SlideShare a Scribd company logo
1 of 6
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 514
Fake Multi Biometric Detection Using Image Quality Assessment
R.Brindha1
V.Mathiazhagan2
1
M.E. Student 2
Assistant Professor
1,2
Department of Electronics and Communication Engineering
1,2
Sri Eshwar College of Engineering, Coimbatore
Abstract— In the recent era where technology plays a
prominent role, persons can be identified (for security
reasons) based on their behavioral and physiological
characteristics (for example fingerprint, face, iris, key-
stroke, signature, voice, etc.) through a computer system
called the biometric system. In these kinds of systems the
security is still a question mark because of various intruders
and attacks. This problem can be solved by improving the
security using some efficient algorithms available. Hence
the fake person can be identified if he/she uses any synthetic
sample of an authenticated person and a fake person who is
trying to forge can be identified and authenticated.
Key words: Biometric Systems, Image quality assessment,
Security, Attacks, Principal Component Analysis (PCA),
Linear Discriminant Analysis (LDA), Quadrature
Discriminant Analysis, Feature extraction, classification.
I. INTRODUCTION
Biometrics refers to metrics related to human characteristics
and traits. Biometrics authentication (or realistic
authentication) is used in Computer Science as a form of
identification and access control. It is also used to identify
individuals in groups that are under surveillance. Biometric
identifiers are the distinctive, measurable characteristics and
used to label and describe individuals. Biometric identifiers
are often classified as physiological versus behavioral
characteristics. Physiological characteristics are related to
the shape of the body. Examples such as fingerprint, palm
veins, face recognition, DNA, palm print, hand geometry,
iris recognition, retina and odor/scent. Behavioral
characteristics are related to the pattern of behavior of the
person, including but not limited to typing rhythm, gait, and
voice.
No single biometric will meet all the requirements
of every possible application. The synthetic or reconstructed
samples can easily break the security of the system. Hence
multi bio metric systems are used to provide better security
against various attacks. To achieve this Image Quality
Assessment for liveness detection technique is used. This
method distinguishes between fake and real samples.
II. IMAGE QUALITY ASSESSMENT FOR LIVENESS
DETECTION
Image quality is a characteristic of an image that measures
the perceived image degradation (typically, compared to an
ideal or perfect image). Imaging systems may introduce
some amounts of distortion or noises in the signal, so the
quality assessment is an important problem.
There are several techniques and metrics that can
be measured objectively and automatically evaluated by a
computer program. Therefore, they can be classified as full-
reference (FR) methods and no-reference (NR) methods. In
FR image quality assessment methods, the quality of a test
image is evaluated by comparing it with a reference image
that is assumed to have perfect quality. NR metrics try to
assess the quality of an image without any reference to the
original one.
For example, comparing an original image to the
output of JPEG compression of that image is full-reference –
it uses the original as reference.
Fig. 1: Image Quality Assessment for fake biometric
detection
Liveness detection methods are usually classified
into one of the two groups (see Fig.1)
ī€­ Hardware based techniques
ī€­ Software based techniques
A. Hardware Based Techniques
It adds some specific device to the sensor in order to detect
particular properties of a living trait (e.g., fingerprint sweat,
blood pressure, or specific reflection properties of the eye).
B. Software-Based Techniques
In this case the fake trait is detected once the sample has
been acquired with a standard sensor (i.e., features used to
distinguish between real and fake traits are extracted from
the biometric sample, and not from the trait itself).
The two types of methods present certain
advantages and drawbacks over the other and, in general, a
combination of both would be the most desirable protection
approach to increase the security of biometric systems. As
a coarse comparison, hardware-based schemes usually
present a higher fake detection rate, while software-based
techniques are in general less expensive (as no extra device
is needed), and less intrusive since their implementation is
transparent to the user. Furthermore, as they operate
directly on the acquired sample (and not on the biometric
trait itself), software-based techniques may be embedded in
the feature extractor module which makes them potentially
capable of detecting other types of illegal break-in attempts
not necessarily classified as spoofing attacks. For instance,
software-based methods can protect the system against the
injection of reconstructed or synthetic samples into the
communication channel between the sensor and the feature
extractor.
III. SECURITY PROTECTION METHOD
The problem of fake biometric detection can be seen as a
two-class classification problem where an input biometric
sample has to be assigned to one of two classes: real or fake.
Fake Multi Biometric Detection Using Image Quality Assessment
(IJSRD/Vol. 2/Issue 07/2014/113)
All rights reserved by www.ijsrd.com 515
The probability of an image can be obtained through feature
extraction. Some of the general image quality measures is
considered. In order to keep its generality and simplicity,
the system needs only one input: the biometric sample to be
classified as real or fake (i.e., the same image acquired for
biometric recognition purposes). Furthermore, as the
method operates on the whole image without searching for
any trait-specific properties, it does not require any pre-
processing steps (e.g., fingerprint segmentation, iris
detection or face extraction) prior to the computation of the
IQ features. This characteristic minimizes its computational
load. Once the feature vector has been generated the sample
is classified as real (generated by a genuine trait) or fake
(synthetically produced), using some simple classifiers
Fig. 2: Block diagram
IV. FACE RECOGNITION
From a digital image or a video frame from a video source a
person can be identified through the face recognition
system. This can be done by comparing selected facial
features from the image and a facial database. For this
purpose fusion of Principal Component Analysis (PCA) and
Linear Discriminant Analysis (LDA) is used.
