SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1370
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris
Images for Multimodal Biometrics Identification
Subhash V.Thul1, Anurag Rishishwar2, Neetesh Raghuwanshi3
1PG Scholar, ECE Department, RKDF Institute of Science & Technology Bhopal, Madhya Pradesh, INDIA
2,3Asst. Professor, ECE Department, RKDF Institute of Science & Technology Bhopal, Madhya Pradesh, INDIA
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Basic aim of a biometric system is
automatically discriminate between subjects as well as
protects data. It also protects resources access from
unauthorized users. In biometric system physical or
behavioral traits are used for recognition purpose. A
multimodal biometric identification system we fuse two or
more physical or behavioral traits. Multimodal biometric
system improves the accuracy. In a multimodal biometric
system each biometric trait processes its information
independently then the processed information is combined
using appropriate fusion scheme. The comparison of data
base template and the input data is done with the help of
Euclidean-distance matching algorithm. Ifthetemplatesare
match we can allow the person to access the system.
Key Words: Biometric, Fusion, Fingerprint
Recognition, Iris Recognition, Multimodal
1. INTRODUCTION
An automated method which recognizesa person basedon
his/her physiological or behavioral characteristic is called
biometrics. A biometric system could be either a
verification system or an identification system depending
on the application. A verification system compares the
acquired trait with the template of the claimed identity
pre-stored in the system. The verification system will
either accept or reject the claimed identity. A verification
system performs one-to one matching. In contrast, an
identification system identifies an individual by searching
potentially, the entire template database for a match. This
kind of a system performs a one-to-many matching. The
identification system can either establish the person's
identity with some level of accuracy or fail if the individual
does not exist in the enrolled database. Biometric
technologies include dynamic signature verification, iris
scanning, face recognition, DNA recognition, voice
recognition and fingerprint identification. Biometric
identification is superiortolowertechnologyidentification
methods in common use today - namely passwords, PIN
numbers, key-cards and smart cards. PINs (personal
identification numbers) were one of the first identifiers to
offer automated recognition. However, this means
recognition of the PIN, implies recognition of the PIN but
not the person to whom they belong. Similar analogy can
be extended to cards and other tokens. The token
recognition is easy but is not 100% fake-proofs. Itcarriesa
threat of being stolen and recreated. The primary use of
physical objects or behaviors based on memory hasa clear
set of problems and limitations. Objects are often lost or
stolen and a behavior based on memory is easilyforgotten.
Identity cannot be guaranteed, privacy is not assumedand
inappropriate use cannot be proven or denied. These
limitations decrease trust and increase the possibility of
fraud. Biometrictechnologiesarebecomingthefoundation
of an extensive array of highly secure identification and
personal verification solutions.
Biometric-based techniques are able to provide for
confidential financial transactions and personal data
privacy. A biometric cannot be easily transferred between
individuals. The scalabilityforintegrating biometricsinto a
variety of processes can be extended if the verification
procedures are made more user-friendly. The most basic
definition of biometrics is that it is a pattern recognition
system, which establishes and validates an individual's
identity based on a specific and unique biological
characteristic.Biometric-basedauthenticationapplications
include workplace, network, and entry access, single sign-
on, application logon, data safeguarding, remote access to
resources, transaction security and Web security.Utilizing
biometrics for personal authentication is becoming
convenient and considerably more accurate than
conventional methods (e.g.usageofPasswordsorPersonal
Identification number). The reason being using biometric
nullifies the need to carry or remember any password or
PIN. Moreover, biometrics is something that are unique to
one and only one person. The rising popularity and
inexpensiveness of such methods make the technology
more acceptable.Biometriccharacteristicscanbeclassified
into two broad categories:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1371
Physiological – based methods verify a person’s identity
by means of his or her physiological characteristicssuchas
fingerprint, facial features, DNA, hand geometry, palm
print, iris pattern.
Behavioral – based methods performs the authentication
task by recognizing people’s behavioral patterns such as
typing rhythm and voice print.
2. LITERATURE SERVEY
One of the biggest challenges facing society today is
confirming the true identity of a person. Biometrics has
been around for many years. Vincenzo Conti et al. [1] used
a frequency based approach for features fusion in
fingerprint and iris multimodal biometric identification
systems. They have come up with an innovative multi-
modal biometric identification system based on iris and
fingerprint traits. The paper is itself benchmark in
advancement of multi-biometrics, offering an innovative
perspective on features fusion. Using frequency-based
approach results in a homogeneous biometric vector that
integrates iris and fingerprint data. Consecutively, a
hamming-distance based matching algorithm can be
coupled with the unified homogenous biometric vector.
Yang F. et al [2] used Fingerprint, palm print, and hand
geometry to implement personal identity verification.
Unlike other multimodal biometric systems, these three
biometric features can be taken from the same image of
hand. They implemented matching score fusion to
establish identity,performingfirstfusionoftheFingerprint
and palm-print features, and later, a matching-scorefusion
between the multimodal system and the unimodal palm-
geometry. F. Besbes, et al [3] proposed a multimodal
biometric system using finger-print and iris features.They
use a hybrid approach based on fingerprint minutiae
extraction and iris tem-plate encoding through a
mathematical representation of the extracted iris region.
This approach is based on two recognition modalities and
every part provides its own decision. The final decision is
taken by considering the unimodal decision through a
―AND‖ operator. Asim Baig et al [4] used a single
hamming distance matcher for fingerprint- iris fusion
based identification system. They proposed a framework
for multimodal biometric identification system which
provide smaller memory footprint and faster
implementation than the conventional systems. This
framework has been verified by developing a fingerprint
and iris fusion system which utilizes a single Hamming
Distance based matcher. Such systems provide higher
accuracy than the individual uni-modal system. Gaurav
Bhatnagar et al [5] presented a newwatermark embedding
technique based on Discrete Wavelet transform(DWT)for
hiding little but important information in images. Sumit
Shekhar et al [6] proposed a multimodal sparse
representation method, whichrepresentsthetestdata bya
sparse linear combination of training data, while
constraining the observations from different modalities of
the test subject to share their sparse representations.
