SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 800
PERSONAL IDENTIFICATION USING MULTIBIOMETRICS SCORE-
LEVEL FUSION
Amritha K.C1
, S.Velmurugan2
1
PG Scholar, EEE, K S R Institute for Engineering and Technology, Kerala, India
2
Assistant Professor, EEE, K S R Institute for Engineering and Technology, Tamilnadu, India
Abstract
A combination of more than one biometric is called multimodal biometric system. Here proposing an identification system by
combining the feature of face and signature at matching score level. Thus, it is expected that spoofing two or more independent
data would present more difficulty as compared to just one biometric data. With the hypothesis that impossible to spoof attack the
physical quality and behavioral characteristic simultaneously, face and signature selected as the modalities of the biometric to be
merged. The fusion, at the score level provides a matching score indicating the proximity of the feature vector with the template
vector. These stacks can be blended with a simple sum rule. Storage of database in the form of these scores gives protection from
hacking the databases. The results show that the error rates for this bimodal identification system is less than a single face
identification system.GAR and FRR are used to evaluate the system performance.
Keywords: Face, Signature, Genuine Acceptance Rate, False Rejection Rate.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Multibiometrics are a relatively new approach to overcome
the problems of unibiometrics. Forced back by lower
hardware costs, a multibiometric system uses multiple
sensors for information acquisition. This leaves it to get
multiple samples of a single biometric trait (called multi-
sample biometrics) and/or samples of multiple biometric
traits or multimodal biometrics). There are various different
ways that multimodal systems can be made, based on the
sources of the biometric information and the way the system
is projected.
The term ‘multimodal’ sometimes refers specifically to the
lawsuit where two or more different biometric modalities
are in economic consumption (such as face and fingerprint),
spell the term multi-biometrics are more generic [1].
Fig-1: Biometric Authentication Process
Based on the combination techniques, the biometric fusion
fall into three general categories, depending on the point at
which the compounding is conducted: feature fusion
combines low-level distinguishing features, score fusion
makes use of multiple match scores, and decision level
fusion logically combines accept/reject matching decisions.
That is, classifying the systems depending on how early in
the authentication process the data from the different sensors
is combined as shown in the Fig.1.
1.1 Feature Level Fusion
In this architecture, the data extracted from the different
sensors is encoded into a joint feature vector, which is then
compared to an enrollment template (which itself is a joint
feature vector stored in a database) and assigned a matching
score as in a single biometric system
1.2 Score Level Fusion
There are two accesses to the compounding of the similarity
score level: classification and grade combination
1.2.1 Classification
The idea of the classification approach is to consider
verification as a classification problem with two classes:
‘Accept’ and ‘Reject’. Each authentication is represented by
a feature vector that is composed of similarity scores from
the various sub-systems.
Training samples are collected, and machine learning or
pattern recognition techniques (such as neural networks,
support vector machines, decision trees, etc.) are used to
build a model to distinguish the two classes. This
classification model is applied to unseen data to make a
verification decision.
1.2.2 Score Combination
Score combination involves taking several scores and
applying a formula to combine them into a single score.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 801
Some examples include adding the scores together, taking
the average, or selecting the minimum or maximum score.
Such various score level fusion techniques have been
proposed by the researchers to normalize the matching
scores, to be used in decision module of the multi-biometric
system [11]. Fusion at score level fusion is as shown in the
Fig.2.
1.2.2.1 Simple Sum of Raw Scores
With no prior normalization matcher scores are simply
added. Scores are neither rescaled, nor weighted to account
for differences in matcher accuracy
1.2.2.2. Simple Sum of Z-Normalized Scores
This technique follows following steps:
 The estimation of the mean and standard deviation
of imposter score distribution has been performed
on the sample data.
 The mean of the imposter distribution is subtracted
to normalize the scores and then are dividing by the
standard deviation of the imposter distribution.
 Without weighting then the normalized scores are
simply added. A normalized score is calculated by
the equation:
(1)
Where 𝜇 is the mean and 𝜎 is the standard deviation of the
matching score distribution.
1.2.2.3. Product of Likelihood Ratios
This technique works with following steps:
 In the first step probability density functions are
modeled separately for genuine and impostor
distribution by each.
 For each matcher the Likelihood ratios are
computed from these models.
 Transformation is performed to their likelihood
ratios to normalize scores.
 Lastly, Normalized scores are simply multiplied.
Fig-2: Fusion at Score Level
3. FUSION AT THE DECISION LEVEL
In this fusion strategy, a separate authentication decision is
made for each biometric trait. These decisions are then
combined into a final vote.
4. PERFORMANCE MEASURES
To judge the system performance of the scheme, the
