SlideShare a Scribd company logo
1 of 4
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
195
A Comprehensive Approach for Multi Biometric
Recognition Using Sclera Vein and
Finger Vein Fusion
N. Prasath
PG Scholar, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
M. Sivakumar
Assistant Professor, Department of
Paavai College of Engineering,
Namakkal, India.
CSE,
Abstract— Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is
identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape
pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing
infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line
patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get
the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will
produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and
authentication systems.
Index Terms— Sclera vein recognition, finger print vein recognition, vein identification, features fusion, multimodal system.
——————————  ——————————
1 INTRODUCTION
The white part of the eye is called sclera. Sclera veins can
be captured and analysed using image processing techniques.
The vein pattern of eye does not change with age, eye infection
and alcohol intake. So it can be used to verify the identity of a
person. In some cases sclera vein pattern may not be reliable and
hence multi biometric approach is recommended.
A new method which combines sclera vein recognition and
finger vein recognition to provide better authenticity is
proposed. Even though many multimodal systems are available,
the combination of sclera and finger vein is different which
provides positive and satisfying results. The proposed algorithm
extracts features from both sclera and finger vein image and
combines to form a final image. The fusion is applicable only if
the two extracted patterns are compatible.
2 BACKROUND OF VEIN PATTERN
RECOGNITION
2.1 Overview of Sclera Vein Recognition
Sclera vein recognition approach involves sclera image
identification, segmentation, enhancement, feature extraction.
Sclera image segmentation is the first step in sclera vein
recognition. It can be obtained with the help of a high definition
digital camera. The next step is sclera segmentation.
After sclera segmentation, it is necessary to enhance and
extract the sclera features since the sclera vein patterns often lack
contrast, and are hard to detect. Sclera vein appears to be in Y
shape pattern. Y shape line descriptor algorithm is used to extract
the features from enhanced sclera image. The flow of sclera vein
recognition process is shown in fig. 1.
Fig. 1. Simplified Sclera Image extraction process.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
196
2.2 Y-shape Feature Extraction
A novel line-descriptor method is used to describe and store
the extracted vein pattern for recognition. The goal is to reliably
extract and describe the vein pattern in the sclera for use in
identifying the user. As the present set of vessel segments
combine to create Y shape branches often belonging to same
sclera layer. When the numbers of branches is more than three,
the vessels branches may come from different sclera layers and
its pattern will deform with movement of eye. Y shape branches
are observed to be a stable feature and can be used as sclera
feature descriptor.
Fig. 2. Enhanced sclera image with Y shape patterns.
To detect the Y shape branches in the original template, a
search for the nearest neighbours set of every line segment in a
regular distance should be conducted and the angles among these
neighbours should be classified. If there were two types of angle
values in the line segment set, this set may be inferred as a Y-
shape structure and the line segment angles would be recorded as
a new feature of the sclera.
There are two ways to measure both orientation and
relationship of every branch of Y shape vessels:
1) One is to use the angles of every branch to x axle,
2) The other is to use the angels between branch and iris
radial direction. The first method needs additional rotation
operating to align the template.
3 PROPOSED MULTIMODALSYSTEM
Proposed Multimodal system is a fusion of two individual
biometric systems. It combines the benefits of both sclera vein
and finger vein authentication systems. Finger vein
authentication is a new biometric approach which verifies one’s
identity using finger vein pattern.
3.1 Finger Vein Recognition
As the foremost step finger vein pattern should be captured.
To do so, a good quality CCD camera and an infrared light
emitter can be used. As the infrared lights get absorbed by
blood, the vein pattern appears to be a series of dark lines.
Then the image is segmented using localized Radon transform
(LRT) algorithm.
Fig. 3. A typical way of capturing finger vein pattern.
3.2 Repeated Line Tracking
The repeated line tracking algorithm is used in finger vein
identification. The idea is to trace the veins in the image by
choosing directions according to predefined probability in the
horizontal and vertical orientations. The starting vein point is
randomly selected and the whole process is repeated for certain
number of times.
Fig. 4. Finger vein image extraction process.
A typical finger vein feature extraction process has four steps
as mentioned in fig. 4. The foremost process is capturing the