Kittler et al. [7] have experimented with several fusion
techniques for face and voice biometrics. Ben-Yacoubetal.
[8] considered several fusion strategies, such as support
vector machines, tree classifiers and multi-layer
perception, for face and voice biometrics. Maryametal.[9]
proposed fusion of face and iris to obtain a robust
recognition system.inThatstudytheproposedmethoduse
Local Binary pattern local feature extractor an subspace
linear discriminant analysis global feature extractor on
face and iris respectively. Face and iris scores are
normalized using tanh normalization, and then weighted
sum rule is applied for the fusion. Mohamed et al. [10]
multimodal biometric system fusion using fingerprint and
iris are proposed, decision level is used for fusionand each
biometric result is weightedforparticipateinfinal decision
.fuzzy logic is used for the effect of each biometric result
combination. The proposed method has achieved high
accuracy comparing with unimodal systems. L.Latha et al.
[11] have used left and right irises andretinal features,and
after matching process the scores are combined using
weighted sum rule. To validate their approach,
experiments were conducted on the iris and retina images
obtained from CASIA and VARIA database respectively.
Wang Yuan et al [12] proposed a real time fingerprint
recognition system in their paper “A Real TimeFingerprint
Recognition System Based on Novel Fingerprint Matching
Strategy”. In this paper they have presented a new real
time recognition system based on a novel fingerprint
minutiae matching algorithm. Jagadeesan, et al. [13]
prepared a secured cryptographic key on the basis of Iris
and Fingerprint Features. Minutiae points were extracted
from Fingerprint. Similarly texture properties were
extracted from Iris. Feature level fusion was further
employed. Monwar et.al [14] has discussed rank level
fusion of face, ear and signature with principal component
analysis and fisher’s linear discriminant analysis for
matching purpose. Kartik et al. [15] combined speech and
signature by using sum rule as fusion technique after the
min max normalization is applied. Euclidean distance is
used as the classification technique with 81.25% accuracy
performance rate. Rodriguez etal. [16]usedsignaturewith
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1372
iris by using sum rule and product rule as the fusion
techniques. Neural Network is used as the classification
technique with EER below than 2.0%. Toh et al. [17]
combined hand geometry, fingerprint and voice by using
global and local learning decision as fusion approach. The
accuracy performance is 85% to 95%. Meraoumia et al.
[18] presented a multimodal biometric system using hand
images and by integrating two different biometric traits
palmprint and finger-knuckle-print (FKP) with EER =
0.003 %. Xifeng Tong et al. [19] presented a method,
thinning is the process of reducing thickness of eachlineof
patterns to just a single pixel width. The requirements of a
good algorithm with respect to a fingerprint are i) the
thinned fingerprint image obtained should be of single
pixel width with no discontinuities ii) Eachridgeshould be
thinned to its central pixel iii) Noise and singular pixels
should be eliminated iv) no further removal of pixels
should be possible after completion of thinning process.
Bhupesh gaur et al., [20] proposed Scale Invariant Feature
Transformation (SIFT) to represent and match the
fingerprint. By extractingcharacteristic SIFTfeaturepoints
in scale space and perform matching based on the texture
information around the feature points. Thecombinationof
SIFT and conventional minutiae based system achieves
significantly better performance than either of the
individual schemes. Vatsa et al.[21] applied a set of
selected quality local enhancement algorithms togenerate
a single high-quality iris image.Asupport-vector-machine-
based learning algorithm selects locally enhanced regions
from each globally enhanced image and combines these
good-quality regions to create a single high-quality iris
image.
3. MULTI-BIOMETRIC SYSTEM
Some people have poor quality fingerprints, their face
image depends on lighting, their voice can get hoarse due
to cold, and also original image of iris projected on a lens
can make different biometric authentication systems. All
these disadvantagescanbeovercomewithmulti-biometric
systems which combine the results of two or more
biometric characteristics independent from each other.
Uni-modal biometric systems are affected by many
problems like noisy sensor data, non- universality, lack of
individuality, lack of invariant representation and
susceptibility to circumventionduetowhichtheuni-modal
biometric systems error rate is quite high thatmakesthem
unacceptable for security applications. Such types of
problems can be alleviated by using two or more uni-
modal biometrics as multi-biometric systems.
The architecture of a multi-biometric system depends on
the sequence through which each biometrics are acquired
and processed. Typically these architectures are either
serial or parallel. In the serial architecture, the result of
one modality affects the processing of the subsequent
modality. In parallel design, different modalities operate
independently and their results are combined with
appropriate fusion method. Multi-biometric systems use
five different methods for solving single biometric
disadvantages:
Multi-sensor: using two or more sensors for obtaining
data from one biometric (Fingerprint image with two
optical and alter sound sensors).
Multi-presentation: several sensors capturing several
similar body parts. (Multi fingerprint image from multi
finger of one person).
Multi instance: the same sensor capturing several
instances of the same body part. (Different position face
image).
Multi- algorithm: the same sensor is used but its input is
processed by different algorithmandcomparesthe results.
Multi-modal: using different sensors for different
biometrics and fusion the results. (Like fusion iris and
fingerprint code as multi-biometric).