These algorithms identify facial features by
extracting landmarks, or features, from an image of the
subject's face. These features are then used to search for
other images with matching features. Three different types
of attacks were considered:
ī€­ Print, illegal access attempts are carried out with
hard copies of high-resolution digital photographs
of the genuine users.
ī€­ Mobile, the attacks are performed using photos and
videos taken with the iPhone using the iPhone
screen.
ī€­ Highdef, similar to the mobile subset but in this
case the photos and videos are displayed using an
iPad screen with resolution 1024 × 768.
ī€­ Such a variety of real and fake acquisition
scenarios and conditions makes the REPLAY-
ATTACK DB (unwanted changes in the
background; different sizes of the heads; a black
frame due to an imperfect fitting of the attack
media on the capturing device screen) a unique
benchmark for testing anti-spoofing techniques for
face-based systems.
It is a set of two tasks:
ī€­ Face Identification: Given a face image that
belongs to a person in a database, tell whose image
it is.
ī€­ Face Verification: Given a face image that might
not belong to the database, verify whether it is from
the person it is claimed to be in the database
Fig. 3: Flow diagram for face module
A. Steps
ī€­ The input image is loaded and converted from
RGB to gray scale
ī€­ The image is preprocessed by using Gaussian filter
to remove noise and some specific distortions
ī€­ Then the gradient (horizontal & vertical texture)
and magnitude of the image is calculated
ī€­ The edges of the input image is detected by using
canny method for edge detection
ī€­ After the edges are detected the preprocessed
image is smoothened by using low pass filter
(average filter)
ī€­ The smoothened image is then normalized in both
horizontal and vertical direction
ī€­ The normalized image is then reconstructed using
anisotropic diffusion
ī€­ Finally the reconstructed image is obtained
B. Canny Method for Edge Detection
ī€­ The Canny method for edge detection uses an edge
operator to detect a wide range of edges in images.
Canny edge detection is a four step process.
ī€­ A Gaussian blur is applied to clear the image from
noise
ī€­ A gradient operator is applied for obtaining the
gradients' intensity and direction
ī€­ Non-maximum suppression determines the pixel
that is capable of detecting their neighbours
ī€­ Hysteresis thresholding finds the start and end of
the edges
C. Principal Component Analysis (PCA)
The Principal Component Analysis (PCA) is one of the most
successful techniques that have been used in image
recognition and compression.
ī€­ The purpose of PCA is to reduce the large
dimensionality of the data space to the smaller
intrinsic dimensionality of feature space, which is
needed to describe the data economically
ī€­ PCA can do prediction, redundancy removal,
feature extraction, data compression
In PCA, every image in the training set can be
represented as a linear combination of weighted
eigenvectors called as Eigen faces. A training image set
Fake Multi Biometric Detection Using Image Quality Assessment
(IJSRD/Vol. 2/Issue 07/2014/113)
All rights reserved by www.ijsrd.com 516
called basis function obtains these eigenvectors from
covariance matrix. The weights are found out after the
selection of a set of most relevant Eigen faces.
Recognition is performed by considering the test image
onto the subspace spanned by the Eigen faces and then
classification is done by measuring the Euclidean distance.
Fig. 4: Face recognition
ī€­ Mean and Eigen vectors finds the projected image
ī€­ Find the mean centered data
ī€­ Find covariance matrix’s Eigen vector using
surogate method to reduce computational cost
ī€­ Surogate matrix of mean subtracted
ī€­ Eigen vectors of surrogate matrix
ī€­ Sorting Eigen vectors to select the most dominant
Eigen vectors
ī€­ Normalization
ī€­ Dimensionality reduction
ī€­ Calculating the mean of training data
ī€­ Perform PCA to get Eigen faces in reduced
dimensions
ī€­ Projecting training and testing images in Eigen
space
ī€­ Recognizing images using Euclidean distance
ī€­ Calculating Euclidean distance between the
projected test image and the projection
ī€­ Distance of all centered training image is calculated
ī€­ Test image is said to have minimum distance with
its corresponding image in the training database
ī€­ Finding the recognized number whose distance is
minimum
ī€­ Generating the desired result
D. Linear Discriminant Analysis (LDA)
Linear discriminant analysis (LDA) is a kind of Fisher
analysis which is used to separate or distinguish two or more
classes of objects or events. The resulting combination may
be used as a linear classifier or, more commonly, for
dimensionality reduction before later classification.
ī€­ There has been a tendency in the computer vision
community to prefer LDA over PCA
ī€­ This is mainly because LDA deals directly with
discrimination between classes while PCA does not
pay attention to the underlying class structure
ī€­ This paper shows that when the training set is
small, PCA can outperform LDA
ī€­ When the number of samples is large and
representative for each class, LDA outperforms
PCA
ī€­ Only linearly separable classes will remain
separable after applying LDA.
ī€­ It does not seem to be superior to PCA when the
training data set is small.
E. Methodology
ī€­ Generate the set of MEFs for each image in the
training set
ī€­ Given a query image, compute its MEFs using the
same procedure
ī€­ Find the k closest neighbours for retrieval (e.g.,
using Euclidean distance)
F. Most Expressive Features (MEF):
The features (projections) obtained using PCA.
G. Most Discriminating Features (MDF):
The features (projections) obtained using LDA.