finger vein using a CCD camera and Infrared light Emitter. After
that the captured image is segmented and enhanced. Enhancing
the image helps us to identify the vein pattern clearly. The final
image has the entire necessary feature that is required to identify
a person uniquely.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
197
Fig. 5. Enhanced finger vein image with repeated lines.
Image fusion is performed by combining the biometric
template extracted from every pair of fingerprints and eye
representing a user. The matching score is calculated through the
Hamming distance calculation between two final fused
templates. The template obtained in the encoding process will
need a corresponding matching metric that provides a measure of
the similarity degree between the two templates. The result of the
measure is then compared with an experimental threshold to
decide whether or not the two representations belong to the same
user.
As this method produces exact matching score results and
provides dual security it is preferable in many mission critical
applications. It can be successfully implemented in low cost and
it is expected to give maximum protection by providing unique
human identity.
Fig. 6. Concatenation of sclera vein and finger vein patterns.
A simple concatenation process flow is shown in Fig 6.
Both sclera and finger vein images are fused together to form a
single image. The final template has the unique properties from
sclera as well as finger vein pattern. Therefore, it can be used to
find the identity of a person and adopted in security systems as
well.
4 DISCUSSION AND CONCLUSION
In this paper a new Multimodal biometric authentication
method is proposed and analyzed. The new method employs
security and special features of both sclera vein pattern and
finger vein pattern. Hence, dual security can be achieved. The
final image obtained after feature level fusion has the properties
of both finger vein and sclera vein. Therefore, it is less prone to
forgery. In many Real time environments, multi biometric
approach becomes essential and the proposed method better
serve the purpose.
REFERENCES
[1] Antikainen J., Havel J., Josth R., Herout A., Zemcik P. and
Hauta-Kasari M. (Feb. 2011), “Nonnegative tensor
factorization accelerated using GPGPU,”IEEE Trans.
Parallel Distrib. Syst., vol. 22, no. 7, pp. 1135–1141.
[2] Crihalmeanu S. and Ross A. (Oct. 2012), “Multispectral
scleral patterns for ocular biometric recognition,” Pattern
Recognit. Lett., vol. 33, no. 14,pp. 1860–1869.
[3] Cirean D. C., Meier U., Gambardella L. M. and
Schmidhuber J. (2010), “Deep, big, simple neural nets for
handwritten digit recognition,” Neural Comput., vol. 22,
no. 12, pp. 3207–3220.
[4] Cuevas C., Berjon D., Moran F. and Garcia N. (Feb. 2012),
“Moving object detection for real-time augmented reality
applications in a GPGPU,” IEEE Trans. Consum. Electron.,
vol. 58, no. 1, pp. 117–125.
[5] Dixon P. R., Oonishi T. and Furui S. (2009), “Harnessing
graphics processors for the fast computation of acoustic
likelihoods in speech recognition,” Comput. Speech Lang.,
vol. 23, no. 4, pp. 510–526.
[6] Gustavo Poli and José Hiroki Saito,” Parallel Face
Recognition Processing Using Neocognitron Neural
Network And Gpu With Cuda High Performance
Architecture”
[7] Hongtao Xie, Ke Gao, Yongdong Zhang,” Efficient Feature
Detection And Effective Post-Verification For Large Scale
Near-Duplicate Image Search”
[8] Kaufman P. and Alm A.(2003), “Clinical application”,
Adler’s Physiology of the Eye.
[9] Oyster C.W. (1999), “The Human Eye: Structure and
Function”, Sunderland:Sinauer Associates.
[10] Oh K.S. and Jung K. (2004), “GPU implementation of
neural networks,” Pattern Recognit., vol. 37, no. 6, pp.
1311–1314.
[11] Poli G., Saito J. H., Mari J. F. and Zorzan M. R. (2008),
“Processing neocognitron of face recognition on high
performance environment based on GPU with CUDA
architecture,” in Proc. 20th Int. Symp. Comput. Archit.
High Perform. Comput., pp. 81–88.
[12] Rakvic R. N., Ulis B. J., Broussard R. P., Ives R. W. and
Steiner N. (Dec. 2009), “Parallelizing iris recognition,”
IEEE Trans. Inf. Forensics Security,vol. 4, no. 4, pp. 812–
823.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
198
[13] Reza Derakhshani, Arun Ross, Simona Crihalmeanu, “A
New Biometric Modality Based On Conjunctival
Vasculature”
[14] Selenick, I.W., 2002,”A new complex-directional wavelet
transform and itsapplication to image denoising”. In: IEEE
Internat. Conf. on Image Processing, vol. 3, pp. 573–576.
[15] Xu Y., Deka S. and Righetti R. (Dec. 2011), “A hybrid
CPU-GPGPU approach for real-time elastography,” IEEE
Trans. Ultrason., Ferroelectr. Freq.Control, vol. 58, no. 12,
pp. 2631–2645.
[16] Zhou Z., Du E.Y., Thomas N.L. and Delp E.J. (May 2012),
“A new human identification method: Sclera recognition,”
IEEE Trans. Syst., Man,Cybern. A, Syst., Humans, vol. 42,
no. 3, pp. 571–583.
[17] Zhou Z., Du E.Y., Thomas N.L. and Delp E.J. (Jul. 2013),
“A comprehensive multimodal eye recognition,” Signal,
Image Video Process., vol. 7, no. 4,pp. 619–631.
[18] Yong lin, Eliza Yingzi Du, Senior Member, IEEE, Zhi
Zhou, Student Member, IEEE, and N.Luke Thomas, “An
Efficient Parallel Approach For Sclera Vein Recognition,”
Feb. 2014.

