IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal19 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal7 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vues
Heart Failure Prediction using Different Machine Learning Techniques par IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel par IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vues
Metro Development and Pedestrian Concerns par IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... par IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vues
Data Analytics and Artificial Intelligence in Healthcare Industry par IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... par IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal36 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... par IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 vues
Development of Effective Tomato Package for Post-Harvest Preservation par IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” par IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vues
Understanding the Nature of Consciousness with AI par IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada par IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... par IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vues
Enhancing Real Time Communication and Efficiency With Websocket par IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal4 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... par IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vues

Dernier

What is Unit Testing par
What is Unit TestingWhat is Unit Testing
What is Unit TestingSadaaki Emura
23 vues25 diapositives
LFA-NPG-Paper.pdf par
LFA-NPG-Paper.pdfLFA-NPG-Paper.pdf
LFA-NPG-Paper.pdfharinsrikanth
40 vues13 diapositives
MSA Website Slideshow (16).pdf par
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdfmsaucla
46 vues8 diapositives
SWM L1-L14_drhasan (Part 1).pdf par
SWM L1-L14_drhasan (Part 1).pdfSWM L1-L14_drhasan (Part 1).pdf
SWM L1-L14_drhasan (Part 1).pdfMahmudHasan747870
48 vues150 diapositives
How I learned to stop worrying and love the dark silicon apocalypse.pdf par
How I learned to stop worrying and love the dark silicon apocalypse.pdfHow I learned to stop worrying and love the dark silicon apocalypse.pdf
How I learned to stop worrying and love the dark silicon apocalypse.pdfTomasz Kowalczewski
24 vues66 diapositives
SWM L15-L28_drhasan (Part 2).pdf par
SWM L15-L28_drhasan (Part 2).pdfSWM L15-L28_drhasan (Part 2).pdf
SWM L15-L28_drhasan (Part 2).pdfMahmudHasan747870
28 vues93 diapositives

Dernier(20)

MSA Website Slideshow (16).pdf par msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla46 vues
How I learned to stop worrying and love the dark silicon apocalypse.pdf par Tomasz Kowalczewski
How I learned to stop worrying and love the dark silicon apocalypse.pdfHow I learned to stop worrying and love the dark silicon apocalypse.pdf
How I learned to stop worrying and love the dark silicon apocalypse.pdf
NEW SUPPLIERS SUPPLIES (copie).pdf par georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou14 vues
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... par IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES12 vues
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
13_DVD_Latch-up_prevention.pdf par Usha Mehta
13_DVD_Latch-up_prevention.pdf13_DVD_Latch-up_prevention.pdf
13_DVD_Latch-up_prevention.pdf
Usha Mehta10 vues