V. IRIS RECOGNITION
Iris recognition is an automated method that identifies the
irises of an individual person’s eyes from any videos or
images. It uses mathematical pattern-recognition techniques
to detect the original sample of the authenticated person
Fig. 5: Iris Recognition
For the iris modality the protection method is tested
under two different attack scenarios, namely:
ī€­ Spoofing attack and
ī€­ Attack with synthetic samples
For each of the attacks a specific pair of real-fake databases
is used. Databases are divided into totally independent (In
terms of users): train set, used to train the classifier; and test
set, used to evaluate the performance of the protection
method. The classifier used for the two scenarios is based
on Quadratic Discriminant Analysis (QDA). It has better
performance than the Linear Discriminant Analysis (LDA).
It maintains the simplicity of the system.
Fig. 6: Flow diagram for iris module
A. Steps
ī€­ The input image is loaded and converted from
RGB to gray scale
Fake Multi Biometric Detection Using Image Quality Assessment
(IJSRD/Vol. 2/Issue 07/2014/113)
All rights reserved by www.ijsrd.com 517
ī€­ The image is preprocessed by using Gaussian filter
to remove noise and some specific distortions
ī€­ The edges of the input image is detected by using
canny method for edge detection
ī€­ The features are extracted using Gabor filter
method
ī€­ Then the iris template is generated
B. Quadratic Discriminant Analysis (Qda)
Quadratic discriminant analysis (QDA) is closely related to
linear discriminant analysis (LDA), where it is assumed that
the measurements from each class are normally distributed.
Unlike LDA however, in QDA there is no assumption that
the covariance of each of the classes is identical. When the
normality assumption is true, the best possible test for the
hypothesis that a given measurement is from a given class is
the likelihood ratio test matrices will substitute the
population quantities in this formula.
C. Methodology
ī€­ Histogram Equalization
ī€­ Iris template is created - generates a biometric
template from an iris in an eye image.
ī€­ Normalization is performed
ī€­ Feature encoding performed
ī€­ Range of pupil & iris radii is defined
ī€­ Scaling factor to speed up Hough transform is
defined
ī€­ Segment iris - automatic segmentation of the iris
region from an eye image is performed. Also
isolates noise areas such as occluding eyelids and
eyelashes.
ī€­ The iris boundary is found
ī€­ Array for recording noise regions is formed
ī€­ Top eyelid is found
ī€­ Bottom eyelid is found
ī€­ For CASIA, eliminate eyelashes by thresholding
ī€­ The circular Hough transform is performed
ī€­ Find the maximum in the Hough space, and hence
the parameters of the circle
ī€­ Canny edge detection is performed
ī€­ Convolving each row of an image with 1d log-
Gabor filters
ī€­ Encode - generates a biometric template from the
normalized iris region,
ī€­ Also generates corresponding noise mask
ī€­ Convolve normalized region with Gabor filters
VI. FINGERPRINT RECOGNITION
Fingerprint recognition or fingerprint authentication refers
to the automated method of verifying a match between two
human fingerprints. Fingerprints are one of many forms of
biometrics used to identify individuals and verify their
identity.
The analysis of fingerprints for matching purposes
generally requires the comparison of several features of the
print pattern. These include patterns, which are aggregate
characteristics of ridges, and minutia points, which are
unique features found within the patterns. It is also
necessary to know the structure and properties of human
skin in order to successfully employ some of the imaging
technologies.
Fig. 7: Fingerprint recognition
A. Patterns
The three basic patterns of fingerprint ridges are the arch,
loop, and whorl:
ī€­ Arch: The ridges enter from one side of the finger,
rise in the center forming an arc, and then exit the
other side of the finger.
ī€­ Loop: The ridges enter from one side of a finger,
form a curve, and then exit on that same side.
ī€­ Whorl: Ridges form circularly around a central
point on the finger.
Fig. 8: Flow diagram for fingerprint module
B. Steps
ī€­ The input image is loaded and converted from
RGB to gray scale
ī€­ The image is preprocessed by using Gaussian filter
to remove noise and some specific distortions
ī€­ Histogram Equalization is performed
ī€­ Ridge is segmented by determining ridge frequency
values across the image
ī€­ Finding the median frequency value used across the
whole
ī€­ The minutiae extraction is done.
As in the iris experiments, the database are divided
into a: train set, used to train the classifier; and test set, used
to evaluate the performance of the protection method. In
order to generate totally unbiased results, there is no overlap
between both sets (i.e., samples corresponding to each user
are just included in the train or the test set). The same QDA
Fake Multi Biometric Detection Using Image Quality Assessment
(IJSRD/Vol. 2/Issue 07/2014/113)
All rights reserved by www.ijsrd.com 518
classifier already considered in the iris related experiments
is used here.
C. Methodology
ī€­ The image is renormalized so that the *ridge
regions* have zero mean, unit standard deviation
ī€­ Normalizes image values to 0-1, or to desired mean
and variance plot of ridge orientation data
ī€­ Placement of orientation vectors is determined
ī€­ Frequencies calculated for non-ridge regions are
masked out
ī€­ Median frequency over all the valid regions of the
image is found
ī€­ The fingerprint ridge frequency is estimated within
a small block of a fingerprint image an orientation
within the block. This is done by averaging the
sines and cosines of the doubled angles before
reconstructing the angle again. This avoids
wraparound problems at the origin.