For combining two or more uni-modal biometrics and
making a multi-biometric system, two or more acceptance
results must be combined as fusion. Fusion strategies can
be divided into two main categories: premapping fusion
(before the matchingphase) andpostmappingfusion(after
the matching phase). The first strategy deals with the
sensor level fusion, feature level fusion. Usually, these
techniques are not used because they result in many
implementation problems. The second strategy is realized
through fusion at the decision level, based on some
algorithms, which combine single decisions for each
component of the system. Furthermore, the second
strategy is also based on the matching-score level, which
combines the matching scores of each component system.
A generic biometric system has 4 important modules: (a)
the sensor module which captures the trait in the form of
raw biometric data; (b) the feature extraction module
which processes the data to extract a feature set that is a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1373
Fig 3.1:Schematic diagram of multibiometric system
compact representation of the trait; (c) the matching
module which employs a classifier to compare the
extracted feature set with the stored templatestogenerate
matching scores; (d) the decision module which uses the
matching scores to either determine anidentity orvalidate
a claimed identity. Figure (i) is the representation of a
conventional biometric system. The main operations that
the system can perform are enrolment and testing. During
enrolment biometric information of an individual are
stored, during test biometric information are detectedand
compared with the stored ones. The first block (sensor) is
the interface between the real world and oursystem;ithas
to acquire all the necessary data. Most of the times it is an
image acquisition system, but it can change according to
the characteristics we want to consider. The second block
performs all the necessary preprocessing: it hastoremove
artifacts from the sensor, to enhance the input (e.g.
removing some noise), to use some kind of normalization,
etc. In the third block we have to extract the features we
need. This step is really important: we have to choose
which features to extract and how to do it, with certain
efficiency to create a template. After that, we are matching
the input pattern and the Data base pattern using pattern
matching technique.
Finally Authentication occurs based on pattern matching.
System is divided into three sub-systems:- Fingerprint
recognition, Iris recognition, Fusion techniques:
3.1 Fingerprint recognition
Fingerprint recognition involves the following four steps:
The pre-processing of the image involves taking the image
and applying various processes on the image so that it can
easily be processed to find out the ridge endings and
bifurcation points. The two major steps in the pre-
processing are:
1) Binarizing: In this step the colors of the image are
binaries so that the output image consists of only two
colors, black and white.
2) Thinning: After the fingerprint image is converted to
binary form, submitted to the thinning algorithm which
reduces the ridge thickness to one pixel wide,
demonstrates that the global thresholding technique is
effective in separating the ridges (black pixels) from the
valleys (white pixels). The resultsofthinningshowthatthe
connectivity of the ridge structures is well preserved, and
that the skeleton is eight-connected throughout theimage.
Fig.3- (a) Input image (b)Binarized image (c)Thinned
image (d)Ridge end+Bifurcation (e)Common Region of
ROI and Image (f)Final Minutiae
3) Minutiae extraction: The most commonly employed
method of minutiae extractionistheCrossingnumber(CN)
concept. This method involves the use of the skeleton
image where the ridge flow patterniseight-connected.The
minutiae are extracted by scanningthelocal neighborhood
of each ridge pixel in the image using a 3*3 window. The
CN value is then computed, which is defined as half the
sum of the differences between pairs of adjacent pixels in
the eight-neighborhood. Using the properties of the CN as,
the ridge pixel can then be classified as a ridge ending,
bifurcation or non-minutiae point.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1374
4) Matching: The algorithm that we have appliedtomatch
two fingerprints involves calculating hamming distance
between each ridge end and all other ridge ends and
similarly between all bifurcations and then taking the
average for both and at last add the results for achieving
high accuracy and precision level. This process is applied
on both the images and the results of the two images are
compared to give the percentage match between the two
images.
3.2 Iris recognition
1) Iris segmentation: It is a significant module in iris
recognition. It comprises of two steps 1) canny edge
detection technique 2) The parabolic Hough transform.
The iris image is first fed as input to the canny edge
detection algorithm that produces the edge map of the iris
image for boundary estimation. The exact boundary of
pupil and iris is located from the detected edge map using
the Hough transform. Hough transformhasbeen enhanced
to find positions of arbitrary shapes, usually circles or
ellipses. For the parameters of circles passing through
every edge point, votes are being casted in Hough space,
from the obtained edge map. These parameters are the
centre coordinates x and y, and the radius are capable to
describe the circle in accordance with this equation:
………………………………….. (1)
2) Iris normalization: Once the segmentation module has
estimated the iris’s boundary, the normalization module
uses image registration technique to transform the iris
texture from Cartesian to polar coordinates. Daugman`s
Rubber Sheet Model is utilized for the transformation
process.
3) Feature encoding: Feature encoding extracts the
underlying information in an irispatternandgeneratesthe
binary iris template that is used in matching. The
normalized 2D form image is disintegrated up into 1D
signal, and these signals are made use to convolve with 1D
Gabor wavelets. The frequency response of a Log-Gabor
filter is as follows,
…………………………….. (2)
Where fo indicates the centre frequency and σ provides
bandwidth of the filter. The Log-Gabor filter generates the
biometric feature (texture properties) of the iris.
4) Matching: we are using Hamming distances (HD) to
calculate the matching scores between two iris templates.
3.3 Range normalization
The scores generated by a biometric system can be either
similarity scores or distance scores, one need to convert
these scores into a same nature. Normalization maps the
raw matching scores to interval [0, 1] and retains the
original distribution of matchingscoresexceptfora scaling
factor. Given that max(X)and min(X)arethemaximumand
minimum values of the raw matching scores, respectively,
the normalized score is calculated as
………..……………………….…. (3)
3.4 Sum rule based score level fusion
The procedure for sum rule-based fusion is stated as
following.