More Related Content

What's hot

EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsEditor IJMTER
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionSana Fakhfakh
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Human Identification by Segmentation and Enhancement of Sclera using Matlab
Human Identification by Segmentation and Enhancement of Sclera using MatlabHuman Identification by Segmentation and Enhancement of Sclera using Matlab
Human Identification by Segmentation and Enhancement of Sclera using Matlabijceronline
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET Journal
 

What's hot (16)

EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Transform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFTTransform Domain Based Iris Recognition using EMD and FFT
Transform Domain Based Iris Recognition using EMD and FFT
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition SystemsA Survey : Iris Based Recognition Systems
A Survey : Iris Based Recognition Systems
 
G01114650
G01114650G01114650
G01114650
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognition
 
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Human Identification by Segmentation and Enhancement of Sclera using Matlab
Human Identification by Segmentation and Enhancement of Sclera using MatlabHuman Identification by Segmentation and Enhancement of Sclera using Matlab
Human Identification by Segmentation and Enhancement of Sclera using Matlab
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
IRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition TechniquesIRJET- Survey of Iris Recognition Techniques
IRJET- Survey of Iris Recognition Techniques
 

Viewers also liked

A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
 
Composicion de los 4 videos
Composicion de los 4 videosComposicion de los 4 videos
Composicion de los 4 videossarafercuervo
 
Thanksgiving flier updated
Thanksgiving flier updatedThanksgiving flier updated
Thanksgiving flier updatedShannon Farley
 
Quaderns virtuals, activitats d'avaluació en xarxa
Quaderns virtuals, activitats d'avaluació en xarxa Quaderns virtuals, activitats d'avaluació en xarxa
Quaderns virtuals, activitats d'avaluació en xarxa Sara Arjona Téllez
 
NG3S903 - Electronic Systems Engineering - Fault Modelling Techniques
NG3S903 - Electronic Systems Engineering - Fault Modelling TechniquesNG3S903 - Electronic Systems Engineering - Fault Modelling Techniques
NG3S903 - Electronic Systems Engineering - Fault Modelling TechniquesChris Francis
 