measurements used mainly are:
 Genuine acceptance rate (GAR), the rate of people
genuinely accepted over the total number of
enrolled people.
 False reject rate (FRR), the proportion of genuine
transactions that are rejected by the system.
 False accepts rate (FAR), the proportion of
impostor transactions that are assumed by the
organization.
5. RELATED WORKS
Luca et al. used fingerprint and face to be fused at the score
level [8]. PCA and LDA are used for the feature extraction
and classification. Mean rule, product rule and Bayesian rule
are used as the fusion techniques with FAR of 0% and FRR
of 0.6% to 1.6%. Kartik et al. combined speech and
signature by using sum rule as fusion technique after the
min max normalization is applied [3]. Euclidean distance is
used as the classification technique with 81.25% accuracy
performance rate. Rodriguez et al. used signature as well
with iris by using sum rule and product rule as the fusion
techniques [5] Neural Network is used as the classification
technique with EER below than 2.0%.
There are some related researches combined more than two
biometrics as in [6] that combined hand geometry,
fingerprint and voice by using global and local learning
decision as fusion approach.
The accuracy performance is 85% to 95%.There are also
some researches of multibiometric in which fusion is at
decision level.Monwar and Gavrilova developed a
multimodal biometrics system by using face, ear and
signature. The features of the biometrics are extracted by
using eigenface, engineer and eigensignature respectively
and obtained a EER of 1.12% [12].Fusion at feature level,
Feng et al. combined face and palmprint by concatenated the
features extracted by using PCA and ICA with the nearest
neighbor classifier (nnc) and SVM as the classifier [13].
From the related researches of the various multimodal
biometric systems, at most of the cases the biometric
features are stored in the database for the reference to the
query inputs. It seems to be less secure, that is the spoofing
of the biometry is possible. According to a multimodal
biometry; fusion at score level with a simple sum rule gives
good performance and easy implementation. Analyzed that
multimodal biometry gives less error rates than a single
biometry.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 802
6. PROPOSED WORK
Biometrics, referred as the skill of distinguishing an
individual based on his or her physical or behavioral traits,
has been widely utilized as a security system in the
aftermath of the latest security topics. Nevertheless, recent
researches have indicated that many biometric traits are
vulnerable to spoofing attacks. Here proposing a multimodal
biometric identification system using face and signature as
the modalities. The security of the system get enhanced due
to the following reasons,
 Input face and signature are processed in the form
of templates
 Face and Signature are the physical and behavioral
characters of humans, which are difficult to spoof
simultaneously.
 The database stored as the final scores of face and
signature, which also enhances the security.
Step 1: Face and Signature are developed as templates-The
part of biometric data common to all biometric systems is a
template. A template is the refined, processed and stored
representation of the distinguishing characteristics of a
particular individual.
Step 2: Fusion of face and signature templates- Fusing face
and signature templates and extracting features from that.
Fusion has done by setting an alpha factor, which
representing the depth of fusion. Based on these features the
recognition is carrying out. Instead of considering the
modality as image, template representation and feature
extraction from that assumed to be easy for recognition.
Fused Template of face and signature is as shown in Fig- 3.
Fig- 3: Fused Template
Step 3: Feature extraction from the fused templates-
Features extracting from the fused template are,
1. Fourier transform and spectrum
2. Phase angle
3. Real and imaginary part
4. PCA component
5. LDA component
Step 4: Recognition of face and signature and calculating
the face and signature score has been carried out by
Euclidian Distance as shown by the equation (2). This
determines all nearest neighbors to each input feature vector
and finds the smallest sum of distance chosen.
𝐸𝑑 = (𝑥𝑖 − 𝑦𝑖)2𝑝
𝑖=1 (2)
Face recognition has been done by the template matching
using the features extracted from the template. Signature
recognition has been carried out by minutia extraction. The
traditional method consists of the following steps.
Binarization, thinning and minutiae detection
Binarization- This process consist in converting the gray
scale image in binary image, i.e., the intensity of the image
has only two values: black, representing the ridges, and
white, representing the valleys and the background
Thinning- The objective of thinning is to notice the ridges
of one pixel width. The process consists in performing
successive erosions until a set of connected lines of unit-
width is reached
Minutiae detection- From the binary thinned image, the
minutia is detected by using pattern masks. After a
successful extraction of minutiae, commonly they are stored
in a template, which may contain the minutia position,
minutia direction (angle), minutia type. Then it is compared
with the query image. Ridge Segmentation and Orientation
Field are used for finding the minutia position, angle and
other parameters. Minutiae image of the signature is as
shown in Fig-4.
Fig- 4: Minutiae image of Signature
Step 5: Fusion of face and signature score and calculating
the final score (Final score=Face score +Signature score) -
The face score and signature combined by a simple sum rule
