More Related Content
Similar to Multimodel Biometric System: A Review (20)
Multimodel Biometric System: A Review
- 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1089
Multimodel Biometric System: A Review
Mohit Kumar Verma
M. Tech. Scholar CSE Department
BBD University
Lucknow, India
mkvrm455@gmail.com
Mohd. Saif Wajid
Assistant Professor CSE Department
BBD University
Lucknow, India
mohdsaif06@gmail.com
Abstract—Biometric system identify a person using
physiological and behavioral biometric data. In this paper give
the overview of Multimode biometric systems. It starts with
basic modeling technique for biometric system. We discus
about the procedure, How to recognize the person and various
methodologies and literature use for identify real or fake
person using multimode biometric system. Our multimode
biometric certification solution is based on finger print, iris,
face, voice, ear, DNA, signature.
Keywords—Biometrics, Unimodal biometrics, Multimodal
biometrics, Fusion level.
I. INTRODUCTION
Along of different biometrics systems. In the recent decades.
Individual have been reliant to various advances, for
example, signature reviewed, picture getting, scanner name
framework, attestation ID, etc. Biometric is one of Image
Processing's huge applications. Biometric identifies with
systems for client endorsement that measure and study the
highlights of human body.The biometric check structure rely
upon two modes: Enrolment and Recognition. In the
enrolment mode, the biometric data is gotten from the sensor
and set away in a database close by the person's character for
the affirmation. Biometric affirmation dependent on
uniqueness and lastingness. The uniqueness infers that
between two particular biometrics data there is no likeness of
capacity. For instance same unique finger impression
highlight and the highlights of biometrics don't change over
the gap life. Biometric affirmation dependent on uniqueness
and changelessness. Biometrics may have highlights of
physiological or conduct. The physiological characteristics
are consolidated into the physical bit of body. For instance -
face, unique mark, palm, iris, DNA, retina and so forth. The
conduct highlights depend on an individual's activity. For
instance - signature examine, voice acknowledgment and so
on.
II. BIOMETRICS
A. Fingerprint
The finger impression is unquestionably one of the most
striking biometric properties in setting on its uniqueness and
consistency after some time, It's been used for longer about
a year. In perspective on the various sources accessible for
the gathering of information, for example ten fingers, its
characteristic straightforwardness in procurement and its
built up use and gathering by law requirement and
movement, it has been and still is extremely prevalent. A
unique finger impression is brought about by the ridges
edges of a human finger, typically showing up as dull lines,
which speak to the high, topping piece of the skin. The
shallow parts of the skin are the valleys that are spoken to by
the blank areas [1]. The extraordinary imprint biometric
structure has four essential steps which fuse getting the
extraordinary imprint, extraction of the features, saving of
the data and differentiating the data and various fingerprints
in the database. The one of a kind imprint biometric structure
has since its initiation benefitted by its level of exactness,
how it is one of the most made biometric systems, its
usability and the little extra room required for the biometric
format, in this way decreasing the database memory [2].
The edges and wrinkles are not subject for the uniqueness of
fingerprints, rather the "minutiae". The nuances are depicted
as the model made and the uniqueness of the path by which
edges end, split in like manner, join, or show up as a
reasonable piece. Conspicuous evidence in special imprint
development occurs exactly when an individual one of a kind
imprint is taken a gander at against an acknowledged source
called the interesting imprint design [3][4].
Fig.1 Fingerprint classification
B. Palm Print
The palmprint biometric structure is a for the most part
new biometric when appeared differently in relation to other
biometric systems, for instance, face, remarkable imprint
and iris affirmation structures[5]. it has a more extensive
RESEARCH ARTICLE OPEN ACCESS
- 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1090
surface territory at the point when contrasted with the
unique mark and hand geometry; thus it is required to
deliver extraordinary trademark attributes that can be
dependable when utilized for ID [6]. The palmprint has got
chief lines isolated into three locales to be specific the
Interdigital district, Thenar locale and Hypothenar area. The
Interdigital locale is seen over the heart line, the Thenar area
is seen just underneath the existence line and the
Hypothenar is seen between the heart and life [7,8].
.
Fig.2 Palm Print
C. Iris
The iris is a muscle indirect checking how much light
will come into the eye. Iris is a ring-molded cornea
behind the eye [9]. After death, the iris is exceptionally
difficult to utilize on the grounds that it is one of the
primary segment of the body to decay after death.