PENTEDEKA FOTEINI - CV CREW DPT ENGLISH
PENTEDEKA FOTEINI - CV CREW DPT ENGLISHPENTEDEKA FOTEINI - CV CREW DPT ENGLISH
PENTEDEKA FOTEINI - CV CREW DPT ENGLISHFoteini Pentedeka
 
Law as a Process of Human Communication: Marriage and Human Rights Values Rel...
Law as a Process of Human Communication: Marriage and Human Rights Values Rel...Law as a Process of Human Communication: Marriage and Human Rights Values Rel...
Law as a Process of Human Communication: Marriage and Human Rights Values Rel...Dr. Aitza Haddad Nuñez
 
Directiva de la estrategia piura una región que escribe y lee para crecer
Directiva de la estrategia piura una región que escribe y lee para crecerDirectiva de la estrategia piura una región que escribe y lee para crecer
Directiva de la estrategia piura una región que escribe y lee para crecerJACINTO NAMUCHE HUERTAS
 
10 Greatest SAAB Concept Cars That Were Never Produced
10 Greatest SAAB Concept Cars That Were Never Produced10 Greatest SAAB Concept Cars That Were Never Produced
10 Greatest SAAB Concept Cars That Were Never ProducedGoran Aničić
 
Target market strategies
Target market strategiesTarget market strategies
Target market strategiesVIJAY KAMBOJ
 
Literatura
LiteraturaLiteratura
Literaturakatiapgm
 
En tiempos de jesús de nazaret. Parte I
En tiempos de jesús de nazaret. Parte IEn tiempos de jesús de nazaret. Parte I
En tiempos de jesús de nazaret. Parte IMarian Calvo
 

Viewers also liked (17)

A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
 
Composicion de los 4 videos
Composicion de los 4 videosComposicion de los 4 videos
Composicion de los 4 videos
 
Thanksgiving flier updated
Thanksgiving flier updatedThanksgiving flier updated
Thanksgiving flier updated
 
Quaderns virtuals, activitats d'avaluació en xarxa
Quaderns virtuals, activitats d'avaluació en xarxa Quaderns virtuals, activitats d'avaluació en xarxa
Quaderns virtuals, activitats d'avaluació en xarxa
 
NG3S903 - Electronic Systems Engineering - Fault Modelling Techniques
NG3S903 - Electronic Systems Engineering - Fault Modelling TechniquesNG3S903 - Electronic Systems Engineering - Fault Modelling Techniques
NG3S903 - Electronic Systems Engineering - Fault Modelling Techniques
 
PENTEDEKA FOTEINI - CV CREW DPT ENGLISH
PENTEDEKA FOTEINI - CV CREW DPT ENGLISHPENTEDEKA FOTEINI - CV CREW DPT ENGLISH
PENTEDEKA FOTEINI - CV CREW DPT ENGLISH
 
Elmundoenminiatura
ElmundoenminiaturaElmundoenminiatura
Elmundoenminiatura
 
Law as a Process of Human Communication: Marriage and Human Rights Values Rel...
Law as a Process of Human Communication: Marriage and Human Rights Values Rel...Law as a Process of Human Communication: Marriage and Human Rights Values Rel...
Law as a Process of Human Communication: Marriage and Human Rights Values Rel...
 
Directiva de la estrategia piura una región que escribe y lee para crecer
Directiva de la estrategia piura una región que escribe y lee para crecerDirectiva de la estrategia piura una región que escribe y lee para crecer
Directiva de la estrategia piura una región que escribe y lee para crecer
 
10 Greatest SAAB Concept Cars That Were Never Produced
10 Greatest SAAB Concept Cars That Were Never Produced10 Greatest SAAB Concept Cars That Were Never Produced
10 Greatest SAAB Concept Cars That Were Never Produced
 
IT ppt
IT pptIT ppt
IT ppt
 
Target market strategies
Target market strategiesTarget market strategies
Target market strategies
 