and finding the final score. From the literature survey, found
that the sum rule gives better results than other rules. Then
these final scores are given to the neural network as inputs
for the classification.
Step 6: Based on the final score, classifying the input
images - The input to this classifier is the set of final scores;
the output will be the final decision about the user claimed
identity. In order to perform this task, the NN must be set by
target. Fig-5 and 6 representing the Message Box Indicating
the successful authentication and a failed one
Fig-5: Message Box Indicating If the Face and Signature are
not matched
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 803
Fig-6: Message box indicating the face and signature
matched to the person 1
7. EXPERIMENTAL RESULTS
Fig- 7: Samples of face and signature
The experiments are carried out on the database of 40 users
(ORL database). It contains the 8 different facial poses and 8
samples of the signature of each user. The model of the
experimental setup has been shown in Fig 7.In this 3 face
and 3 signature images are tested against 5 trained face and
signature images. By considering the entire system, 12
imposters are identified from the total face and signature
samples.
The equations (3), (4) are used for calculating the Genuine
Acceptance Rate and False Rejection Rate are as shown
below.
GAR =
No .of Genuine attempts accepted
Total No .of genuine attempts
(3)
FRR =
No .of Genuine attempts rejected
Total No .of genuine attempts
(4)
Table-1: Comparison of Error Rate and Accuracy Rates
From this calculation, 94% of GAR and 6% of error rate has
been obtained. Comparing the proposed multibiometric face
and signature system with single face identification system,
the error rate is found to be less.
Table.1 shows the Comparison of Error Rate and Accuracy
Rates .From the table it has been found that for a
multibiometric system, the combination of score level with
sum rule is better than feature level with sum rule. That is
the acceptance rate is higher for score level with sum rule.
8. CONCLUSIONS AND FUTURE WORK
An identification system by the fusion of two modalities
such as face and signature developed. For the score level
fusion, the data can be easily accessed. By the analysis it has
found that the error rate is less compared to a single
biometric system with face. And also the score level fusion
with sum rule is better than feature level with sum rule. By
considering 40 persons, the genuine acceptance rate is found
to be of 94% and the error rate is of 0.06 for a
multibiometric system of face and signature. The future
work can be done with other fusion levels, modalities,
matching algorithm, fusion rules, classifier which can
provide less error rates and more accuracy.
REFERENCES
[1] Frischholz.R.W and Dieckmann.U, (2000) ‘BiolD: a
multimodal biometric identification system,’ Cover
feature.
[2] Jain.A.K, Ross.A and Pankanti.S, (2006)
‘Biometrics: a tool for information security,’ IEEE
Transactions on Information Forensics and Security,
vol. 1, pp. 125-143.
[3] Kartik.P, S.R. Mahadeva Prasanna and Vara.R.P,
(2008) ‘Multimodal biometric person authentication
system using speech and signature features,’ in
TENCON 2008 - 2008 IEEE Region 10 Conference,
Ed, pp, 16.
[4] Kazi.M.M, Rode Y.S, Dab hade S.B, (2012),
‘Multimodal Biometric System Using Face and
Signature: A Score Level Fusion Approach’.
[5] Rodriguez.L.P, Crespo.A.G, Lara.M and
Mezcua.M.R, (2008) ‘Study of Different Fusion
Techniques for Multimodal Biometric
Authentication,’ in Networking and
Communications. IEEE International Conference on
Wireless and Mobile Computing.
[6] Toh.K.A, J. Xudong and Y. Wei-Yun, (2004)
‘Exploiting global and local decisions for multimodal
biometrics verification,’ Signal Processing, IEEE
Transactions on, vol. 52, pp. 3059-3072.
[7] Suryanti Awang, Rubiyah Yusof, (2011) ‘Fusion of
Face and Signature at the Feature Level by using
Correlation Pattern Recognition’, World Academy of
Science, Engineering and Technology 59.
[8] Gian Luca Marcialis and Fabio Roli, (2007) ‘Serial
Fusion of Fingerprint and Face Matchers’ M.
Haindl,© Springer-Verlag Berlin Heidelberg 2007.
Systems Biometric
identifiers
Fusion
level
GAR
and
Error
rate
Proposed System Face,
Signature
Score
level
(Sum
rule)
94%,
6%
Proposed System Face - 90.5%,9
.5%
Suryanti Awang et
al. [7]
Face,
Signature
Feature
level
(Sum
rule)
85.71%,
14.2-
20%
Kazi M.M et al. [4] Face - 87%,
12%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 804
[9] Shou-Der Wei, Shang-Hong Lai (2008) IEEE
Transactions on Image Processing 17(11), 2227-
2235.
[10] Abhishek Nagar, Karthik Nandakumar, Anil.K.Jain,
(2012) ‘Multibiometric Cryptosystems Based on
Feature-Level Fusion,’ IEEE transactions on
information forensics and security, vol. 7, no.
[11] Ulery B., Fellner W., Hallinan P., Austin Hicklin,
Watson C. (2006) Studies of Biometric Fusion report,
National Institute of Standards and Technology, 1-
14.
[12] M. M. Monwar and M. L. Gavrilova,
(2009)"Multimodal Biometric System Using Rank-
Level Fusion Approach," Systems, Man, and
Cybernetics, Part B: Cybernetics, IEEE Transactions
on, vol. 39, pp. 867-878.
[13] G. Feng, K. Dong, D. Hu and D. Zhang, (2004)
"When Faces Are Combined with Palmprints: A
Novel Biometric Fusion Strategy," in Biometric
Authentication. vol. 307.
BIOGRAPHIE
Amritha.k.c was born in Kerala, India in
1990. She received B.E degree in
Electronics and communication
engineering from Anna University
Chennai, tamilnadu,india in 2012 .She is
currently working towards M.E degree in
embedded system technologies at Anna
University Chennai ,tamilnadu,india. Her research interests
Digital Image processing, embedded system, digital
electronics.