Aleksandra Babich expressed that the one of a kind
example shaped by the iris is what is utilized by the iris
filter innovation to particularly recognize an individual
and that the iris example of an individual is additionally
not the same as those of others [10]. This declaration
was also reinforced by the proverb that "even the iris of
a ton of twins are exceptional"[11]. In perspective on iris
information iris affirmation structures used at present are
reasonable in perspective on their speed and precision
that make the system the biometric framework which is
producing and frequently used. Enlistments require
numerous pictures of the iris design, making the
enlistment procedure rather long. At the point when a
person's iris is filtered, another layout is created and it is
then contrasted and the current formats that were
delivered during enrolment[12]. Most organizations that
have actualized iris based innovation with the end goal
of staff and client recognizable proof have accomplished
noteworthy, quantifiable and cost legitimizing
benefits[13]. To improve the work done on iris
affirmation on phones, joining iris division and the
understudy of the eye was proposed. For clients wearing
glasses, an iris acknowledgment framework on cell
phones that depends on corneal specular reflections was
proposed [14], utilizing a cell phone camera to catch 400
iris pictures from 100 individuals. The investigation
uncovered the right pace of the framework was 99.5%
for pictures of individuals not wearing glasses and
98.9% for those wearing glasses, with 0.05% EER on
recognized iris pictures[15]. In early work on the iris
acknowledgment framework, an iris detecting technique
dependent on opening of the eyes was proposed, where
highlights, for example, eyelashes and the eyelid were
expelled.
Fig.3 iris classification
D. Face
People are perceived and recognized utilizing the
structure of the face, which is comprised of pinnacles and
valleys at various heights and has highlights situated at
different scopes and longitudes. The face sweep catches the
essence of a person during enlistment and stores it for future
confirmation of the person. The face affirmation system has
created from using clear geometric models to using
progressed numerical depiction and planning techniques for
unmistakable evidence [16]. A face identification
framework that depends on a neural system and the shade of
the skin was executed. The framework indicated effective
recognition of countenances on recordings and photographs
[17]. A face acknowledgment framework utilizing a help
vector machine for identifying the face was additionally
actualized, where versatile chart coordinating was utilized to
find the element purposes of the facial picture. Face
acknowledgment frameworks have pulled in a lot of
consideration among different orders. In [18,19] the creators
exhibited a face-and-eye discovery conspire by
consolidating certain highlights with Ad-aBoost. Promising
outcomes were accomplished, demonstrating the probability
of verification through the face on cell phones. The
confirmation rate accomplished was 82% for (40 x 40
pixels) and the normal verification rate accomplished for (80
x 80 pixels) was 96%. In addition, utilizing every single
accessible datum procured from a shot near a person's head,
a cell phone open system was proposed[20]. A face
identification framework that depends on a neural system
and the shade of the skin was executed. The framework
indicated fruitful recognition of appearances on recordings
- 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1091
and photographs[21,22]. A face acknowledgment
framework utilizing a help vector machine for identifying
the face was likewise executed, where flexible diagram
coordinating was utilized to find the element purposes of the
facial picture. The trials demonstrated the viability of the
face acknowledgment framework dependent on its outcome.
The essential shortcoming of the face affirmation system is
that the structure isn't viable by virtue of obstacle, where
some segment of the face is verified and it is in this way not
had the alternative to get the major and critical bit of the
face[23]. Furthermore, until PCs consolidate inbuilt cameras
as fundamental embellishments, it is likely not going to end
up obvious.
Fig.4 Face recognition
E. Voice
The voice acknowledgment framework utilizes a
person's voice for deciding personality dependent on the
diverse trademark voice highlights. Voice recognition use
for easily detect the person by hearing the sound of person.
The Center for Laryngeal and Voice Disorder at John
Hopkins Hospital depicted the basic job of the larynx, which
is arranged in the foremost neck. During the enlistment
procedure utilizing voice acknowledgment innovation, a
specific voice for an individual is recorded and put away in
an ace layout and utilized for further check of that specific
person. The biometric framework has been generally
executed in money related foundations with the end goal of
remote access telephone utilities. Utilizing MATLAB, a
voice recognizable proof based security framework was
executed as an entrance control key where rationale 1
speaks to a decent voice match and rationale 0 show a
confuse. Full precision was appeared at a reasonable
deviation set at 15% [24]. A framework to know or check a
client inside a brief timeframe was created by Barclays
utilizing speaker acknowledgment. To identify knobs in
vocal creases, a larynx pathology classifier was actualized
indicating 90% characterization precision[25,26]. The
classifier depended on direct expectation coefficients, least
squares bolster vector machines and Daubechies discrete
wavelet change [27]. In light of cross connection of mel
recurrence cepstral coefficients, a voice acknowledgment
framework was created and indicated amazing execution as
far as exactness for acknowledgment of words [28,29].
F. Signature
The penmanship and signatory innovation that is utilized
for littler spending plans has as of late been favored by most
businesses for recognizable proof and check what's more,
has been recognized by the organization, genuine and
business trades with the ultimate objective of affirmation.
Dynamic signature acknowledgment is the estimation of all
the different attributes when an individual makes a mark and
these distinguished qualities are what recognizes a person.