ī€­ The image block is rotated so that the ridges are
vertical now crop the image so that the rotated
image does not contain any invalid regions. This
prevents the projection down the columns from
being mucked up
ī€­ The columns are summed down to get a projection
of the grey values down the ridges
ī€­ Peaks in projected grey values is found by
performing a gray scale
ī€­ Dilation and then finding where the dilation equals
the original values
ī€­ The spatial frequency of the ridges is determined
by dividing the distance between the 1st and last
peaks by the (No of peaks-1). If no peaks are
detected, or the wavelength is outside the allowed
bounds, the frequency image is set to 0
ī€­ Fixed angle increment between filter orientations in
degrees this should divide evenly into 180
ī€­ The filtering is done finally
VII. IMAGE QUALITY MEASURES
A. Error Sensitivity Measures
Traditional perceptual image quality assessment approaches
are based on measuring the errors (i.e., signal differences)
between the distorted and the reference images.
B. Correlation-Based Measures
Normalized Cross-Correlation (NXC), Mean Angle
Similarity (MAS) and Mean Angle- Magnitude Similarity
(MAMS).
C. Edge-Based Measures
Total Edge Difference (TED) and Total Corner Difference
(TCD).
D. Spectral Distance Measures
The Fourier transform is another traditional image
processing tool which has been applied to the field of image
quality assessment.
E. Gradient-Based Measures
Gradient Magnitude Error (GME) and Gradient Phase Error
(GPE).
F. Information Theoretic Measures
Visual Information Fidelity (VIF) and the Reduced
Reference Entropic Difference index (RRED).
VIII. APPROACHES
A. Distortion-Specific Approaches
These techniques depend on the obtained information about
the sort of visual quality losses due to certain distortion
B. Training-Based Approaches
This approach can be applied to images by training a model
using clean and distorted images
C. Natural Scene Statistic Approaches
Here to train the initial model no distorted images are used
instead a natural scene distortion free image is used
IX. EXPERIMENT AND RESULTS
The evaluation experimental protocol has been designed
with a two-fold objective:
ī€­ First, the multi-biometric dimension of the
protection method is evaluated. For this purpose
three biometric modalities have been considered in
the experiments:
ī€­ Second, the multi-attack dimension of the
protection method is evaluated. It does not detect
the spoofing attacks alone but also the fraudulent
access of the synthetic samples or reconstructed
samples.
A. Database
Databases used in this case are:
ī€­ Real database: CASIA-IrisV1. This dataset is
publicly available through the Biometric Ideal Test
(BIT) platform of the Chinese Academy of
Sciences Institute of Automation (CASIA).
ī€­ Synthetic database: WVU-Synthetic Iris DB. Being
a database that contains only fully synthetic data, it
is not subjected to any legal constraints and is
publicly available through the CITER research
center.
B. Output
Real samples of Tom - face, iris and fingerprint
Fig. 11: Database image
Fake Multi Biometric Detection Using Image Quality Assessment
(IJSRD/Vol. 2/Issue 07/2014/113)
All rights reserved by www.ijsrd.com 519
Fake samples of tom- Fingerprint, face and iris
Fig. 15: Database image
C. Local Binary Pattern
Local binary patterns (LBP) are a type of feature used for
classification in computer vision. Three neighborhood
examples used to define a texture and calculate a local
binary pattern (LBP)
The LBP feature vector, in its simplest form, is
created in the following manner:
ī€­ Divide the examined window into cells (e.g. 16x16
pixels for each cell)
ī€­ For each pixel in a cell, compare the pixel to each
of its 8 neighbour’s (on its left-top, left-middle,
left-bottom, right-top, etc.). Follow the pixels along
a circle, i.e. clockwise or counter-clockwise
ī€­ Where the center pixel's value is greater than the
neighbour’s value, write "1". Otherwise, write "0".
This gives an 8-digit binary number (which is
usually converted to decimal for convenience)
ī€­ Compute the histogram, over the cell, of the
frequency of each "number" occurring (i.e., each
combination of which pixels are smaller and which
are greater than the center).
ī€­ Optionally normalize the histogram
ī€­ Concatenate (normalized) histograms of all cells.
This gives the feature vector for the window
ī€­ The feature vector can now be processed using the
Support vector machine or some other machine-
learning algorithm to classify images. Such
classifiers can be used for face recognition or
texture analysis
X. CONCLUSION
Better recognition compared to existing method. Better
Security, the multi-biometric system increases the security
level. Uni-biometric system is easy to attack but the multi-
biometric system is not so easy because attacker cannot
obtain multiple traits of the same individual. More secure
than other system. Multiple fingerprint scanner support.
Multiple IRIS Scanner support. The existing recognition
systems can only detect the presence but it is not able to
distinguish between the real and fake samples. So the
system proposed can overcome this limitation.
REFERENCES
[1] Javier Galbally, SÊbastien Marcel, Member, IEEE, and
Julian Fierrez,” Image Quality Assessment for Fake
Biometric Detection: Application to Iris, Fingerprint,
and Face Recognition, vol. 23, no. 2, February 2014
[2] M. G. Martini, C. T. Hewage, and B. Villarini, “Image
quality assessment based on edge preservation,” Signal
Process. Image Commun. vol. 27, no. 8, pp. 875–882,
2012
[3] J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J.
Ortega-Garcia, “On the vulnerability of face
verification systems to hill-climbing attacks,” Pattern
Recognit., vol. 43, no. 3, pp. 1027–1038, 2010
[4] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J.