More Related Content

What's hot

Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
 
2.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 202.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 20Alexander Decker
 
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...Alexander Decker
 
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasReview of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasCSCJournals
 
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionParag Tamhane
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET Journal
 
IRJET- Detection and Classification of Leaf Diseases
IRJET-  	  Detection and Classification of Leaf DiseasesIRJET-  	  Detection and Classification of Leaf Diseases
IRJET- Detection and Classification of Leaf DiseasesIRJET Journal
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
 
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
 
An SVM based Statistical Image Quality Assessment for Fake Biometric Detection
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionAn SVM based Statistical Image Quality Assessment for Fake Biometric Detection
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
 
IRJET- Image Processing based Detection of Unhealthy Plant Leaves
IRJET- Image Processing based Detection of Unhealthy Plant LeavesIRJET- Image Processing based Detection of Unhealthy Plant Leaves
IRJET- Image Processing based Detection of Unhealthy Plant LeavesIRJET Journal
 
Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectioneSAT Journals
 
Survey on semi supervised classification methods and
Survey on semi supervised classification methods andSurvey on semi supervised classification methods and
Survey on semi supervised classification methods andeSAT Publishing House
 

What's hot (20)

Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
2.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 202.human verification using multiple fingerprint texture 7 20
2.human verification using multiple fingerprint texture 7 20
 
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...11.0002www.iiste.org call for paper.human verification using multiple fingerp...
11.0002www.iiste.org call for paper.human verification using multiple fingerp...
 
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research AreasReview of Multimodal Biometrics: Applications, Challenges and Research Areas
Review of Multimodal Biometrics: Applications, Challenges and Research Areas
 
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusion
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
IRJET- Detection and Classification of Leaf Diseases
IRJET-  	  Detection and Classification of Leaf DiseasesIRJET-  	  Detection and Classification of Leaf Diseases
IRJET- Detection and Classification of Leaf Diseases
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
An SVM based Statistical Image Quality Assessment for Fake Biometric Detection
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionAn SVM based Statistical Image Quality Assessment for Fake Biometric Detection
An SVM based Statistical Image Quality Assessment for Fake Biometric Detection
 
xtremes
xtremesxtremes
xtremes
 
IRJET- Image Processing based Detection of Unhealthy Plant Leaves
IRJET- Image Processing based Detection of Unhealthy Plant LeavesIRJET- Image Processing based Detection of Unhealthy Plant Leaves
IRJET- Image Processing based Detection of Unhealthy Plant Leaves
 
Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selection
 
Survey on semi supervised classification methods and
Survey on semi supervised classification methods andSurvey on semi supervised classification methods and
Survey on semi supervised classification methods and
 

Viewers also liked

Simulation and hardware implementation of change in
Simulation and hardware implementation of change inSimulation and hardware implementation of change in
Simulation and hardware implementation of change ineSAT Publishing House
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocoleSAT Publishing House
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switcheseSAT Publishing House
 