Such attributes incorporate the speed, timing, velocity and
bearing of mark strokes that are altogether broke down in a
X, Y and Z heading. This sort of biometric system can either
be on-line or separated physically composed imprint
recognizing confirmation. Like all biometric frameworks,
for confirmation or recognizable proof there must be an
acknowledgment layout where clients sign to make an ace
format, which is later contrasted and the mark[30]. The use
of this biometric framework in cell phones in an open way
was structured after a trial including 20 clients where
normal FAR and FRR of 0 and 1.2 were accomplished
individually. Besides, an online hand signatory biometric
framework on contact interface based cell phones was
presented, which can be spoken to by an interesting
component obtained from qualities of different
investigations figured continuously [31,32]. An
investigation led by to investigate different portable
acquisitions for cell phones prompted a proposed mark
check framework that consolidated score combination with
Hidden Markov Models[33].
Fig.5 signature recognition
G. Gait
Gait is the walking route of person. Gait biometric can
be used in observing application as it can be recognized
from a distance. The step of an individual can be known
effectively in open places by the utilization of basic
instrumentation and needn't bother with the dynamic
- 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1092
consideration of the individual, which is a touch of slack
over other biometric structures. The step acknowledgment
framework can be utilized from a separation, making it
exceptionally powerful and a significant biometric technique
regarding security and for wrongdoing scenes[34]. The
structure of the framework consolidates perceiving the
subject, chart extraction, extraction of highlights,
affirmation of highlights and grouping[35]. A view
concentrated element was separated from the stride vitality
picture and it was accepted that there would be comparable
and strolling patters in the walk vitality pictures that could
be used for confirmation[36,37]. Various arrangements have
broke down the execution of the walk insistence structure.
Utilizing particular segment portrayals, a walk attestation
structure that perceives people through view blend was
proposed, where the blend of different highlights happened
and these were seen on the Genetic Fuzzy Support Vector
Machine [38].
Fig.6 gait recognition
H. Retina
Retina is a layer of complex veins and nerve cell on the
back of eyes. Retina biometric is huge for exhibiting the
extraordinary of person. The retinal information is dealt
with in the retina database so as to sort out the true and
definite driving force with the bogus one. Beforing dealing
with the hash respect, retinal structures are being dealt with
in the database and some time later hash respects are applied
to it[39]. The retinal information is dealt with in the retina
database to encourage the affirmed and careful rousing
power with the fake one. Beforing dealing with the hash
respect, retinal game plans are being dealt with in the
database and after that hash respects are applied to it[40].
Fig.7 retina recognition
I . Ear
The ear assemble sound waves and convert them into nerve
signals for our brains to unravel. Human ears can perceive
an enormous extent of different sound pitched birdsongs to
the low roar of thunder and from the faintest mumble to the
roar of a lion. The human ear is another field of biometric
look into. Analysts have as of late researched the utilization
of 2D [41,42] and 3D ear shape information. For biometric
affirmation, various features can be shown in a 2D ear
picture. The wording of the human external ear is
introduced[43,44].
J. DNA
Deoxyribonucleic acid relates to DNA. DNA biometric
mainly used for crime investigation or any genetic character
find. The core of each human cell conveys a lot of novel
code for making new cells to manufacture and keep up the
body. A strand of DNA looks like a bowed ladder, with two
long, slim strands related bungs. These rungs are called
bases and are comprised of four unique synthetic
substances. The bases cooperate to shape guidance for
making proteins-the structure materials that make up our
organs, muscles, blood, bones and hair.
Comparison of various Biometric Identification
High(H),Mid(M),Low(L)
Biometric
Identifier
Universality
Permanence
Distinctive
Acceptability
Collectability
Circumvention
Performance
Finger
Print
M H H M M M H
Palm
Print
M H H M M M H
Iris H H H L M L H
Face H M L H H H L
- 5. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1093
Voice M L L H M H L
Signature L L L H H H L
Gait M L L H H M L
Retina H M H L L L H
Ear M H M H M M M
DNA H H H L L L H
“High” demonstrates that the specific biometric identifier is
having generally excellent execution, while terrible showing
in the assessment criteria is spoken to by “Low” and normal
execution in the assessment criteria is spoken to by
“Mid”[45].
III. UNIMODEL BIOMETRIC
In reality , unimodal is utilized in biometric frameworks
applications. They rely upon the proof of authentication a
wellspring of data for verification. These systems will have
to solve a range of problems such as: noise in sensed records.
(e.g. continuously use of sensor such as fingerprint).
Intra-class variation: User typically generates these
disturbances when acting wrongly with the sensor.
Inter-class similarity: There may be between class slight
contrasts in the movement space of thousands of clients in
biometric framework if there are gigantic number of client.
Non-universality: This probably won't be sensible for the
biometric structure to accomplish liberal biometric data from
a client subset.