Ortega-Garcia, “A high performance fingerprint
liveness detection method based on quality related
features, “Future Generat. Comput. Syst., vol. 28, no. 1,
pp. 311–321, 2012
[5] J. Galbally, J. Ortiz-Lopez, J. Fierrez, and J. Ortega-
Garcia, “Iris liveness detection based on quality related
features,” in Proc. 5th IAPR ICB, Mar./Apr. 2012, pp.
271–276.
[6] Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook
of Fingerprint Recognition. New York, NY, USA:
Springer-Verlag, 2009.
[7] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni,
“Fingerprint image reconstruction from standard
templates,” IEEE Trans. Pattern Anal.
[8] Mach. Intell., vol. 29, no. 9, pp. 1489–1503, Sep. 2007.

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber securityKarthiga Manisekaran
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496IJRAT
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
Face Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical ReviewFace Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical ReviewIJERA Editor
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
Signature recognition
Signature recognitionSignature recognition
Signature recognitionVijju Lakkundi
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328IJERA Editor
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a surveyZac Darcy
 
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...IRJET Journal
 

What's hot (19)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
Face Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical ReviewFace Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical Review
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
 

Similar to Fake Multi Biometric Detection using Image Quality Assessment

An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
G041041047
G041041047G041041047
G041041047ijceronline
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...INFOGAIN PUBLICATION
 
Image recognition technology (Medical Presentation)
Image recognition technology (Medical Presentation)Image recognition technology (Medical Presentation)
Image recognition technology (Medical Presentation)saravanan guru
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...IRJET Journal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paperCharlie716895
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
LEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITYLEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITYPadma Kannan
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
 

Similar to Fake Multi Biometric Detection using Image Quality Assessment (20)

An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
G041041047
G041041047G041041047
G041041047
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...
 
Image recognition technology (Medical Presentation)
Image recognition technology (Medical Presentation)Image recognition technology (Medical Presentation)
Image recognition technology (Medical Presentation)
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
184
184184
184
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Ijebea14 276
Ijebea14 276Ijebea14 276
Ijebea14 276
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
LEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITYLEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITY
 
A42050103
A42050103A42050103
A42050103
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸
call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸
call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸
call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸
call girls in Kamla Market (DELHI) 🔝 >āŧ’9953330565🔝 genuine Escort Service 🔝✔ī¸âœ”ī¸
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Fake Multi Biometric Detection using Image Quality Assessment

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 514 Fake Multi Biometric Detection Using Image Quality Assessment R.Brindha1 V.Mathiazhagan2 1 M.E. Student 2 Assistant Professor 1,2 Department of Electronics and Communication Engineering 1,2 Sri Eshwar College of Engineering, Coimbatore Abstract— In the recent era where technology plays a prominent role, persons can be identified (for security reasons) based on their behavioral and physiological characteristics (for example fingerprint, face, iris, key- stroke, signature, voice, etc.) through a computer system called the biometric system. In these kinds of systems the security is still a question mark because of various intruders and attacks. This problem can be solved by improving the security using some efficient algorithms available. Hence the fake person can be identified if he/she uses any synthetic sample of an authenticated person and a fake person who is trying to forge can be identified and authenticated. Key words: Biometric Systems, Image quality assessment, Security, Attacks, Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Quadrature Discriminant Analysis, Feature extraction, classification. I. INTRODUCTION Biometrics refers to metrics related to human characteristics and traits. Biometrics authentication (or realistic authentication) is used in Computer Science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics and used to label and describe individuals. Biometric identifiers are often classified as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are related to the pattern of behavior of the person, including but not limited to typing rhythm, gait, and voice. No single biometric will meet all the requirements of every possible application. The synthetic or reconstructed samples can easily break the security of the system. Hence multi bio metric systems are used to provide better security against various attacks. To achieve this Image Quality Assessment for liveness detection technique is used. This method distinguishes between fake and real samples. II. IMAGE QUALITY ASSESSMENT FOR LIVENESS DETECTION Image quality is a characteristic of an image that measures the perceived image degradation (typically, compared to an ideal or perfect image). Imaging systems may introduce some amounts of distortion or noises in the signal, so the quality assessment is an important problem. There are several techniques and metrics that can be measured objectively and automatically evaluated by a computer program. Therefore, they can be classified as full- reference (FR) methods and no-reference (NR) methods. In FR image quality assessment methods, the quality of a test image is evaluated by comparing it with a reference image that is assumed to have perfect quality. NR metrics try to assess the quality of an image without any reference to the original one. For example, comparing an original image to the output of JPEG compression of that image is full-reference – it uses the original as reference. Fig. 1: Image Quality Assessment for fake biometric detection Liveness detection methods are usually classified into one of the two groups (see Fig.1) ī€­ Hardware based techniques ī€­ Software based techniques A. Hardware Based Techniques It adds some specific device to the sensor in order to detect particular properties of a living trait (e.g., fingerprint sweat, blood pressure, or specific reflection properties of the eye). B. Software-Based Techniques In this case the fake trait is detected once the sample has been acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself). The two types of methods present certain advantages and drawbacks over the other and, in general, a combination of both would be the most desirable protection approach to increase the security of biometric systems. As a coarse comparison, hardware-based schemes usually present a higher fake detection rate, while software-based techniques are in general less expensive (as no extra device is needed), and less intrusive since their implementation is transparent to the user. Furthermore, as they operate directly on the acquired sample (and not on the biometric trait itself), software-based techniques may be embedded in the feature extractor module which makes them potentially capable of detecting other types of illegal break-in attempts not necessarily classified as spoofing attacks. For instance, software-based methods can protect the system against the injection of reconstructed or synthetic samples into the communication channel between the sensor and the feature extractor. III. SECURITY PROTECTION METHOD The problem of fake biometric detection can be seen as a two-class classification problem where an input biometric sample has to be assigned to one of two classes: real or fake.