A survey paper on various biometric security system methods

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1279 A survey paper on Various biometric security system methods Ms. Shraddha S. Giradkar1, Dr. N. K. Choudhari2 1 M. Tech student , Dept. of Electronics & Communication Engineering, Priyadarshini Bhagwati college of Engineering , Maharashtra, India 2Principal & Professor, Dept. of Electronics & Communication Engineering , Priyadarshini Bhagwati college of Engineering , Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -- Security is the major problem in a day to day life. Many high level industry uses biometric security for recognition of their employees such as iris, thumb ,face etc. There are so many systems available for security, but that systems are not so reliable. To ensure the actual presence of a real trait against a fake self generated sample biometric system is used. This developing system is reliable and precise. In this project we present a software and hardwarebasedfake detection method which can be used in multibiometric system to detect different fraudulent access attempts. This paper focuses on iris recognition, fingerprint recognition and face recognition. In this survey we present an overview of various biometric methods for security. KeyWords: Iris recognition, face recognition, fingerprint recognition, biometrics, security 1.INTRODUCTION The science and technology of measuring and analyzing biological data is referred as Biometric. Biometrics are that kind of system which can provide more security to user.Any fake trait can capture the characteristics and behaviour of human beings. But every human being has theirownunique identity. That is why it can not easily copied by anyone. There are many biometric securitysystems availablesuchas iris recognition ,fingerprint recognition, face recognition, signature recognition, voice recognition, hand geometry recognition,etc. In biometric security system there is no need to remember passwords or PINs ,so there is no chance of stolen or forgotten the passwords or PIN, therefore it is more secure system than any other security systems.Generallybiometric system have three steps i.e. receiving data, encryption and analysis of received data. 2. Various Methods Of Biometric security systems: A] In the year 2003, the authors Salil prabhakar, Sharath Pankanti and Anil k. Jain [5] proposed the biometric security and privacy system for fingerprint recognition. The paper proposed the approach of enrollment, verification and identification to provide confidentiality and security. In proposed Scheme the enrollment module first enroll the person into biometric database. During enrollment process ,the persons characteristics are first scan by the biometric reader to produce digital representation. In verification process already enrolled person claims an identity and system then start verification based on their characteristics. After that identification task identifies the claim persons identity. But the drawback of this method is that there are two types of errors were introduced : wrong biometric measurement from two different individuals to be from same persons and wrong biometric measurement from same persons to be from two different individuals. B] Watermarking Scheme for iris: Authors Jing Dong and Tieniu Tan proposed a biometric security system for iris recognition. In year 2008, they studied two methods for iris recognition, namely protection of iris template by hiding the mincoverimages as watermarks and watermarking the images of iris. Experimental results suggest embedding of watermark in iris images does not provide better performance instead of that recognition performance drops significantly if iris watermark suffers due to severe attack[1]. C] Canny Edge detection Technique for iris: In year 2011,the authors Bhavana chouhan and Shailaja Shukla proposed a biometric security systemwhichis based on automatic identification of an individual .Iris recognition totally depend on unique attribute and characteristics of an individual. Basically it focuses on image segmentation and feature extraction. Especially the iris recognition system depend on edge detection. Most commonly used tool of image processing for edge detection is canny edge detection technique which detects edges very robust .Canny edge detection technique detects unnecessary eges which does not provide appropriate result. This feature extraction method is unable to collect useful information from the image of iris that is not properly segmented[2].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1280 D] AdaBoost algorithm for face and Retinex algorithm for iris: Authors Yeong Gon Kim ,Kwang Yong Shin, Eui Chul Lee and Kang Ryoung Park in the year 2012 proposed scheme on recognition of face and both irises. In the proposed scheme the face regions are detected by using AdaBoost algorithm where as eye regions are detected by using rapid eye detection. After that the size normalization is performed to remove the variations occured in detected facial region and Retinex algorithm is used to normalized the illumination. Then facial features are acquired by using principal component analysis from normalized result of facial region. At the end matching score of Euclidean distance is calculated which is required as an input to support vector machine. In case of iris recognition, region of iris is segmented by using integer based CED and with an eyelid/eyelash detection technique. Finally matching score of Hamming distance is calculated and applied as an input to support vector machine. The drawback of this method is that in case of iris recognition if an iris regions of an individuals are more covered by eyelid/eyelashes can affect the performance of system. In case of face recognition ,facial images of severe rotation and extreme facial expression such as surprise can affect the performance of system[3]. E] Fingerprint and Iris recognition using Fuzzy Logic Scheme: In year 2013, authors Mohamad Abdolahi,MajidMohamadi, Mehdi Jafari studied the biometric security fusion system using fingerprint and iris with fuzzy logic. In the fingerprint recognition, bifurcations and terminates are stored and recognised as one feature, so that each minutia can be easily determined , identified and stored with parameters