Spoof-attack: A specific occurrence happens when mark or
tone is being utilized in the biometric framework. By
including different wellsprings of personality information,
not so everything except rather some of limits of the
unimodal can be survived. These sorts of structure are called
as Multimodal Biometric Systems. Because of the impact of
various distinctive biometrics, these frameworks are
significantly more accurate[46]. They do have higher
effectiveness, as ridiculing different biometric highlights a
genuine client simultaneously would be hard for an inept
trick. Likewise, they give a test – response kind of
instrument by referencing the customer to show an
unpredictable subset of biometric characteristics in this
manner ensuring that a "live" customer is without a doubt
present at the reason for data procurement[47]. Some normal
multimodal biometrics are: extraordinary imprint and face,
novel imprint and iris, iris and face.
IV. MULTIMODEL BIOMETRIC
Multimodal biometric is a system that joins the got result
from more than one biometric characteristics with the
ultimate objective of individual distinctive evidence. Since
such a significant number of independent biometric
procedure were being utilized, multimodal biometric
innovation are more dominant than unimodal biometric[48].
To utilize a multimodal biometric strategy will happen in
exceptionally exact and safe biometric distinguishing proof
modular, in light of the fact that unimodal biometric
technique given to non – all inclusiveness would not give
profoundly modern recognition. For instance, two or three
degrees of individuals can have cut, worn or unrecognizable
prints, one of a kind imprint biometric may convey unseemly
results. The mistake in Multimodal biometric Systems of any
one development may not affect genuinely the individual
unmistakable evidence as different headways can be
adequately used. In this manner the exaggerating can
unfathomably be constrained; thusly improving the
capability of the general system. The decrease in inability to
select (FTE) rate in multimodal biometric framework is
noteworthy and which is one of principle favorable
circumstances of this framework. The four normal modules
in any biometric framework are [49] - sensor module,
include extraction module, coordinating module and basic
leadership module.
A. Sensor module
Using the biometric sensor or scanner, the client’s crude
information is estimated in this module. This crude biometric
information is recorded and after that it is moved to the
following module for highlight extraction. The different
components like expense and size are affected by the plan of
the sensor module of the biometric framework.
B. Include extraction module
Include extraction module by and large called Feature
extraction module. In this module, the unforgiving data that
moved from the sensor module. Along these lines making a
decreased now expressive pushed depiction of the
noteworthy characteristics or modalities. In the wake of
ousting the features it is given as vow to the dealing with
module for further examination.
C. Coordination module
Coordination module otherwise called coordinating
module. The isolated features when differentiated and the
arrangements in the database produce a match score. This
match score may be obliged by the idea of the given
biometric data. The organizing module in like manner united
an essential initiative module where the created match score
is used to support the ensured character.
D. Basic leadership module
Basic leadership module otherwise called Decision
making module. Fundamental initiative module perceives
whether the customer is a veritable customer or an impostor
reliant on the match scores. These are used to either support
the character of an individual or gives a situating of the chose
characters for perceiving an individual.
MULTIMODAL SYSTEM TYPES
In specialty, sensor and feature a wide range of kinds of
multimodal frameworks are there:
Single biometric specialty, multiple sensors:
Different sensors are utilized to record the equivalent
biometric trademark. The crude information taken
from various sensors would then be able to be joined
- 6. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1094
at the component level or matcher score level to
improve the exhibition of the framework.
Various biometrics: Multiple biometric qualities, for
example, fingerprints and face can be joined. Various
sensors are utilized for each biometric trademark. The
interdependency of the characteristics guarantees a
critical improvement in the exhibition of the
framework. A business item Bio ID uses voice, lip
movement and face of a client to confirm character .
Different unit, single biometric feature: At least two
fingers of a solitary client can be utilized as a
biometric trademark. It is reasonable procedure for
improving framework execution, as it doesn't require
different sensors or combining extra component
extraction or arranging modules. Iris can in addition
be joined into this plan.
Multiple snapshots of single biometric: In this more
than one case of the proportional biometric is used for
the affirmation. For instance various impressions of a
comparative finger or different instances of the voice.
Various planning figurings for the proportional
biometric: In it different systems can be applied to
feature extraction and organizing of the biometric
trademark.
METHODS OF OPERATION
A multimodal biometric framework can work in three
modes:
Serial mode: In the serial mode the yield of one
biometric trademark is used to diminish the no of potential
characters before the accompanying trademark is used. In
this manner, different information sources are not assembled
simultaneously.
Parallel mode: In parallel mode the data from numerous
qualities is taken together to perform acknowledgment.
Hierarchical mode: A tree-like structure joins unique
classifiers in it. That first method is suitable because we have
a enormous number of algorithms.
USES OF MULTIMODAL BIOMETRIC
The obstacle and networks of input involve irregular
processes of state security. The important aspects using the
multimodal biometrics are the outskirts of the managers, the
interface for crook and prevalent apps and call confirmation
expert. Individual data and Business exchanges require
extortion anticipate arrangements that expansion security and
are savvy and easy to understand. Multi modular biometrics
can give best answers for every one of the zones where
abnormal state security frameworks are required.