  • 2. Fake Multi Biometric Detection Using Image Quality Assessment (IJSRD/Vol. 2/Issue 07/2014/113) All rights reserved by www.ijsrd.com 515 The probability of an image can be obtained through feature extraction. Some of the general image quality measures is considered. In order to keep its generality and simplicity, the system needs only one input: the biometric sample to be classified as real or fake (i.e., the same image acquired for biometric recognition purposes). Furthermore, as the method operates on the whole image without searching for any trait-specific properties, it does not require any pre- processing steps (e.g., fingerprint segmentation, iris detection or face extraction) prior to the computation of the IQ features. This characteristic minimizes its computational load. Once the feature vector has been generated the sample is classified as real (generated by a genuine trait) or fake (synthetically produced), using some simple classifiers Fig. 2: Block diagram IV. FACE RECOGNITION From a digital image or a video frame from a video source a person can be identified through the face recognition system. This can be done by comparing selected facial features from the image and a facial database. For this purpose fusion of Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) is used. These algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face. These features are then used to search for other images with matching features. Three different types of attacks were considered: ī€­ Print, illegal access attempts are carried out with hard copies of high-resolution digital photographs of the genuine users. ī€­ Mobile, the attacks are performed using photos and videos taken with the iPhone using the iPhone screen. ī€­ Highdef, similar to the mobile subset but in this case the photos and videos are displayed using an iPad screen with resolution 1024 × 768. ī€­ Such a variety of real and fake acquisition scenarios and conditions makes the REPLAY- ATTACK DB (unwanted changes in the background; different sizes of the heads; a black frame due to an imperfect fitting of the attack media on the capturing device screen) a unique benchmark for testing anti-spoofing techniques for face-based systems. It is a set of two tasks: ī€­ Face Identification: Given a face image that belongs to a person in a database, tell whose image it is. ī€­ Face Verification: Given a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database Fig. 3: Flow diagram for face module A. Steps ī€­ The input image is loaded and converted from RGB to gray scale ī€­ The image is preprocessed by using Gaussian filter to remove noise and some specific distortions ī€­ Then the gradient (horizontal & vertical texture) and magnitude of the image is calculated ī€­ The edges of the input image is detected by using canny method for edge detection ī€­ After the edges are detected the preprocessed image is smoothened by using low pass filter (average filter) ī€­ The smoothened image is then normalized in both horizontal and vertical direction ī€­ The normalized image is then reconstructed using anisotropic diffusion ī€­ Finally the reconstructed image is obtained B. Canny Method for Edge Detection ī€­ The Canny method for edge detection uses an edge operator to detect a wide range of edges in images. Canny edge detection is a four step process. ī€­ A Gaussian blur is applied to clear the image from noise ī€­ A gradient operator is applied for obtaining the gradients' intensity and direction ī€­ Non-maximum suppression determines the pixel that is capable of detecting their neighbours ī€­ Hysteresis thresholding finds the start and end of the edges C. Principal Component Analysis (PCA) The Principal Component Analysis (PCA) is one of the most successful techniques that have been used in image recognition and compression. ī€­ The purpose of PCA is to reduce the large dimensionality of the data space to the smaller intrinsic dimensionality of feature space, which is needed to describe the data economically ī€­ PCA can do prediction, redundancy removal, feature extraction, data compression In PCA, every image in the training set can be represented as a linear combination of weighted eigenvectors called as Eigen faces. A training image set
  • 3. Fake Multi Biometric Detection Using Image Quality Assessment (IJSRD/Vol. 2/Issue 07/2014/113) All rights reserved by www.ijsrd.com 516 called basis function obtains these eigenvectors from covariance matrix. The weights are found out after the selection of a set of most relevant Eigen faces. Recognition is performed by considering the test image onto the subspace spanned by the Eigen faces and then classification is done by measuring the Euclidean distance. Fig. 4: Face recognition ī€­ Mean and Eigen vectors finds the projected image ī€­ Find the mean centered data ī€­ Find covariance matrix’s Eigen vector using surogate method to reduce computational cost ī€­ Surogate matrix of mean subtracted ī€­ Eigen vectors of surrogate matrix ī€­ Sorting Eigen vectors to select the most dominant Eigen vectors ī€­ Normalization ī€­ Dimensionality reduction ī€­ Calculating the mean of training data ī€­ Perform PCA to get Eigen faces in reduced dimensions ī€­ Projecting training and testing images in Eigen space ī€­ Recognizing images using Euclidean distance ī€­ Calculating Euclidean distance between the projected test image and the projection ī€­ Distance of all centered training image is calculated ī€­ Test image is said to have minimum distance with its corresponding image in the training database ī€­ Finding the recognized number whose distance is minimum ī€­ Generating the desired result D. Linear Discriminant Analysis (LDA) Linear discriminant analysis (LDA) is a kind of Fisher analysis which is used to separate or distinguish two or more classes of objects or events. The resulting combination may be used as a linear classifier or, more commonly, for dimensionality reduction before later classification. ī€­ There has been a tendency in the computer vision community to prefer LDA over PCA ī€­ This is mainly because LDA deals directly with discrimination between classes while