Casi Bench Test
Casi Bench TestCasi Bench Test
Casi Bench Test
 
GDP Viva Slides
GDP Viva SlidesGDP Viva Slides
GDP Viva Slides
 
Literatura
LiteraturaLiteratura
Literatura
 
EMERGING CHALLENGES IN DIAGNOSTIC MICROBIOLOGY (Overcoming with Newer Approac...
EMERGING CHALLENGES IN DIAGNOSTIC MICROBIOLOGY(Overcoming with Newer Approac...EMERGING CHALLENGES IN DIAGNOSTIC MICROBIOLOGY(Overcoming with Newer Approac...
EMERGING CHALLENGES IN DIAGNOSTIC MICROBIOLOGY (Overcoming with Newer Approac...
 
En tiempos de jesús de nazaret. Parte I
En tiempos de jesús de nazaret. Parte IEn tiempos de jesús de nazaret. Parte I
En tiempos de jesús de nazaret. Parte I
 

Similar to A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion

Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...IRJET Journal
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
 
Dorsal hand vein authentication system using artificial neural network
Dorsal hand vein authentication system using artificial neural  networkDorsal hand vein authentication system using artificial neural  network
Dorsal hand vein authentication system using artificial neural networknooriasukmaningtyas
 
Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
 
IRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition SecurityIRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition SecurityIRJET Journal
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...feature software solutions pvt ltd
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterEditor IJCATR
 
A Survey on Needle Tip Estimation in Ultrasound Images
A Survey on Needle Tip Estimation in Ultrasound ImagesA Survey on Needle Tip Estimation in Ultrasound Images
A Survey on Needle Tip Estimation in Ultrasound ImagesIRJET Journal
 

Similar to A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion (20)

Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...
 
A010320106
A010320106A010320106
A010320106
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 
Dorsal hand vein authentication system using artificial neural network
Dorsal hand vein authentication system using artificial neural  networkDorsal hand vein authentication system using artificial neural  network
Dorsal hand vein authentication system using artificial neural network
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 
E0543135
E0543135E0543135
E0543135
 
Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...Finger vein identification system using capsule networks with hyperparameter ...
Finger vein identification system using capsule networks with hyperparameter ...
 
IRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition SecurityIRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition Security
 
E017443136
E017443136E017443136
E017443136
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
 
J1076975
J1076975J1076975
J1076975
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
 
A Survey on Needle Tip Estimation in Ultrasound Images
A Survey on Needle Tip Estimation in Ultrasound ImagesA Survey on Needle Tip Estimation in Ultrasound Images
A Survey on Needle Tip Estimation in Ultrasound Images
 