V. LEVEL OF FUSION
There are four distinct modules in biometric frameworks which are
quickly talked about as given underneath:
1) Sensor Module: Traits are caught as crude biometric
information.
2) Feature Extraction Module: It forms the caught
information to separate a significant list of capabilities.
3) Matching module: It looks at the separated list of
capabilities with the format put away in the database to
produce coordinating scores with the assistance of certain
classifiers.
4) Decision module: It utilizes the outcomes acquired
from the coordinating score module to either decide a
character is certified or counterfeit or approve a guaranteed
personality [50].
The concise portrayal of four distinct degrees of
combination is depicted as pursues:
A) Sensor Level Fusion
Here crude information got from different sensors is
handled what's more, joined to create the new information.
It is possible to use this new data to isolate features. Sensor
level combination is to be performed in two conditions.
Right off the bat, if in various good sensors, the numerous
signals are the occasions of same biometric characteristic.
Besides, if numerous cases of same biometric characteristic
acquired from a solitary sensor. For instance: - 3D model of
face. Sensor adjustment and information enrollment is done
before playing out the combination at Sensor level [51]. The
crude information caught from different sensors can be
prepared and incorporated at the information level or
highlight level. This made data can be used to isolate better
than anything anyone may have foreseen features.
Combination of information from different data sources is
increasingly effective to speak to the information. In the
sensor level combination we manages the combination at
pixels level. The unrefined data from different sources are
into a lone picture. This method is known as pixel level mix.
This interweaved picture is rich of information than any of
the individual picture. In this, we get 2D and 3D photos of
any quality and unite them at data/feature level similarly as
match score level[52].
B) Feature Level Fusion
Feature level combination joins
the feature got from various sources. It did the feature that
are fundamentally good with one another. Besides
consolidating the features will present a scourge of
dimensionality. Feature level combination is understudied
field of biometric framework. Combination at this level
comprises of coordination of feature sets acquired from
various data sources. The component set contains preferred
quality crude biometric data over the match score. In any
case, it is hard to accomplish include level combination
because of following reasons:
(1) Multiple modalities incongruence
(2) The association between the part spaces of different
biometric structures are dull
(3) Connecting two component vectors may bring about an
enormous dimensional component vector which may cause
"revile of dimensionality".
Methods utilized at feature level are design
acknowledgment, fluffy rationale, and neural systems[53].
PCA and Linear Discriminant Analysis (LDA)[54] were
performed on these part pictures in order to isolate bona fide
- 7. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1095
Incorporate. Log-Gabor Space, Kernel DCV, Kernel Fisher
Discriminant assessment, SIFT and PSO are used to perform
feature decision of the photos[55].
C) Match Score Level fusion
The likeness between the Information and affiliation set
away in the database is surveyed at match score level. In
match score level mix, the match score got from various
matchers are joined. Systematization hypothesis are used to
make the match score homogeneous got by the different
matchers. If all else fails there are three structures through
which we can accomplish match score level mix are given
underneath:
1) Transformation-based combination at score level (for
model, aggregate principle which is gone before by
standardization like min-max, weighted item rule)
2) Score level combination dependent on classifier (for
instance, Bolster Vector Machine, Bayesian principles,
hyperbf systems, choice trees and so forth.)
3) Score level combination dependent on thickness (for
instance, probability proportion test with GMM) [56,57].
D) Decision Level Fusion
Decision level mix includes blend of decision gotten
from various modalities. It reveals to us that we need to
acknowledge/dismiss the personality. Since choice level
combination called as theoretical level combination since it
holds parallel qualities [58]. At this level a choice is made
on the matcher's worth that whether the client is real or
fraud. Combination is performed at choice level for the
distinguishing proof of an individual as opposed to check.
At this level, a choice is given by every classifier. On check
applications, it is an acknowledged/dismissed choice.
Strategies utilized for combination are What's more,
guideline, OR principle and lion's share casting a ballot.
ACKNOWLEDGMENT
This paper presents various issues identified with uni-
specific biometric frameworks. By sorting out different
wellspring of data, the introduction of multi-specific
biometric structure can be improved. Besides, we
investigated the social occasion of biometric structures,
explicitly unimodal and multimodal. In context on the flaws
of unimodal biometric structures and the insufficiency of the
different sorts of biometric progression frameworks as
examined, the multimodal biometric structure has been
recognizable as a favored game-plan with managing the
different issues. The various levels and strategies for mix
utilized in multimodal biometric frameworks were also
confirmed. The evaluation presumes that multi-segregated
biometric framework can be continuously productive in
security rather than uni-estimated security structure. It will
give redesignd security highlights.