PCA does not pay attention to the underlying class structure ī€­ This paper shows that when the training set is small, PCA can outperform LDA ī€­ When the number of samples is large and representative for each class, LDA outperforms PCA ī€­ Only linearly separable classes will remain separable after applying LDA. ī€­ It does not seem to be superior to PCA when the training data set is small. E. Methodology ī€­ Generate the set of MEFs for each image in the training set ī€­ Given a query image, compute its MEFs using the same procedure ī€­ Find the k closest neighbours for retrieval (e.g., using Euclidean distance) F. Most Expressive Features (MEF): The features (projections) obtained using PCA. G. Most Discriminating Features (MDF): The features (projections) obtained using LDA. V. IRIS RECOGNITION Iris recognition is an automated method that identifies the irises of an individual person’s eyes from any videos or images. It uses mathematical pattern-recognition techniques to detect the original sample of the authenticated person Fig. 5: Iris Recognition For the iris modality the protection method is tested under two different attack scenarios, namely: ī€­ Spoofing attack and ī€­ Attack with synthetic samples For each of the attacks a specific pair of real-fake databases is used. Databases are divided into totally independent (In terms of users): train set, used to train the classifier; and test set, used to evaluate the performance of the protection method. The classifier used for the two scenarios is based on Quadratic Discriminant Analysis (QDA). It has better performance than the Linear Discriminant Analysis (LDA). It maintains the simplicity of the system. Fig. 6: Flow diagram for iris module A. Steps ī€­ The input image is loaded and converted from RGB to gray scale
  • 4. Fake Multi Biometric Detection Using Image Quality Assessment (IJSRD/Vol. 2/Issue 07/2014/113) All rights reserved by www.ijsrd.com 517 ī€­ The image is preprocessed by using Gaussian filter to remove noise and some specific distortions ī€­ The edges of the input image is detected by using canny method for edge detection ī€­ The features are extracted using Gabor filter method ī€­ Then the iris template is generated B. Quadratic Discriminant Analysis (Qda) Quadratic discriminant analysis (QDA) is closely related to linear discriminant analysis (LDA), where it is assumed that the measurements from each class are normally distributed. Unlike LDA however, in QDA there is no assumption that the covariance of each of the classes is identical. When the normality assumption is true, the best possible test for the hypothesis that a given measurement is from a given class is the likelihood ratio test matrices will substitute the population quantities in this formula. C. Methodology ī€­ Histogram Equalization ī€­ Iris template is created - generates a biometric template from an iris in an eye image. ī€­ Normalization is performed ī€­ Feature encoding performed ī€­ Range of pupil & iris radii is defined ī€­ Scaling factor to speed up Hough transform is defined ī€­ Segment iris - automatic segmentation of the iris region from an eye image is performed. Also isolates noise areas such as occluding eyelids and eyelashes. ī€­ The iris boundary is found ī€­ Array for recording noise regions is formed ī€­ Top eyelid is found ī€­ Bottom eyelid is found ī€­ For CASIA, eliminate eyelashes by thresholding ī€­ The circular Hough transform is performed ī€­ Find the maximum in the Hough space, and hence the parameters of the circle ī€­ Canny edge detection is performed ī€­ Convolving each row of an image with 1d log- Gabor filters ī€­ Encode - generates a biometric template from the normalized iris region, ī€­ Also generates corresponding noise mask ī€­ Convolve normalized region with Gabor filters VI. FINGERPRINT RECOGNITION Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. Fig. 7: Fingerprint recognition A. Patterns The three basic patterns of fingerprint ridges are the arch, loop, and whorl: ī€­ Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. ī€­ Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side. ī€­ Whorl: Ridges form circularly around a central point on the finger. Fig. 8: Flow diagram for fingerprint module B. Steps ī€­ The input image is loaded and converted from RGB to gray scale ī€­ The image is preprocessed by using Gaussian filter to remove noise and some specific distortions ī€­ Histogram Equalization is performed ī€­ Ridge is segmented by determining ridge frequency values across the image ī€­ Finding the median frequency value used across the whole ī€­ The minutiae extraction is done. As in the iris experiments, the database are divided into a: train set, used to train the classifier; and test set, used to evaluate the performance of the protection method. In order to generate totally unbiased results, there is no overlap between both sets (i.e., samples corresponding to each user are just included in the train or the test set). The same QDA
  • 5. Fake Multi Biometric Detection Using Image Quality Assessment (IJSRD/Vol. 2/Issue 07/2014/113) All rights reserved by www.ijsrd.com 518 classifier already considered in the iris related experiments is used here. C. Methodology ī€­ The image is renormalized so that the *ridge regions* have zero mean, unit standard deviation ī€­ Normalizes image values to 0-1, or to desired mean and variance plot of ridge orientation data ī€­ Placement of orientation vectors is determined ī€­ Frequencies calculated for non-ridge regions are masked out ī€­ Median frequency over all the valid regions of the image is found ī€­ The fingerprint ridge frequency is estimated within a small block of a fingerprint image an orientation within the block. This is done by averaging the sines and cosines of the doubled angles before reconstructing the angle again. This avoids wraparound problems at the origin. ī€­ The image block is rotated so that the ridges are vertical now crop the image so that the rotated image does not contain any invalid regions. This prevents the projection down the columns from being mucked up ī€­ The columns are summed down to get a projection of