After we get a set of normalizedscores(x1,x2,…….,xm)from
a particular person (here the index i=1,….,m indicates the
biometric matcher), the fused score fs is evaluated using
the formula,
fs =w1x1+ . . . +wmxm …………..…………………………...(4)
The notation wi stands for the weight which is assigned to
the matcher–i, for i=1,…, m. There are manychoicesofhow
to calculate these weights based on some preliminary
results. In the next step, the fused score fs will be
compared to a pre- specified threshold t. If fs≥ t, then a
person declares as to be genuine otherwise, declare as an
impostor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1375
4. CONCLUSIONS
Biometric features are unique to each individual and
remain unaltered duringa person’slifetime.Thesefeatures
make biometrics a promising solution to the society.
Enlarging user population coverage and reducing
enrollment failure are additional reasons for combining
these multiple traits for recognition. An efficientalgorithm
using the phase-based image matching is particularly
effective for verifying low-quality fingerprint images that
could not be identified correctly by conventional
techniques. Log-Gabor filter is effective method than any
other technique to extract feature from iris image capture.
Fusion can be applied to enhance the performance of
system and security level.
REFERENCES
[1] Vincenzo Conti, Carmelo Militello, Filippo Sorbello, “A
Frequency-Based Approach for Features Fusion in
Fingerprint and Iris Multimodal Biometric Identification
Systems”, IEEE transactions on systems, man and
cybernetics- Part C: Applications and Reviews, Vol. 40, No.
4, July 2010
[2] Yang F. and Ma B. (2007) 4th IEEE International
Conference on Image and Graphics, Jinhua, 689-693.
[3] F. Besbes, H. Trichili, and B. Solaiman, ―Multimodal
biometric sys-tem based on fingerprint identification and
Iris recognition,‖ in Proc. 3rd Int.IEEE Conf. Inf. Commun.
Technol.: From Theory to Applica-tions (ICTTA 2008), pp.
1–5. DOI: 10.1109/ICTTA.2008.4530129.
[4] Asim Biag, Ahmed Bouridane,FaithKurugolluandGang
Qu, “Fimgerprint- Iris Fuion based Identification System
using a Single Hamming Distance Matcher”, 2009
Symposium on Bio-inspired Learning and Intelligent
Systems for Security.
[5] Gaurav Bhatnagar, Q.M. Jonatihan Wu,
Balasubramanian Raman, “Biometric Template Security
based on Watermarking”, Elsevier, 2010.
[6] Sumit Shekhar, Student Member, IEEE, Vishal M. Patel,
Member, IEEE, Nasser M. Nasrabadi, Fellow, IEEE, “Joint
Sparse Representation for Robust Multimodal Biometrics
Recognition”, IEEE, 2013
[7] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On
Combining Classifiers”, IEEE Trans. PAMI, vol. 20,no.3,pp.
226-239, 1998.
[8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz,“Fusion
of Face and Speech Data for Person Identity Verification”,
IEEE Trans. Neural Networks, vol. 10,no.5,pp.1065-1075,
1999.
[9] Maryam Eskandari and O’nsen Toygar. 2012 Fusion of
face and iris biometrics using local and global feature
extraction methods. Signal, Image and Video Processing,
pages 1–12.
[10] Mohamad Abdolahi, Majid Mohamadi, and Mehdi
Jafari. 2013. Multimodal biometric system fusion using
fingerprint and iris with fuzzy logic. International Journal
of Soft Computing and Engineering, 2(6):504 510.
[11] L Latha and S Thangasamy. 2010. A robust person
authentication system based on score level fusion of left
and right irises and retinal features. Procedia Computer
Science, 2:111–120.
[12] Wang Yuan, Yao Lixiu nad Zhou Fugiang, “A Real Time
Fingerprint Recognition System Based On Novel
Fingerprint Matching Strategy”, Electronic Measurement
and Instruments, 2007. ICEMI '07. 8th International
Conference, July 2007.
[13] JagadeesanA.,ThillaikkarasiT.,DuraiswamyK.(2011)
European Journal of Scientific Research, 49(4), 488-502.
[14] Md. Maruf Monwar & Marina, L. Gavrilova, (2009).
Multimodal biometric system using rank-level fusion
approach. IEEE Transactions on Systems, Man, and
Cybernetics—Part B: Cybernetics, Vol. 39, No. 4, pp. 867-
878.
[15] Kartik.P, S.R. Mahadeva Prasanna and Vara.R.P,
“Multimodal biometricpersonauthenticationsystemusing
speech and signature features,” in TENCON 2008 2008
IEEE Region 10 Conference, pp. 1-6, Ed, 2008.
[16] Rodriguez.L.P, Crespo.A.G, Lara.M and Mezcua.M.R,
“Study of Different Fusion Techniques for Multimodal
Biometric Authentication,” in Networking and
Communications. IEEE International Conference on
Wireless and Mobile Computing, 2008.
[17] Toh.K.A, J. Xudong and Y. Wei-Yun, “Exploiting global
and local decisions formultimodal biometricsverification,”
Signal Processing, IEEE Transactions on Signal Processing,
vol. 52, pp. 3059-3072, 2004
[18] A. Meraoumia, S. Chitroub and A. Bouridane, “Fusion
of Finger-Knuckle-Print and Palmprint for an Efficient
Multi-biometric System of Person Recognition”, IEEE ICC
2011.
[19] Xifeng Tong, Songbo Liu, Jianhua Huang, and
Xianglong Tang, “Local Relative Location Error Descriptior-
Based Fingerprint Minutiae Matching”, the Journal of the
Pattern Recognition Letters, vol. 29, pp. 286-294, (2008).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1376
[20] Bhupesh Gour, T. K. Bandopadhyaya and Sudhir
Sharma, “Fingerprint Feature Extraction using Midpoint
Ridge Contour Method and Neural Network”, International
Journal of Computer Science and Network Security, vol. 8,
no, 7, pp. 99-109, (2008).