REFERENCES
[1] M.Roco & W.Bainbridge ,“US_National_Science_&_Technology
Council,_Subcommittee_on_Nanoscale_Science_Engineering_and__
Technology_2001” Societal implications of nano science & nano
technology
[2] K.Adewole & S.Abdulsalam & R.Babatunde & T.Shittu &
M.Oloyede,“Development_of_Fingerprint_Biometric_Attendance_Sy
stem_for_Non-Academic_Staff_in_a_Tertiary_Institution”
Development vol. 5_ 2014.
[3] A.Babich,“Biometric_Authentication_Types_of_biometric_identifiers
” 2012.
[4] G.Li & C.Busch & B.Yang “A_novel_approach_used_for_measuring
fingerprint_orientation_of_arch_fingerprint,” in_Information_and
Communication_Technology, Electronics ,Microelectronics
(MIPRO), 2014_37th
_International_Convention_on_2014_pp._1309-
1314.
[5] Satya Verma & Saravanan Chandra “Contactless Palmprint
Verification System using 2-D Gabor Filter and Principal Component
Analysis” The International Arab Journal of Information Technology,
Vol. 16, No. 1, January 2019
[6] R.R.Isnanto & A.A.Zahra & E.D.Widianto, “Palmprint_recognition
system_based_on_Principle-lines_feature_using_Euclidean_Distance
and_neural_network” in_2015_2nd
_International_Conference_on
Information_Technology,_Computer,Electrical_Engineering(ICITAC
EE), 2015_pp._153-158
[7] P.Xinrong & T.Yangmeng & W.Jiaqiang “A_Survey_of_Palmprint
Feature_Extraction_Algorithms” in_Intelligent_Systems_Design_and
Engineering_Applications_2013_Fourth_International_Conference
on_2013_ pp._57-63.
[8] Satya Bhushan Verma & Saravanan Chandran, Touchless Region
basedPalmprint Verification System, International Journal of
ComputerScience and Information Security (IJCSIS), Vol. 15, No. 4,
April 2017.
[9] Shaabad A.Sahmoud & Ibrahim S. Abuhaiba, “Efficient_iris
segmentation_method_in_unconstrained_environments” Pattern
[10] Recognition, vol.46, no.12, pp. 3174-3185, 2013.
[11] V.M.Mane & D.V.Jadhav & P.V.M. Mane, “Review_of_Multimodal
Biometrics_: Applications_challenges_and_Research_Areas”
International_journal_of_biometrics_and_bioinformatics_vol._3_no.
5, pp._90-95_2009.
[12] S.R.Ganorkar & A.A.Ghatol, “Iris_recognition:_an_emerging
biometric_technology” in_Proceedings_of_the_6th
_WSEAS
International_Conference_on_Signal_Processing_Robotics_and_Auto
mation_2007_pp. 91-96.
[13] A.Hematian & A.A.Manaf & S.Chuprat & R. Khaleghparast & S.
Yazdani, “Field_programmable_gate_array_system_for_real-time
IRIS_recognition” in_Open_Systems_(ICOS)_2012_IEE_
Conference on_2012_ pp. 1-6.
[14] P. Radu & K.Sirlantzis & W.Howells & S.Hoque & F.Deravi,
“Image_Enhancement_vs_Feature_Fusion_in_Colour_Iris_Recogniti
on," in_Emerging_Security_Technologies_(EST)_2012_Third
International_Conference_on_2012_pp._53-57.
[15] D.h. Cho & K.R.Park & D.W. Rhee & Y. Kim & J. Yang, “Pupil_and
iris_localization_for_iris_recognition_in_mobile phones” in_Software
Engineering,_Artificial_Intelligence,_Networking,_and_Parallel/Distr
ibuted Computing_2006._SNPD_2006_Seventh_ACIS_International
Conference_on_2006_pp._197-201.
[16] L. Yunqi & L. Haibin & J. Xutuan, “3D_face_recognition_by_SURF
operator_based_on_depth_image” in_Computer_Science_and
Information_Technology_(ICCSIT)_2010_3rd
_IEEE_International_C
onference_on_2010_pp._240-244
[17] Nitya Khare & Mohd. Saif Wajid, “An_Image_Resolution: A
Survey” in_computer_science,_Voume 5_issue_5.May_2017_paper
id: IJSER151455.
[18] Prakasha S. & Guptab P. : “Human_recognition_using_3D_ear_
images”.
[19] J.Parris & M.Wilber & B.Heflin & H.Rara & A.El-Barkouky & A.
Farag et al., “Face_and_eye_detection_on_hard_datasets” in
Biometrics (IJCB)_2011_International_Joint_Conference_on_2011_
pp. 1-10.
[20] L. Yunqi & L. Haibin & J. Xutuan “3D_face_recognition_by_SURF
operator_based_on_depth_image” in_Computer_Science_and
- 8. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1096
Information_Technology (ICCSIT)_2010_3rd
_IEEE_International
Conference on_2010_ pp._ 240-244.