Genetic programming for prediction of local scour at vertical bridge abutment
Genetic programming for prediction of local scour at vertical bridge abutmentGenetic programming for prediction of local scour at vertical bridge abutment
Genetic programming for prediction of local scour at vertical bridge abutmenteSAT Publishing House
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filtereSAT Publishing House
 
Performance evaluation of ti n coated carbide insert
Performance evaluation of ti n coated carbide insertPerformance evaluation of ti n coated carbide insert
Performance evaluation of ti n coated carbide inserteSAT Publishing House
 
Automatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridsAutomatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridseSAT Publishing House
 
Reconstruction of partially damaged facial image
Reconstruction of partially damaged facial imageReconstruction of partially damaged facial image
Reconstruction of partially damaged facial imageeSAT Publishing House
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofeSAT Publishing House
 
Treatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewaterTreatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewatereSAT Publishing House
 
Maximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissionMaximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissioneSAT Publishing House
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitaleSAT Publishing House
 
Position characterization of electro pneumatic closed
Position characterization of electro pneumatic closedPosition characterization of electro pneumatic closed
Position characterization of electro pneumatic closedeSAT Publishing House
 
Economic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case studyEconomic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case studyeSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Deceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredDeceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredeSAT Publishing House
 
Study of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soilStudy of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soileSAT Publishing House
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 

Viewers also liked (20)

Simulation and hardware implementation of change in
Simulation and hardware implementation of change inSimulation and hardware implementation of change in
Simulation and hardware implementation of change in
 
Embedded wrist watch
Embedded wrist watchEmbedded wrist watch
Embedded wrist watch
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
 
Genetic programming for prediction of local scour at vertical bridge abutment
Genetic programming for prediction of local scour at vertical bridge abutmentGenetic programming for prediction of local scour at vertical bridge abutment
Genetic programming for prediction of local scour at vertical bridge abutment
 
Wdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filterWdm based fso link optimizing for 180 km using bessel filter
Wdm based fso link optimizing for 180 km using bessel filter
 
Performance evaluation of ti n coated carbide insert
Performance evaluation of ti n coated carbide insertPerformance evaluation of ti n coated carbide insert
Performance evaluation of ti n coated carbide insert
 
Automatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridsAutomatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power grids
 
Reconstruction of partially damaged facial image
Reconstruction of partially damaged facial imageReconstruction of partially damaged facial image
Reconstruction of partially damaged facial image
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of of
 
Treatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewaterTreatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewater
 
Maximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissionMaximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmission
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
Position characterization of electro pneumatic closed
Position characterization of electro pneumatic closedPosition characterization of electro pneumatic closed
Position characterization of electro pneumatic closed
 
Economic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case studyEconomic feasibility report on cetp using physico chemical process-a case study
Economic feasibility report on cetp using physico chemical process-a case study
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Deceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredDeceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteered
 
Study of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soilStudy of nitrate adsorption characteristics on red soil
Study of nitrate adsorption characteristics on red soil
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 

Similar to Personal identification using multibiometrics score level fusion

MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentseSAT Journals
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Feature selection in multimodal
Feature selection in multimodalFeature selection in multimodal
Feature selection in multimodalijcsa
 
A New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image ProcessingA New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image Processingrahulmonikasharma
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...
Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...
Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...IJECEIAES
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyAIRCC Publishing Corporation
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENTENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENTIRJET Journal
 

Similar to Personal identification using multibiometrics score level fusion (20)

D56021216
D56021216D56021216
D56021216
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
K0167683
K0167683K0167683
K0167683
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
G0333946
G0333946G0333946
G0333946
 
Feature selection in multimodal
Feature selection in multimodalFeature selection in multimodal
Feature selection in multimodal
 
A New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image ProcessingA New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image Processing
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...
Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...
Multi-modal palm-print and hand-vein biometric recognition at sensor level fu...
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A Survey
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENTENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Recently uploaded

Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 

Recently uploaded (20)

Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 

Personal identification using multibiometrics score level fusion

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 800 PERSONAL IDENTIFICATION USING MULTIBIOMETRICS SCORE- LEVEL FUSION Amritha K.C1 , S.Velmurugan2 1 PG Scholar, EEE, K S R Institute for Engineering and Technology, Kerala, India 2 Assistant Professor, EEE, K S R Institute for Engineering and Technology, Tamilnadu, India Abstract A combination of more than one biometric is called multimodal biometric system. Here proposing an identification system by combining the feature of face and signature at matching score level. Thus, it is expected that spoofing two or more independent data would present more difficulty as compared to just one biometric data. With the hypothesis that impossible to spoof attack the physical quality and behavioral characteristic simultaneously, face and signature selected as the modalities of the biometric to be merged. The fusion, at the score level provides a matching score indicating the proximity of the feature vector with the template vector. These stacks can be blended with a simple sum rule. Storage of database in the form of these scores gives protection from hacking the databases. The results show that the error rates for this bimodal identification system is less than a single face identification system.GAR and FRR are used to evaluate the system performance. Keywords: Face, Signature, Genuine Acceptance Rate, False Rejection Rate. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Multibiometrics are a relatively new approach to overcome the problems of unibiometrics. Forced back by lower hardware costs, a multibiometric system uses multiple sensors for information acquisition. This leaves it to get multiple samples of a single biometric trait (called multi- sample biometrics) and/or samples of multiple biometric traits or multimodal biometrics). There are various different ways that multimodal systems can be made, based on the sources of the biometric information and the way the system is projected. The term ‘multimodal’ sometimes refers specifically to the lawsuit where two or more different biometric modalities are in economic consumption (such as face and fingerprint), spell the term multi-biometrics are more generic [1]. Fig-1: Biometric Authentication Process Based on the combination techniques, the biometric fusion fall into three general categories, depending on the point at which the compounding is conducted: feature fusion combines low-level distinguishing features, score fusion makes use of multiple match scores, and decision level fusion logically combines accept/reject matching decisions. That is, classifying the systems depending on how early in the authentication process the data from the different sensors is combined as shown in the Fig.1. 1.1 Feature Level Fusion In this architecture, the data extracted from the different sensors is encoded into a joint feature vector, which is then compared to an enrollment template (which itself is a joint feature vector stored in a database) and assigned a matching score as in a single biometric system 1.2 Score Level Fusion There are two accesses to the compounding of the similarity score level: classification and grade combination 1.2.1 Classification The idea of the classification approach is to consider verification as a classification problem with two classes: ‘Accept’ and ‘Reject’. Each authentication is represented by a feature vector that is composed of similarity scores from the various sub-systems. Training samples are collected, and machine learning or pattern recognition techniques (such as neural networks, support vector machines, decision trees, etc.) are used to build a model to distinguish the two classes. This classification model is applied to unseen data to make a verification decision. 1.2.2 Score Combination Score combination involves taking several scores and applying a formula to combine them into a single score.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 801 Some examples include adding the scores together, taking the average, or selecting the minimum or maximum score. Such various score level fusion techniques have been proposed by the researchers to normalize the matching scores, to be used in decision module of the multi-biometric system [11]. Fusion at score level fusion is as shown in the Fig.2. 1.2.2.1 Simple Sum of Raw Scores With no prior normalization matcher scores are simply added. Scores are neither rescaled, nor weighted to account for differences in matcher accuracy 1.2.2.2. Simple Sum of Z-Normalized Scores This technique follows following steps:  The estimation of the mean and standard deviation of imposter score distribution has been performed on the sample data.  The mean of the imposter distribution is subtracted to normalize the scores and then are dividing by the standard deviation of the imposter distribution.  Without weighting then the normalized scores are simply added. A normalized score is calculated by the equation: (1) Where 𝜇 is the mean and 𝜎 is the standard deviation of the matching score distribution. 1.2.2.3. Product of Likelihood Ratios This technique works with following steps:  In the first step probability density functions are modeled separately for genuine and impostor distribution by each.  For each matcher the Likelihood ratios are computed from these models.  Transformation is performed to their likelihood ratios to normalize scores.  Lastly, Normalized scores are simply multiplied. Fig-2: Fusion at Score Level 3. FUSION AT THE DECISION LEVEL In this fusion strategy, a separate authentication decision is made for each biometric trait. These decisions are then combined into a final vote. 4. PERFORMANCE MEASURES To judge the system performance of the scheme, the measurements used mainly are:  Genuine acceptance rate (GAR), the rate of people genuinely accepted over the total number of enrolled people.  