[21] M. Vatsa, R. Singh, and A. Noore, “Improving iris
recognition performance using segmentation, quality
enhancement, match score fusion, and indexing,” IEEE
Trans. Syst., Man, Cybern. B, Cybern.,vol.38,no.4,pp.1021–
1035, Aug. 2008.

More Related Content

What's hot

Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496IJRAT
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET Journal
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationseSAT Journals
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
A study of multimodal biometric system
A study of multimodal biometric systemA study of multimodal biometric system
A study of multimodal biometric systemeSAT Publishing House
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusioneSAT Publishing House
 

What's hot (19)

Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
50120130406045
5012013040604550120130406045
50120130406045
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
A study of multimodal biometric system
A study of multimodal biometric systemA study of multimodal biometric system
A study of multimodal biometric system
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
 

Similar to Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for Multimodal Biometrics Identification

Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
A New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image ProcessingA New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image Processingrahulmonikasharma
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
 

Similar to Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for Multimodal Biometrics Identification (20)

Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
 
A New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image ProcessingA New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image Processing
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of Fingerprint
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
D56021216
D56021216D56021216
D56021216
 
Automation Attendance Systems Approaches: A Practical Review
Automation Attendance Systems Approaches: A Practical ReviewAutomation Attendance Systems Approaches: A Practical Review
Automation Attendance Systems Approaches: A Practical Review
 
33 102-1-pb
33 102-1-pb33 102-1-pb
33 102-1-pb
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for Multimodal Biometrics Identification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1370 Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for Multimodal Biometrics Identification Subhash V.Thul1, Anurag Rishishwar2, Neetesh Raghuwanshi3 1PG Scholar, ECE Department, RKDF Institute of Science & Technology Bhopal, Madhya Pradesh, INDIA 2,3Asst. Professor, ECE Department, RKDF Institute of Science & Technology Bhopal, Madhya Pradesh, INDIA ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Basic aim of a biometric system is automatically discriminate between subjects as well as protects data. It also protects resources access from unauthorized users. In biometric system physical or behavioral traits are used for recognition purpose. A multimodal biometric identification system we fuse two or more physical or behavioral traits. Multimodal biometric system improves the accuracy. In a multimodal biometric system each biometric trait processes its information independently then the processed information is combined using appropriate fusion scheme. The comparison of data base template and the input data is done with the help of Euclidean-distance matching algorithm. Ifthetemplatesare match we can allow the person to access the system. Key Words: Biometric, Fusion, Fingerprint Recognition, Iris Recognition, Multimodal 1. INTRODUCTION An automated method which recognizesa person basedon his/her physiological or behavioral characteristic is called biometrics. A biometric system could be either a verification system or an identification system depending on the application. A verification system compares the acquired trait with the template of the claimed identity pre-stored in the system. The verification system will either accept or reject the claimed identity. A verification system performs one-to one matching. In contrast, an identification system identifies an individual by searching potentially, the entire template database for a match. This kind of a system performs a one-to-many matching. The identification system can either establish the person's identity with some level of accuracy or fail if the individual does not exist in the enrolled database. Biometric technologies include dynamic signature verification, iris scanning, face recognition, DNA recognition, voice recognition and fingerprint identification. Biometric identification is superiortolowertechnologyidentification methods in common use today - namely passwords, PIN numbers, key-cards and smart cards. PINs (personal identification numbers) were one of the first identifiers to offer automated recognition. However, this means recognition of the PIN, implies recognition of the PIN but not the person to whom they belong. Similar analogy can be extended to cards and other tokens. The token recognition is easy but is not 100% fake-proofs. Itcarriesa threat of being stolen and recreated. The primary use of physical objects or behaviors based on memory hasa clear set of problems and limitations. Objects are often lost or stolen and a behavior based on memory is easilyforgotten. Identity cannot be guaranteed, privacy is not assumedand inappropriate use cannot be proven or denied. These limitations decrease trust and increase the possibility of fraud. Biometrictechnologiesarebecomingthefoundation of an extensive array of highly secure identification and personal verification solutions. Biometric-based techniques are able to provide for confidential financial transactions and personal data privacy. A biometric cannot be easily transferred between individuals. The scalabilityforintegrating biometricsinto a variety of processes can be extended if the verification procedures are made more user-friendly. The most basic definition of biometrics is that it is a pattern recognition system, which establishes and validates an individual's identity based on a specific and unique biological characteristic.Biometric-basedauthenticationapplications include workplace, network, and entry access, single sign- on, application logon, data safeguarding, remote access to resources, transaction security and Web security.Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than conventional methods (e.g.usageofPasswordsorPersonal Identification number). The reason being using biometric nullifies the need to carry or remember any password or PIN. Moreover, biometrics is something that are unique to one and only one person. The rising popularity and inexpensiveness of such methods make the technology more acceptable.Biometriccharacteristicscanbeclassified into two broad categories:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1371 Physiological – based methods verify a person’s identity by means of his or her physiological characteristicssuchas fingerprint, facial features, DNA, hand geometry, palm print, iris pattern. Behavioral – based methods performs the authentication task by recognizing people’s behavioral patterns such as typing rhythm and voice print. 