[21] M. Hayat & M.Bennamoun & A.A.El-Sallam “Fully_automatic_face
recognition_from_3D_videos” in_Pattern_Recognition_(ICPR)_2012
21st International_Conference_on_2012_pp._1415-1418.
[22] R. Dieter Findling & R.Mayrhofer “Towards_pan_shot_face_unlock:
Using_biometric_face_information_from_different_perspectives_to_
unlock_mobile_devices” International_Journal_of_Pervasive
Computing_and_Communications_vol._9_pp._190-208_2013.
[23] A.Y.J.Nakanishi & B.J.Western, “Advancing_the_state-of-the-art_in
transportation_security_identification_and_verification_technologies:
Biometric_and_multibiometric_systems” in Intelligent_Tran
sportation_Systems_Conference_2007_ITSC_2007_IEEE_2007, pp.
1004-1009.
[24] D.Rudrapal &S.Das & S.Debbarma & N.Kar, & N.Debbarma,
“Voice_recognition_and_authentication_as_a_proficient_biometric_t
ool_and_its_application_in_online_exam_for_PH_people”
International_Journal_of_Computer_Applications_vol._39_2012.
[25] R.A.Rashid & N.H.Mahalin & M.A.Sarijari & A.Abdul Aziz,
“Security_system_using_biometric_technology:Design_and_impleme
ntation_of_Voice_Recognition_System(VRS)” in_Computer_and
Communication_Engineering_2008_ICCCE_2008_International_Con
ference on_2008_ pp._898-902.
[26] D.Miller & D.Top, “Voice_biometrics_2010: A_transformative_year
for_voice-based_authentication” ed:_May_2010.
[27] F.Elmisery & A.Khaleil & A.Salama & F.El-Geldawi, “An _FPGA
Based_VQ_for_Speaker_Identification” in_Microelectronics_2005.
ICM 2005_The_17th
_International_Conference_on_2005_pp._130-
132.
[28] R.Sankar “Experimental_evaluation_of_structural_features_for_a
speaker-independent_voice_recognition_system” in_System_Theory,
1988._Proceedings_of_the_Twentieth_Southeastern_Symposium_on,
1988_ pp_378-382.
[29] F.G.Barbosa & W.L.S.Silva “Automatic_voice_recognition_system
based_on_multiple_Support_Vector_Machines_and_mel-frequency
_cepstral_coefficients” in_Natural_Computation_(ICNC)_2015_11th
International_Conference_on_2015_pp. 665-670.
[30] G. Li & C.Busch & B.Yang,
“A_novel_approach_used_for_measuring_fingerprint_orientation_of
arch_fingerprint” in_Information_and_Communication_Technology,
Electronics_and_Microelectronics(MIPRO)_2014_37th
_International
Convention_on_2014_pp._1309-1314.
[31] B.Jayasekara & A.Jayasiri & L.Udawatta “An_evolving_signature
recognition_system” in_Industrial_and_Information_Systems, First
International Conference on_2006_ pp._529-534.
[32] Deepali verma & Mohd. Saif Wajid , “Sketch_based_image_indexing
and_retrieval “ IOSR_Journal_of_Computer_Engineering_e-
ISSN:2278-0661_p-ISSN:2278-8727_ volume 18_issue 2_Ver.1
[33] D.Guru & H.Prakash “Online_signature_verification_and_recognition
: An_approach_based_on_symbolic_representation” Pattern_Analysis
and_Machine_Intelligence_IEEE_Transactions_on_vol. 31_pp. 1059-
1073_2009.
[34] M.Gudavalli & A.V.Babu & S.V.Raju & D.S.Kumar, “Multimoda_l
Biometrics--Sources,Architecture_and_Fusion_Techniques:
An_Overview” in_Biometrics_and_Security_Technologies
(ISBAST)_2012 _International_Symposium_on_2012_pp._27-34.
[35] S. Shirke & S. Pawar & K. Shah "Literature_Review: Model_Free
Human_Gait_Recognition," in_Communication_Systems_and
Network_Technologies_(CSNT)_2014_Fourth_International_Confere
nce_on, 2014_pp._ 891-895.
[36] X.Hongye & H.Zhuoya “Gait_recognition_based_on_gait_energy_
image_and_linear_discriminant_analysis” in_Signal_Processing,
Communications_and_Computing_(ICSPCC)_2015_IEEE_Internatio
nal Conference_on_2015_ pp._1-4.
[37] Z. Liu & S. Sarkar, “Improved_gait_recognition_by_gait_dynamics_
normalization” IEEE Transactions on Pattern Analysis & Machine
Intelligence, pp._863-876_2006.
[38] M.Alotaibi & A.Mahmood, “Automatic real time
gait_recognition_based_on_spatio temporal templates” in Systems,
Applications and Technology_Conference (LISAT)
2015_IEEE_Long Island_2015_ pp. 1-5.