X,Y and its tangent angle. In addition to proposed method, two 64 bits code is used, one for terminates and another for bifurcations which collectively combine them to 128 bits unique code. After getting 128 bit code from new image of fingerprint it starts comparing with the code stored in database and starts finding code with minimum difference. This difference number is then stored in fuzzy logic engine. Iris is a part of eye, which control the amount of light entering in to pupil. In case iris recognition the first obtain the image of iris with good resolution which is referred as image acquisition. In segmentation ,first find out the size of image and centre pixel by dividing row and column. So that pixel is in the pupil region and its clear pupil is the part of eye that is why it can move to the right side of pixel with a high amount of difference intensityandmark it, move left to the pixel with a high amount of difference intensity and mark it and find the centre of these points. Do the same and find top and bottom and centre of them. Now with these centre and peripheral acquired points we can find the real pupil centre with centre point and maximum distance drawing a pupil circle performing the same task to find the iris region and extract iris from eye image. In this way segmentation is carried out .After that gabor filterisusedfor feature extraction. After compairing the new images of iris with the stored database by using hamming code algorithm, code obtained with minimum difference is stored in fuzzy logic engine[4]. To overcome the drawbacks of previouspapers,Theauthors Javier Galbally, Sébastien Marcel and Julian Fierrez [6]in the year 2014 they proposed a scheme where iris, fingerprint, face are used as an input to the system which is then compared with stored database. If applied image is matched with stored database of any of three inputs then data is transferred to the microcontroller by wireless technology using transreceiver. By making comparative analysis with previous papers this paper achieved better performance in terms of security. 3. CONCLUSIONS Preserving Security is very important nowadays. Various methods of biometrics has been heavily researched in the recent years. This survey summarizes the various methods and algorithm used for biometric recognition like iris, fingerprint and face. By making use of image quality measurement it is very easy to identify the real and fake user because fake identities few different features than the original one it always consists of different colour, general artifacts, luminancelevels,quantity of information and quantity of sharpness, which may be found in both types of images, structural distortions and natural appearance. Multibiometric system is a challenging system than unibiometric system aswell asitismoresecure. This paper focuses on only three biometric system such as face recognition, iris recognition, fingerprint recognition. This type of multibiometric system is used for various applications. In futureformakingthismultibiometricsystem more reliable and secure then add one more type of biometric system and try to make system more improving. REFERENCES [1] Jing Dong, Tieniu Tan," Effects of Watermarking on Iris Recognition Performance", 10th Intl Conf. on Control, Automation, Robotics and Vision, Hanoi, Vietnam, 17–20 December 2008 [2] Bhawna chouhan, shailja shukla." Iris Recognition System using canny edge detection for Biometric Identification", Interrnational Journal of engineering Sciences and Technology (IJEST),ISSN:0975-5462Vol. 3 No. I Jan 2011 [3] Yeong Gon Kim, Kwang Yong Shin, Eui Chul Lee and Kang Ryoung Park ''Multimodal Biometric System Based on the Recognition of Face and Both Irises''
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1281 International Journal of Advanced Robotic system 2012, Vol. 9, 65:2012 [4] Mohamad Abdolahi, Majid Mohamadi, Mehdi Jafari '' Multimodal Biometric system FusionUsingFingerprint and Iris with Fuzzy Logic '' International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013 504 [5] Salil prabhakar, Sharath Pankanti and Anil k. Jain,'' Biometric Recognition: Security and Privacy Concerns",published by the IEEE computer society 1540-7993/03/2003 [6] Javier Galbally, Sébastien Marcel and Julian Fierrez,'' Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint,and Face Recognition",IEEE Transactions on Image Processing vol. 23, no. 2, feb2014 [7] A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, pp. 113–129, Jan. 2008. [8] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia,“A high performancefingerprintliveness detection method based on quality related features,” Future Generat. Comput. Syst., vol. 28, no. 1, 2012. [9] K. A. Nixon, V. Aimale, and R. K. Rowe, “Spoof detection schemes,” Handbook of Biometrics. New York, NY, USA: Springer-Verlag, 2008, pp. 403–423.2009 [10] M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, B. Muntoni, G. Fadda, et al., “Competitiononcountermeasuresto2D facial spoofing attacks,” in Proc. IEEE IJCB, Oct. 2011, pp. 1–6. [11] J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz,“Evaluation of direct attacks to fingerprint verification systems,”J. Telecommun. Syst., vol. 47, nos. 3–4, pp. 243–254, 2011. [12] A. Anjos and S. Marcel, “Counter-measures to photo attacks in face recognition: A public database and a baseline,” in Proc. IEEE IJCB, Oct. 2011, pp. 1–7. [13] (2010). Trusted Biometrics Under Spoofing Attacks (TABULA RASA) [Online]. Available: http://www.tabularasa-euproject.org/ [14] J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D. Maltoni, J. Fierrez, et al., “An evaluation of direct and indirect attacks using fake fingers generated from ISO templates,” Pattern Recognit. Lett., vol. 31,no. 8, pp. 725–732, 2010. [15] J. Hennebert, R. Loeffel, A. Humm,andR.Ingold,“A new forgery scenario based on regaining dynamics of signature,” in Proc. IAPR ICB, vol. Springer LNCS-4642. 2007, pp. 366–375. [16] A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikainen, J. Bustard, and M. Nixon, “Can gait biometrics be spoofed?” in Proc. IAPR ICPR, 2012, pp. 3280–3283. [17] Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, “Evaluation of serial and parallel multibiometric systems under spoofing attacks,” in Proc. IEEE 5th Int. Conf. BTAS, Sep. 2012, pp. 283–288.