2. LITERATURE SERVEY One of the biggest challenges facing society today is confirming the true identity of a person. Biometrics has been around for many years. Vincenzo Conti et al. [1] used a frequency based approach for features fusion in fingerprint and iris multimodal biometric identification systems. They have come up with an innovative multi- modal biometric identification system based on iris and fingerprint traits. The paper is itself benchmark in advancement of multi-biometrics, offering an innovative perspective on features fusion. Using frequency-based approach results in a homogeneous biometric vector that integrates iris and fingerprint data. Consecutively, a hamming-distance based matching algorithm can be coupled with the unified homogenous biometric vector. Yang F. et al [2] used Fingerprint, palm print, and hand geometry to implement personal identity verification. Unlike other multimodal biometric systems, these three biometric features can be taken from the same image of hand. They implemented matching score fusion to establish identity,performingfirstfusionoftheFingerprint and palm-print features, and later, a matching-scorefusion between the multimodal system and the unimodal palm- geometry. F. Besbes, et al [3] proposed a multimodal biometric system using finger-print and iris features.They use a hybrid approach based on fingerprint minutiae extraction and iris tem-plate encoding through a mathematical representation of the extracted iris region. This approach is based on two recognition modalities and every part provides its own decision. The final decision is taken by considering the unimodal decision through a ―AND‖ operator. Asim Baig et al [4] used a single hamming distance matcher for fingerprint- iris fusion based identification system. They proposed a framework for multimodal biometric identification system which provide smaller memory footprint and faster implementation than the conventional systems. This framework has been verified by developing a fingerprint and iris fusion system which utilizes a single Hamming Distance based matcher. Such systems provide higher accuracy than the individual uni-modal system. Gaurav Bhatnagar et al [5] presented a newwatermark embedding technique based on Discrete Wavelet transform(DWT)for hiding little but important information in images. Sumit Shekhar et al [6] proposed a multimodal sparse representation method, whichrepresentsthetestdata bya sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Kittler et al. [7] have experimented with several fusion techniques for face and voice biometrics. Ben-Yacoubetal. [8] considered several fusion strategies, such as support vector machines, tree classifiers and multi-layer perception, for face and voice biometrics. Maryametal.[9] proposed fusion of face and iris to obtain a robust recognition system.inThatstudytheproposedmethoduse Local Binary pattern local feature extractor an subspace linear discriminant analysis global feature extractor on face and iris respectively. Face and iris scores are normalized using tanh normalization, and then weighted sum rule is applied for the fusion. Mohamed et al. [10] multimodal biometric system fusion using fingerprint and iris are proposed, decision level is used for fusionand each biometric result is weightedforparticipateinfinal decision .fuzzy logic is used for the effect of each biometric result combination. The proposed method has achieved high accuracy comparing with unimodal systems. L.Latha et al. [11] have used left and right irises andretinal features,and after matching process the scores are combined using weighted sum rule. To validate their approach, experiments were conducted on the iris and retina images obtained from CASIA and VARIA database respectively. Wang Yuan et al [12] proposed a real time fingerprint recognition system in their paper “A Real TimeFingerprint Recognition System Based on Novel Fingerprint Matching Strategy”. In this paper they have presented a new real time recognition system based on a novel fingerprint minutiae matching algorithm. Jagadeesan, et al. [13] prepared a secured cryptographic key on the basis of Iris and Fingerprint Features. Minutiae points were extracted from Fingerprint. Similarly texture properties were extracted from Iris. Feature level fusion was further employed. Monwar et.al [14] has discussed rank level fusion of face, ear and signature with principal component analysis and fisher’s linear discriminant analysis for matching purpose. Kartik et al. [15] combined speech and signature by using sum rule as fusion technique after the min max normalization is applied. Euclidean distance is used as the classification technique with 81.25% accuracy performance rate. Rodriguez etal. [16]usedsignaturewith
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1372 iris by using sum rule and product rule as the fusion techniques. Neural Network is used as the classification technique with EER below than 2.0%. Toh et al. [17] combined hand geometry, fingerprint and voice by using global and local learning decision as fusion approach. The accuracy performance is 85% to 95%. Meraoumia et al. [18] presented a multimodal biometric system using hand images and by integrating two different biometric traits palmprint and finger-knuckle-print (FKP) with EER = 0.003 %. Xifeng Tong et al. [19] presented a method, thinning is the process of reducing thickness of eachlineof patterns to just a single pixel width. The requirements of a good algorithm with respect to a fingerprint are i) the thinned fingerprint image obtained should be of single pixel width with no discontinuities ii) Eachridgeshould be thinned to its central pixel iii) Noise and singular pixels should be eliminated iv) no further removal of pixels should be possible after completion of thinning process. Bhupesh gaur et al., [20] proposed Scale Invariant Feature Transformation (SIFT) to represent and match the fingerprint. By extractingcharacteristic SIFTfeaturepoints in scale space and perform matching based on the texture information around the feature points. Thecombinationof SIFT and conventional minutiae based system achieves significantly better performance than either of the individual schemes. Vatsa et al.[21] applied a set of selected quality local enhancement algorithms togenerate a single high-quality iris image.Asupport-vector-machine- based learning algorithm selects locally enhanced regions from each globally enhanced image and combines these good-quality regions to create a single high-quality iris image. 