False reject rate (FRR), the proportion of genuine transactions that are rejected by the system.  False accepts rate (FAR), the proportion of impostor transactions that are assumed by the organization. 5. RELATED WORKS Luca et al. used fingerprint and face to be fused at the score level [8]. PCA and LDA are used for the feature extraction and classification. Mean rule, product rule and Bayesian rule are used as the fusion techniques with FAR of 0% and FRR of 0.6% to 1.6%. Kartik et al. combined speech and signature by using sum rule as fusion technique after the min max normalization is applied [3]. Euclidean distance is used as the classification technique with 81.25% accuracy performance rate. Rodriguez et al. used signature as well with iris by using sum rule and product rule as the fusion techniques [5] Neural Network is used as the classification technique with EER below than 2.0%. There are some related researches combined more than two biometrics as in [6] that combined hand geometry, fingerprint and voice by using global and local learning decision as fusion approach. The accuracy performance is 85% to 95%.There are also some researches of multibiometric in which fusion is at decision level.Monwar and Gavrilova developed a multimodal biometrics system by using face, ear and signature. The features of the biometrics are extracted by using eigenface, engineer and eigensignature respectively and obtained a EER of 1.12% [12].Fusion at feature level, Feng et al. combined face and palmprint by concatenated the features extracted by using PCA and ICA with the nearest neighbor classifier (nnc) and SVM as the classifier [13]. From the related researches of the various multimodal biometric systems, at most of the cases the biometric features are stored in the database for the reference to the query inputs. It seems to be less secure, that is the spoofing of the biometry is possible. According to a multimodal biometry; fusion at score level with a simple sum rule gives good performance and easy implementation. Analyzed that multimodal biometry gives less error rates than a single biometry.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 802 6. PROPOSED WORK Biometrics, referred as the skill of distinguishing an individual based on his or her physical or behavioral traits, has been widely utilized as a security system in the aftermath of the latest security topics. Nevertheless, recent researches have indicated that many biometric traits are vulnerable to spoofing attacks. Here proposing a multimodal biometric identification system using face and signature as the modalities. The security of the system get enhanced due to the following reasons,  Input face and signature are processed in the form of templates  Face and Signature are the physical and behavioral characters of humans, which are difficult to spoof simultaneously.  The database stored as the final scores of face and signature, which also enhances the security. Step 1: Face and Signature are developed as templates-The part of biometric data common to all biometric systems is a template. A template is the refined, processed and stored representation of the distinguishing characteristics of a particular individual. Step 2: Fusion of face and signature templates- Fusing face and signature templates and extracting features from that. Fusion has done by setting an alpha factor, which representing the depth of fusion. Based on these features the recognition is carrying out. Instead of considering the modality as image, template representation and feature extraction from that assumed to be easy for recognition. Fused Template of face and signature is as shown in Fig- 3. Fig- 3: Fused Template Step 3: Feature extraction from the fused templates- Features extracting from the fused template are, 1. Fourier transform and spectrum 2. Phase angle 3. Real and imaginary part 4. PCA component 5. LDA component Step 4: Recognition of face and signature and calculating the face and signature score has been carried out by Euclidian Distance as shown by the equation (2). This determines all nearest neighbors to each input feature vector and finds the smallest sum of distance chosen. 𝐸𝑑 = (𝑥𝑖 − 𝑦𝑖)2𝑝 𝑖=1 (2) Face recognition has been done by the template matching using the features extracted from the template. Signature recognition has been carried out by minutia extraction. The traditional method consists of the following steps. Binarization, thinning and minutiae detection Binarization- This process consist in converting the gray scale image in binary image, i.e., the intensity of the image has only two values: black, representing the ridges, and white, representing the valleys and the background Thinning- The objective of thinning is to notice the ridges of one pixel width. The process consists in performing successive erosions until a set of connected lines of unit- width is reached Minutiae detection- From the binary thinned image, the minutia is detected by using pattern masks. After a successful extraction of minutiae, commonly they are stored in a template, which may contain the minutia position, minutia direction (angle), minutia type. Then it is compared with the query image. Ridge Segmentation and Orientation Field are used for finding the minutia position, angle and other parameters. Minutiae image of the signature is as shown in Fig-4. Fig- 4: Minutiae image of Signature Step 5: Fusion of face and signature score and calculating the final score (Final score=Face score +Signature score) - The face score and signature combined by a simple sum rule and finding the final score. From the literature survey, found that the sum rule gives better results than other rules. Then these final scores are given to the neural network as inputs for the classification. Step 6: Based on the final score, classifying the input images - The input to this classifier is the set of final scores; the output will be the final decision about the user claimed identity. In order to perform this task, the NN must be set by target. Fig-5 and 6 representing the Message Box Indicating the successful authentication and a failed one Fig-5: Message Box Indicating If the Face and Signature are not matched