B221223
B221223B221223
B221223
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 195 A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion N. Prasath PG Scholar, Department of CSE, Paavai College of Engineering, Namakkal, India. M. Sivakumar Assistant Professor, Department of Paavai College of Engineering, Namakkal, India. CSE, Abstract— Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems. Index Terms— Sclera vein recognition, finger print vein recognition, vein identification, features fusion, multimodal system. ——————————  —————————— 1 INTRODUCTION The white part of the eye is called sclera. Sclera veins can be captured and analysed using image processing techniques. The vein pattern of eye does not change with age, eye infection and alcohol intake. So it can be used to verify the identity of a person. In some cases sclera vein pattern may not be reliable and hence multi biometric approach is recommended. A new method which combines sclera vein recognition and finger vein recognition to provide better authenticity is proposed. Even though many multimodal systems are available, the combination of sclera and finger vein is different which provides positive and satisfying results. The proposed algorithm extracts features from both sclera and finger vein image and combines to form a final image. The fusion is applicable only if the two extracted patterns are compatible. 2 BACKROUND OF VEIN PATTERN RECOGNITION 2.1 Overview of Sclera Vein Recognition Sclera vein recognition approach involves sclera image identification, segmentation, enhancement, feature extraction. Sclera image segmentation is the first step in sclera vein recognition. It can be obtained with the help of a high definition digital camera. The next step is sclera segmentation. After sclera segmentation, it is necessary to enhance and extract the sclera features since the sclera vein patterns often lack contrast, and are hard to detect. Sclera vein appears to be in Y shape pattern. Y shape line descriptor algorithm is used to extract the features from enhanced sclera image. The flow of sclera vein recognition process is shown in fig. 1. Fig. 1. Simplified Sclera Image extraction process.
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 196 2.2 Y-shape Feature Extraction A novel line-descriptor method is used to describe and store the extracted vein pattern for recognition. The goal is to reliably extract and describe the vein pattern in the sclera for use in identifying the user. As the present set of vessel segments combine to create Y shape branches often belonging to same sclera layer. When the numbers of branches is more than three, the vessels branches may come from different sclera layers and its pattern will deform with movement of eye. Y shape branches are observed to be a stable feature and can be used as sclera feature descriptor. Fig. 2. Enhanced sclera image with Y shape patterns. To detect the Y shape branches in the original template, a search for the nearest neighbours set of every line segment in a regular distance should be conducted and the angles among these neighbours should be classified. If there were two types of angle values in the line segment set, this set may be inferred as a Y- shape structure and the line segment angles would be recorded as a new feature of the sclera. There are two ways to measure both orientation and relationship of every branch of Y shape vessels: 1) One is to use the angles of every branch to x axle, 2) The other is to use the angels between branch and iris radial direction. The first method needs additional rotation operating to align the template. 3 PROPOSED MULTIMODALSYSTEM Proposed Multimodal system is a fusion of two individual biometric systems. It combines the benefits of both sclera vein and finger vein authentication systems. Finger vein authentication is a new biometric approach which verifies one’s identity using finger vein pattern. 3.1 Finger Vein Recognition As the foremost step finger vein pattern should be captured. To do so, a good quality CCD camera and an infrared light emitter can be used. As the infrared lights get absorbed by blood, the vein pattern appears to be a series of dark lines. Then the image is segmented using localized Radon transform (LRT) algorithm. Fig. 3. A typical way of capturing finger vein pattern. 3.2 Repeated Line Tracking The repeated line tracking algorithm is used in finger vein identification. The idea is to trace the veins in the image by choosing directions according to predefined probability in the horizontal and vertical orientations. The starting vein point is randomly selected and the whole process is repeated for certain number of times. Fig. 4. Finger vein image extraction process. A typical finger vein feature extraction process has four steps as mentioned in fig. 4. The foremost process is capturing the finger vein using a CCD camera and Infrared light Emitter. After that the captured image is segmented and enhanced. Enhancing the image helps us to identify the vein pattern clearly. The final image has the entire necessary feature that is required to identify a person uniquely.