3. MULTI-BIOMETRIC SYSTEM Some people have poor quality fingerprints, their face image depends on lighting, their voice can get hoarse due to cold, and also original image of iris projected on a lens can make different biometric authentication systems. All these disadvantagescanbeovercomewithmulti-biometric systems which combine the results of two or more biometric characteristics independent from each other. Uni-modal biometric systems are affected by many problems like noisy sensor data, non- universality, lack of individuality, lack of invariant representation and susceptibility to circumventionduetowhichtheuni-modal biometric systems error rate is quite high thatmakesthem unacceptable for security applications. Such types of problems can be alleviated by using two or more uni- modal biometrics as multi-biometric systems. The architecture of a multi-biometric system depends on the sequence through which each biometrics are acquired and processed. Typically these architectures are either serial or parallel. In the serial architecture, the result of one modality affects the processing of the subsequent modality. In parallel design, different modalities operate independently and their results are combined with appropriate fusion method. Multi-biometric systems use five different methods for solving single biometric disadvantages: Multi-sensor: using two or more sensors for obtaining data from one biometric (Fingerprint image with two optical and alter sound sensors). Multi-presentation: several sensors capturing several similar body parts. (Multi fingerprint image from multi finger of one person). Multi instance: the same sensor capturing several instances of the same body part. (Different position face image). Multi- algorithm: the same sensor is used but its input is processed by different algorithmandcomparesthe results. Multi-modal: using different sensors for different biometrics and fusion the results. (Like fusion iris and fingerprint code as multi-biometric). For combining two or more uni-modal biometrics and making a multi-biometric system, two or more acceptance results must be combined as fusion. Fusion strategies can be divided into two main categories: premapping fusion (before the matchingphase) andpostmappingfusion(after the matching phase). The first strategy deals with the sensor level fusion, feature level fusion. Usually, these techniques are not used because they result in many implementation problems. The second strategy is realized through fusion at the decision level, based on some algorithms, which combine single decisions for each component of the system. Furthermore, the second strategy is also based on the matching-score level, which combines the matching scores of each component system. A generic biometric system has 4 important modules: (a) the sensor module which captures the trait in the form of raw biometric data; (b) the feature extraction module which processes the data to extract a feature set that is a
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1373 Fig 3.1:Schematic diagram of multibiometric system compact representation of the trait; (c) the matching module which employs a classifier to compare the extracted feature set with the stored templatestogenerate matching scores; (d) the decision module which uses the matching scores to either determine anidentity orvalidate a claimed identity. Figure (i) is the representation of a conventional biometric system. The main operations that the system can perform are enrolment and testing. During enrolment biometric information of an individual are stored, during test biometric information are detectedand compared with the stored ones. The first block (sensor) is the interface between the real world and oursystem;ithas to acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics we want to consider. The second block performs all the necessary preprocessing: it hastoremove artifacts from the sensor, to enhance the input (e.g. removing some noise), to use some kind of normalization, etc. In the third block we have to extract the features we need. This step is really important: we have to choose which features to extract and how to do it, with certain efficiency to create a template. After that, we are matching the input pattern and the Data base pattern using pattern matching technique. Finally Authentication occurs based on pattern matching. System is divided into three sub-systems:- Fingerprint recognition, Iris recognition, Fusion techniques: 3.1 Fingerprint recognition Fingerprint recognition involves the following four steps: The pre-processing of the image involves taking the image and applying various processes on the image so that it can easily be processed to find out the ridge endings and bifurcation points. The two major steps in the pre- processing are: 1) Binarizing: In this step the colors of the image are binaries so that the output image consists of only two colors, black and white. 2) Thinning: After the fingerprint image is converted to binary form, submitted to the thinning algorithm which reduces the ridge thickness to one pixel wide, demonstrates that the global thresholding technique is effective in separating the ridges (black pixels) from the valleys (white pixels). The resultsofthinningshowthatthe connectivity of the ridge structures is well preserved, and that the skeleton is eight-connected throughout theimage. Fig.3- (a) Input image (b)Binarized image (c)Thinned image (d)Ridge end+Bifurcation (e)Common Region of ROI and Image (f)Final Minutiae 3) Minutiae extraction: The most commonly employed method of minutiae extractionistheCrossingnumber(CN) concept. This method involves the use of the skeleton image where the ridge flow patterniseight-connected.The minutiae are extracted by scanningthelocal neighborhood of each ridge pixel in the image using a 3*3 window. The CN value is then computed, which is defined as half the sum of the differences between pairs of adjacent pixels in the eight-neighborhood. Using the properties of the CN as, the ridge pixel can then be classified as a ridge ending, bifurcation or non-minutiae point.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1374 4) Matching: The algorithm that we have appliedtomatch two fingerprints involves calculating hamming distance between each ridge end and all other ridge ends and similarly between all bifurcations and then taking the average for both and at last add the results for achieving high accuracy and precision level. This process is applied on both the images and the results of the two images are compared to give the percentage match between the two images. 3.2 Iris recognition 1) Iris segmentation: It is a significant module in iris recognition. It comprises of two steps 1) canny edge detection technique 2) The parabolic Hough transform. The iris image is first fed as input to the canny edge detection algorithm that produces the edge map of the iris image for boundary estimation. The exact boundary of pupil and iris is located from the detected edge map using the Hough transform. Hough transformhasbeen enhanced to find positions of arbitrary shapes, usually circles or ellipses. For the parameters of circles passing through every edge point, votes are being casted in Hough space, from the obtained edge map. These parameters are the centre coordinates x and y, and the radius are capable to describe the circle in accordance with this equation: ………………………………….. (1) 2) Iris normalization: Once the segmentation module has estimated the iris’s boundary, the normalization module uses image registration technique to transform the iris texture from Cartesian to polar coordinates. Daugman`s Rubber Sheet Model is utilized for the transformation process. 