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 803 Fig-6: Message box indicating the face and signature matched to the person 1 7. EXPERIMENTAL RESULTS Fig- 7: Samples of face and signature The experiments are carried out on the database of 40 users (ORL database). It contains the 8 different facial poses and 8 samples of the signature of each user. The model of the experimental setup has been shown in Fig 7.In this 3 face and 3 signature images are tested against 5 trained face and signature images. By considering the entire system, 12 imposters are identified from the total face and signature samples. The equations (3), (4) are used for calculating the Genuine Acceptance Rate and False Rejection Rate are as shown below. GAR = No .of Genuine attempts accepted Total No .of genuine attempts (3) FRR = No .of Genuine attempts rejected Total No .of genuine attempts (4) Table-1: Comparison of Error Rate and Accuracy Rates From this calculation, 94% of GAR and 6% of error rate has been obtained. Comparing the proposed multibiometric face and signature system with single face identification system, the error rate is found to be less. Table.1 shows the Comparison of Error Rate and Accuracy Rates .From the table it has been found that for a multibiometric system, the combination of score level with sum rule is better than feature level with sum rule. That is the acceptance rate is higher for score level with sum rule. 8. CONCLUSIONS AND FUTURE WORK An identification system by the fusion of two modalities such as face and signature developed. For the score level fusion, the data can be easily accessed. By the analysis it has found that the error rate is less compared to a single biometric system with face. And also the score level fusion with sum rule is better than feature level with sum rule. By considering 40 persons, the genuine acceptance rate is found to be of 94% and the error rate is of 0.06 for a multibiometric system of face and signature. The future work can be done with other fusion levels, modalities, matching algorithm, fusion rules, classifier which can provide less error rates and more accuracy. REFERENCES [1] Frischholz.R.W and Dieckmann.U, (2000) ‘BiolD: a multimodal biometric identification system,’ Cover feature. [2] Jain.A.K, Ross.A and Pankanti.S, (2006) ‘Biometrics: a tool for information security,’ IEEE Transactions on Information Forensics and Security, vol. 1, pp. 125-143. [3] Kartik.P, S.R. Mahadeva Prasanna and Vara.R.P, (2008) ‘Multimodal biometric person authentication system using speech and signature features,’ in TENCON 2008 - 2008 IEEE Region 10 Conference, Ed, pp, 16. [4] Kazi.M.M, Rode Y.S, Dab hade S.B, (2012), ‘Multimodal Biometric System Using Face and Signature: A Score Level Fusion Approach’. [5] Rodriguez.L.P, Crespo.A.G, Lara.M and Mezcua.M.R, (2008) ‘Study of Different Fusion Techniques for Multimodal Biometric Authentication,’ in Networking and Communications. IEEE International Conference on Wireless and Mobile Computing. [6] Toh.K.A, J. Xudong and Y. Wei-Yun, (2004) ‘Exploiting global and local decisions for multimodal biometrics verification,’ Signal Processing, IEEE Transactions on, vol. 52, pp. 3059-3072. [7] Suryanti Awang, Rubiyah Yusof, (2011) ‘Fusion of Face and Signature at the Feature Level by using Correlation Pattern Recognition’, World Academy of Science, Engineering and Technology 59. [8] Gian Luca Marcialis and Fabio Roli, (2007) ‘Serial Fusion of Fingerprint and Face Matchers’ M. Haindl,© Springer-Verlag Berlin Heidelberg 2007. Systems Biometric identifiers Fusion level GAR and Error rate Proposed System Face, Signature Score level (Sum rule) 94%, 6% Proposed System Face - 90.5%,9 .5% Suryanti Awang et al. [7] Face, Signature Feature level (Sum rule) 85.71%, 14.2- 20% Kazi M.M et al. [4] Face - 87%, 12%
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 804 [9] Shou-Der Wei, Shang-Hong Lai (2008) IEEE Transactions on Image Processing 17(11), 2227- 2235. [10] Abhishek Nagar, Karthik Nandakumar, Anil.K.Jain, (2012) ‘Multibiometric Cryptosystems Based on Feature-Level Fusion,’ IEEE transactions on information forensics and security, vol. 7, no. [11] Ulery B., Fellner W., Hallinan P., Austin Hicklin, Watson C. (2006) Studies of Biometric Fusion report, National Institute of Standards and Technology, 1- 14. [12] M. M. Monwar and M. L. Gavrilova, (2009)"Multimodal Biometric System Using Rank- Level Fusion Approach," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 39, pp. 867-878. [13] G. Feng, K. Dong, D. Hu and D. Zhang, (2004) "When Faces Are Combined with Palmprints: A Novel Biometric Fusion Strategy," in Biometric Authentication. vol. 307. BIOGRAPHIE Amritha.k.c was born in Kerala, India in 1990. She received B.E degree in Electronics and communication engineering from Anna University Chennai, tamilnadu,india in 2012 .She is currently working towards M.E degree in embedded system technologies at Anna University Chennai ,tamilnadu,india. Her research interests Digital Image processing, embedded system, digital electronics.