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 197 Fig. 5. Enhanced finger vein image with repeated lines. Image fusion is performed by combining the biometric template extracted from every pair of fingerprints and eye representing a user. The matching score is calculated through the Hamming distance calculation between two final fused templates. The template obtained in the encoding process will need a corresponding matching metric that provides a measure of the similarity degree between the two templates. The result of the measure is then compared with an experimental threshold to decide whether or not the two representations belong to the same user. As this method produces exact matching score results and provides dual security it is preferable in many mission critical applications. It can be successfully implemented in low cost and it is expected to give maximum protection by providing unique human identity. Fig. 6. Concatenation of sclera vein and finger vein patterns. A simple concatenation process flow is shown in Fig 6. Both sclera and finger vein images are fused together to form a single image. The final template has the unique properties from sclera as well as finger vein pattern. Therefore, it can be used to find the identity of a person and adopted in security systems as well. 4 DISCUSSION AND CONCLUSION In this paper a new Multimodal biometric authentication method is proposed and analyzed. The new method employs security and special features of both sclera vein pattern and finger vein pattern. Hence, dual security can be achieved. The final image obtained after feature level fusion has the properties of both finger vein and sclera vein. Therefore, it is less prone to forgery. In many Real time environments, multi biometric approach becomes essential and the proposed method better serve the purpose. REFERENCES [1] Antikainen J., Havel J., Josth R., Herout A., Zemcik P. and Hauta-Kasari M. (Feb. 2011), “Nonnegative tensor factorization accelerated using GPGPU,”IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 7, pp. 1135–1141. [2] Crihalmeanu S. and Ross A. (Oct. 2012), “Multispectral scleral patterns for ocular biometric recognition,” Pattern Recognit. Lett., vol. 33, no. 14,pp. 1860–1869. [3] Cirean D. C., Meier U., Gambardella L. M. and Schmidhuber J. (2010), “Deep, big, simple neural nets for handwritten digit recognition,” Neural Comput., vol. 22, no. 12, pp. 3207–3220. [4] Cuevas C., Berjon D., Moran F. and Garcia N. (Feb. 2012), “Moving object detection for real-time augmented reality applications in a GPGPU,” IEEE Trans. Consum. Electron., vol. 58, no. 1, pp. 117–125. [5] Dixon P. R., Oonishi T. and Furui S. (2009), “Harnessing graphics processors for the fast computation of acoustic likelihoods in speech recognition,” Comput. Speech Lang., vol. 23, no. 4, pp. 510–526. [6] Gustavo Poli and José Hiroki Saito,” Parallel Face Recognition Processing Using Neocognitron Neural Network And Gpu With Cuda High Performance Architecture” [7] Hongtao Xie, Ke Gao, Yongdong Zhang,” Efficient Feature Detection And Effective Post-Verification For Large Scale Near-Duplicate Image Search” [8] Kaufman P. and Alm A.(2003), “Clinical application”, Adler’s Physiology of the Eye. [9] Oyster C.W. (1999), “The Human Eye: Structure and Function”, Sunderland:Sinauer Associates. [10] Oh K.S. and Jung K. (2004), “GPU implementation of neural networks,” Pattern Recognit., vol. 37, no. 6, pp. 1311–1314. [11] Poli G., Saito J. H., Mari J. F. and Zorzan M. R. (2008), “Processing neocognitron of face recognition on high performance environment based on GPU with CUDA architecture,” in Proc. 20th Int. Symp. Comput. Archit. High Perform. Comput., pp. 81–88. [12] Rakvic R. N., Ulis B. J., Broussard R. P., Ives R. W. and Steiner N. (Dec. 2009), “Parallelizing iris recognition,” IEEE Trans. Inf. Forensics Security,vol. 4, no. 4, pp. 812– 823.
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 198 [13] Reza Derakhshani, Arun Ross, Simona Crihalmeanu, “A New Biometric Modality Based On Conjunctival Vasculature” [14] Selenick, I.W., 2002,”A new complex-directional wavelet transform and itsapplication to image denoising”. In: IEEE Internat. Conf. on Image Processing, vol. 3, pp. 573–576. [15] Xu Y., Deka S. and Righetti R. (Dec. 2011), “A hybrid CPU-GPGPU approach for real-time elastography,” IEEE Trans. Ultrason., Ferroelectr. Freq.Control, vol. 58, no. 12, pp. 2631–2645. [16] Zhou Z., Du E.Y., Thomas N.L. and Delp E.J. (May 2012), “A new human identification method: Sclera recognition,” IEEE Trans. Syst., Man,Cybern. A, Syst., Humans, vol. 42, no. 3, pp. 571–583. [17] Zhou Z., Du E.Y., Thomas N.L. and Delp E.J. (Jul. 2013), “A comprehensive multimodal eye recognition,” Signal, Image Video Process., vol. 7, no. 4,pp. 619–631. [18] Yong lin, Eliza Yingzi Du, Senior Member, IEEE, Zhi Zhou, Student Member, IEEE, and N.Luke Thomas, “An Efficient Parallel Approach For Sclera Vein Recognition,” Feb. 2014.