[39] Thitiporn Chanwimaluang: “Advanced_retinal_imaging: Feature_
extraction, 2-Dregistration, and 3-D reconstruction” 2006
[40] Manuel Fco. & Gonzalez penedo “A_Coruna: automatic_system_for
personal_authentication_using_the_retinal_vessel_tree_as_biometric
_pattern” June 2009
[41] Yuan & L. & Mu & Z.C.: “Ear_recognition_based_on_local_
information_fusion”,Pattern_Recogn._Lett., 2012_ 33_ pp. 182–190
[42] Zhang & B. & Mu & Z. & Li & C. et al.: “Robust_classification_for
occluded_ear_via_Gabor_scale_feature-based_non-negative_sparse
_representation” Opt. Eng._2014_ 53_ pp. 1–11
[43] Suna X. & Wanga G. & Wanga L. et al.: “3D_ear_recognition_using
local_salience_and_principal_manifold” Graph._Models_2014, 76,
pp._ 402–412
[44] Liub & Y. & Zhangc & B. & Zhang & D.: “Ear-parotic_face_angle:
A_unique_feature_for_3D_ear_recognition”, Pattern Recogn_Lett.,
2015_53_ pp._9–15 Neurocomputing_2014_140, pp. 317–325.
[45] Satya Bhushan Verma & Chandran Saravanan “ Performance analysis
of various fusion methods in multimodal biometric” 2018
International Conference on Computational and Characterization
Techniques in Engineering & Sciences (CCTES) Integral University,
Lucknow, India, Sep 14-15, 2018
[46] S.G.Nava & A.J.R. Silva & N.H.Montiel, F. J. G. Funes, and M. D.
González, "Hybrid_methodology_focused_on_the_model_of_binary
patterns_and_the_theory_of_fuzzy_logic_for_facial_biometric_verifi
cation_and_identification," in 2015 7th International_Joint
Conference_on_Computational_Intelligence (IJCCI), 2015_pp. 180-
187.
[47] G.Kumar & M.Imran, “Research_Avenues_in_
Multimodal_Biometrics,” IJCA_Spec._Issue_Recent_trends_Image in
Image_Processing_and_Pattern_Recognition, pp. 1–8_ 2010.
[48] Frischholz R. & Dieckmann U. Bio lD: “A_multimodal_biometric
identification_system_Computer. 2000_33(2):64-68.
[49] Sanjekar PS & Patil JB “An_Overview_of_Multimodal_Biometrics,
Signal_and_Image_Processing:An_International_Journal”(SIPIJ)_201
3, 4.
[50] H. Korves & L. Nadel, B. Ulery & D. Masi, “Multi-biometric
Fusion: From_Research_to_Operations”, Sigma, Mitretek Systems,
Summer 2005_pp._39-48.
[51] G.Kumar & M.Imran, “Research_Avenues_in_Multimodal_
Biometrics,” IJCA Spec._Issue_Recent_trends_Image_in_Image_
Processing_and_Pattern_Recognition, pp. 1–8_2010.
[52] A. Ross & A.K.Jain, “Multimodal_Biometrics_: an_Overview,” In
Signal_Processing_Conference, 2004_12th
_European, pp._1221-1224.
[53] A.Ross & R.Govindarajan, “Feature_level_fusion_using_hand_and_
face_biometrics” Proc. SPIE - Int._Soc._Opt._Eng.,_vol._5779,no.
March, pp._196–204_2005.
[54] S.Awang & R. Yusof & M.F.Zamzuri & R. Arfa, “Feature_level
fusion_of_face_and_signature_using_a_modified_feature_selection_t
echnique,”Proc. - 2013 Int. Conf. Signal-Image Technology_Internet-
Based_Syst._SITIS 2013, pp. 706–713_2013_IEEE_2004.
[55] R.Raghavendra & B.Dorizzi & A. Rao & G. Hemantha Kumar, “PSO
_versus_daBoost_for_feature_selection_in_multimodal_biometrics,”
IEEE3rd Int. Conf. Biometrics Theory,_Appl._Syst._BTAS_2009.
[56] D.T.Meva & C.K.Kumbharana, “ Comparative_Study_of_Different
_Fusion_Techniques_in_Multimodal_Biometric_Authentication,”Inte
rnational Journal of Computer Applications vol._66_no._19, pp._16–
19_2013.
[57] A.k Jain & P.Flynn & A. Ross, “Handbook_of_Biometrics”, ISBN-
13: 978-0-387-71040-2_2008 Springer Science Business Media, LLC.
[58] S. J. Horng & Y. H. Chen & R. S. Run & R. J. Chen & J. L. Lai, & K.
O.Sentosal, “An_improved_score_level_fusion_in_multimodal
biometric_systems,” Parallel Distrib. Comput. Appl. Technol.
PDCAT Proc._ no. c,pp_239–246_2009.