the grey values down the ridges ī€­ Peaks in projected grey values is found by performing a gray scale ī€­ Dilation and then finding where the dilation equals the original values ī€­ The spatial frequency of the ridges is determined by dividing the distance between the 1st and last peaks by the (No of peaks-1). If no peaks are detected, or the wavelength is outside the allowed bounds, the frequency image is set to 0 ī€­ Fixed angle increment between filter orientations in degrees this should divide evenly into 180 ī€­ The filtering is done finally VII. IMAGE QUALITY MEASURES A. Error Sensitivity Measures Traditional perceptual image quality assessment approaches are based on measuring the errors (i.e., signal differences) between the distorted and the reference images. B. Correlation-Based Measures Normalized Cross-Correlation (NXC), Mean Angle Similarity (MAS) and Mean Angle- Magnitude Similarity (MAMS). C. Edge-Based Measures Total Edge Difference (TED) and Total Corner Difference (TCD). D. Spectral Distance Measures The Fourier transform is another traditional image processing tool which has been applied to the field of image quality assessment. E. Gradient-Based Measures Gradient Magnitude Error (GME) and Gradient Phase Error (GPE). F. Information Theoretic Measures Visual Information Fidelity (VIF) and the Reduced Reference Entropic Difference index (RRED). VIII. APPROACHES A. Distortion-Specific Approaches These techniques depend on the obtained information about the sort of visual quality losses due to certain distortion B. Training-Based Approaches This approach can be applied to images by training a model using clean and distorted images C. Natural Scene Statistic Approaches Here to train the initial model no distorted images are used instead a natural scene distortion free image is used IX. EXPERIMENT AND RESULTS The evaluation experimental protocol has been designed with a two-fold objective: ī€­ First, the multi-biometric dimension of the protection method is evaluated. For this purpose three biometric modalities have been considered in the experiments: ī€­ Second, the multi-attack dimension of the protection method is evaluated. It does not detect the spoofing attacks alone but also the fraudulent access of the synthetic samples or reconstructed samples. A. Database Databases used in this case are: ī€­ Real database: CASIA-IrisV1. This dataset is publicly available through the Biometric Ideal Test (BIT) platform of the Chinese Academy of Sciences Institute of Automation (CASIA). ī€­ Synthetic database: WVU-Synthetic Iris DB. Being a database that contains only fully synthetic data, it is not subjected to any legal constraints and is publicly available through the CITER research center. B. Output Real samples of Tom - face, iris and fingerprint Fig. 11: Database image
  • 6. Fake Multi Biometric Detection Using Image Quality Assessment (IJSRD/Vol. 2/Issue 07/2014/113) All rights reserved by www.ijsrd.com 519 Fake samples of tom- Fingerprint, face and iris Fig. 15: Database image C. Local Binary Pattern Local binary patterns (LBP) are a type of feature used for classification in computer vision. Three neighborhood examples used to define a texture and calculate a local binary pattern (LBP) The LBP feature vector, in its simplest form, is created in the following manner: ī€­ Divide the examined window into cells (e.g. 16x16 pixels for each cell) ī€­ For each pixel in a cell, compare the pixel to each of its 8 neighbour’s (on its left-top, left-middle, left-bottom, right-top, etc.). Follow the pixels along a circle, i.e. clockwise or counter-clockwise ī€­ Where the center pixel's value is greater than the neighbour’s value, write "1". Otherwise, write "0". This gives an 8-digit binary number (which is usually converted to decimal for convenience) ī€­ Compute the histogram, over the cell, of the frequency of each "number" occurring (i.e., each combination of which pixels are smaller and which are greater than the center). ī€­ Optionally normalize the histogram ī€­ Concatenate (normalized) histograms of all cells. This gives the feature vector for the window ī€­ The feature vector can now be processed using the Support vector machine or some other machine- learning algorithm to classify images. Such classifiers can be used for face recognition or texture analysis X. CONCLUSION Better recognition compared to existing method. Better Security, the multi-biometric system increases the security level. Uni-biometric system is easy to attack but the multi- biometric system is not so easy because attacker cannot obtain multiple traits of the same individual. More secure than other system. Multiple fingerprint scanner support. Multiple IRIS Scanner support. The existing recognition systems can only detect the presence but it is not able to distinguish between the real and fake samples. So the system proposed can overcome this limitation. REFERENCES [1] Javier Galbally, SÊbastien Marcel, Member, IEEE, and Julian Fierrez,” Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition, vol. 23, no. 2, February 2014 [2] M. G. Martini, C. T. Hewage, and B. Villarini, “Image quality assessment based on edge preservation,” Signal Process. Image Commun. vol. 27, no. 8, pp. 875–882, 2012 [3] J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J. Ortega-Garcia, “On the vulnerability of face verification systems to hill-climbing attacks,” Pattern Recognit., vol. 43, no. 3, pp. 1027–1038, 2010 [4] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia, “A high performance fingerprint liveness detection method based on quality related features, “Future Generat. Comput. Syst., vol. 28, no. 1, pp. 311–321, 2012 [5] J. Galbally, J. Ortiz-Lopez, J. Fierrez, and J. Ortega- Garcia, “Iris liveness detection based on quality related features,” in Proc. 5th IAPR ICB, Mar./Apr. 2012, pp. 271–276. [6] Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York, NY, USA: Springer-Verlag, 2009. [7] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, “Fingerprint image reconstruction from standard templates,” IEEE Trans. Pattern Anal. [8] Mach. Intell., vol. 29, no. 9, pp. 1489–1503, Sep. 2007.