3) Feature encoding: Feature encoding extracts the underlying information in an irispatternandgeneratesthe binary iris template that is used in matching. The normalized 2D form image is disintegrated up into 1D signal, and these signals are made use to convolve with 1D Gabor wavelets. The frequency response of a Log-Gabor filter is as follows, …………………………….. (2) Where fo indicates the centre frequency and σ provides bandwidth of the filter. The Log-Gabor filter generates the biometric feature (texture properties) of the iris. 4) Matching: we are using Hamming distances (HD) to calculate the matching scores between two iris templates. 3.3 Range normalization The scores generated by a biometric system can be either similarity scores or distance scores, one need to convert these scores into a same nature. Normalization maps the raw matching scores to interval [0, 1] and retains the original distribution of matchingscoresexceptfora scaling factor. Given that max(X)and min(X)arethemaximumand minimum values of the raw matching scores, respectively, the normalized score is calculated as ………..……………………….…. (3) 3.4 Sum rule based score level fusion The procedure for sum rule-based fusion is stated as following. After we get a set of normalizedscores(x1,x2,…….,xm)from a particular person (here the index i=1,….,m indicates the biometric matcher), the fused score fs is evaluated using the formula, fs =w1x1+ . . . +wmxm …………..…………………………...(4) The notation wi stands for the weight which is assigned to the matcher–i, for i=1,…, m. There are manychoicesofhow to calculate these weights based on some preliminary results. In the next step, the fused score fs will be compared to a pre- specified threshold t. If fs≥ t, then a person declares as to be genuine otherwise, declare as an impostor.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1375 4. CONCLUSIONS Biometric features are unique to each individual and remain unaltered duringa person’slifetime.Thesefeatures make biometrics a promising solution to the society. Enlarging user population coverage and reducing enrollment failure are additional reasons for combining these multiple traits for recognition. An efficientalgorithm using the phase-based image matching is particularly effective for verifying low-quality fingerprint images that could not be identified correctly by conventional techniques. Log-Gabor filter is effective method than any other technique to extract feature from iris image capture. Fusion can be applied to enhance the performance of system and security level. REFERENCES [1] Vincenzo Conti, Carmelo Militello, Filippo Sorbello, “A Frequency-Based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems”, IEEE transactions on systems, man and cybernetics- Part C: Applications and Reviews, Vol. 40, No. 4, July 2010 [2] Yang F. and Ma B. (2007) 4th IEEE International Conference on Image and Graphics, Jinhua, 689-693. [3] F. Besbes, H. Trichili, and B. Solaiman, ―Multimodal biometric sys-tem based on fingerprint identification and Iris recognition,‖ in Proc. 3rd Int.IEEE Conf. Inf. Commun. Technol.: From Theory to Applica-tions (ICTTA 2008), pp. 1–5. DOI: 10.1109/ICTTA.2008.4530129. [4] Asim Biag, Ahmed Bouridane,FaithKurugolluandGang Qu, “Fimgerprint- Iris Fuion based Identification System using a Single Hamming Distance Matcher”, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security. [5] Gaurav Bhatnagar, Q.M. Jonatihan Wu, Balasubramanian Raman, “Biometric Template Security based on Watermarking”, Elsevier, 2010. [6] Sumit Shekhar, Student Member, IEEE, Vishal M. Patel, Member, IEEE, Nasser M. Nasrabadi, Fellow, IEEE, “Joint Sparse Representation for Robust Multimodal Biometrics Recognition”, IEEE, 2013 [7] J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers”, IEEE Trans. PAMI, vol. 20,no.3,pp. 226-239, 1998. [8] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz,“Fusion of Face and Speech Data for Person Identity Verification”, IEEE Trans. Neural Networks, vol. 10,no.5,pp.1065-1075, 1999. [9] Maryam Eskandari and O’nsen Toygar. 2012 Fusion of face and iris biometrics using local and global feature extraction methods. Signal, Image and Video Processing, pages 1–12. [10] Mohamad Abdolahi, Majid Mohamadi, and Mehdi Jafari. 2013. Multimodal biometric system fusion using fingerprint and iris with fuzzy logic. International Journal of Soft Computing and Engineering, 2(6):504 510. [11] L Latha and S Thangasamy. 2010. A robust person authentication system based on score level fusion of left and right irises and retinal features. Procedia Computer Science, 2:111–120. [12] Wang Yuan, Yao Lixiu nad Zhou Fugiang, “A Real Time Fingerprint Recognition System Based On Novel Fingerprint Matching Strategy”, Electronic Measurement and Instruments, 2007. ICEMI '07. 8th International Conference, July 2007. [13] JagadeesanA.,ThillaikkarasiT.,DuraiswamyK.(2011) European Journal of Scientific Research, 49(4), 488-502. [14] Md. Maruf Monwar & Marina, L. Gavrilova, (2009). Multimodal biometric system using rank-level fusion approach. IEEE Transactions on Systems, Man, and Cybernetics—Part B: Cybernetics, Vol. 39, No. 4, pp. 867- 878. [15] Kartik.P, S.R. Mahadeva Prasanna and Vara.R.P, “Multimodal biometricpersonauthenticationsystemusing speech and signature features,” in TENCON 2008 2008 IEEE Region 10 Conference, pp. 1-6, Ed, 2008. [16] Rodriguez.L.P, Crespo.A.G, Lara.M and Mezcua.M.R, “Study of Different Fusion Techniques for Multimodal Biometric Authentication,” in Networking and Communications. IEEE International Conference on Wireless and Mobile Computing, 2008. [17] Toh.K.A, J. Xudong and Y. Wei-Yun, “Exploiting global and local decisions formultimodal biometricsverification,” Signal Processing, IEEE Transactions on Signal Processing, vol. 52, pp. 3059-3072, 2004 [18] A. Meraoumia, S. Chitroub and A. Bouridane, “Fusion of Finger-Knuckle-Print and Palmprint for an Efficient Multi-biometric System of Person Recognition”, IEEE ICC 2011. [19] Xifeng Tong, Songbo Liu, Jianhua Huang, and Xianglong Tang, “Local Relative Location Error Descriptior- Based Fingerprint Minutiae Matching”, the Journal of the Pattern Recognition Letters, vol. 29, pp. 286-294, (2008).
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1376 [20] Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, “Fingerprint Feature Extraction using Midpoint Ridge Contour Method and Neural Network”, International Journal of Computer Science and Network Security, vol. 8, no, 7, pp. 99-109, (2008). [21] M. Vatsa, R. Singh, and A. Noore, “Improving iris recognition performance using segmentation, quality enhancement, match score fusion, and indexing,” IEEE Trans. Syst., Man, Cybern. B, Cybern.,vol.38,no.4,pp.1021– 1035, Aug. 2008.