The document describes a proposed new multimodal approach for human authentication using sclera vein and finger vein recognition. It discusses challenges with sclera vein recognition alone and proposes combining it with finger vein recognition to overcome limitations. The system would enroll users by extracting features from sclera vein and finger vein images and storing them in a database. During authentication, the user could be verified using either biometrics to increase accuracy and security compared to a unimodal system.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This paper discusses the implementation issues of installing a commercially available hand geometry system in the current infrastructure of Purdue University's Recreational Sports Center. In addition to a performance analysis of the system, a pre- and post- data collection survey was distributed to the 129 test subjects gathering information on perceptions of biometrics, in particular hand geometry, as well as participants' thoughts and feelings during their interaction with the hand geometry device. The results of the survey suggest that participants were accepting of hand geometry. Additionally, analyses of the participants' survey responses revealed that 93% liked using hand geometry, 98% thought it was easy to use, and 87% preferred it to the existing card-based system, while nobody thought the device invaded their personal privacy. System performance achieved a 3-try match rate of 99.02% (FRR 0.98%) when "gaming"/potential impostor attempts were removed from analysis. The failure to enroll rate was zero. Statistical analyses exposed a significant difference in the scores of attempts made by users with prior hand geometry usage, and subjects that could not straighten out their hand on the device. However, there were no statistical difference in the effects of rings/no rings, improper hand placements/proper hand placements, or gender on hand geometry score.
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
This paper proposes a Bio metric identification system for person identification using two bio metric traits
hand geometry and palm print. The hand image captured from digital camera is preprocessed to identify
key points on palm region of hand. Identified key points are used to find hand geometry feature and palm
print Region of interest (ROI). The discriminative palm print features are extracted by applying local
binary descriptor on palm print ROI. In a bio metric identification system the identity corresponding to the
input image (probe) is determined by comparing probe template with the templates of all identities enrolled
in biometric system (gallery). Response time to establish the identity of an individual increases in proportion to the number of enrollees. One way to reduce the response time is to retrieve a smaller set of candidate identity templates from the database for explicit comparison. In this paper we propose a coarseto-fine hierarchical approach to retrieve a smaller set of candidate identities called as candidate set to reduce the response time. The proposed approach is tested on the database collected at our institute.Proposed approach is of significance since hand geometry and palm print features can be extracted from the palm region of the hand. Also performance of identification system is enhanced by reducing the response time without compromising the identification accuracy.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Multiple features based fingerprint identification systemeSAT Journals
Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
This paper presents an optimized palm vein authentication algorithm which will match the similar type of vascular pattern from the database given i.e. CASIA-Palmprint V1 dataset. . The palm vein authentication technology offers a high level of accuracy. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. If we compare with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. Also, we have also outlined opinions about the utility of Biometric authentication systems. We have processed the raw image from the dataset before implementing authentication algorithm. After getting the suitable image after pre- processing, we have used local binary pattern (LBP) for feature extraction purpose & then using a machine learning algorithm, with support vector machine (SVM), we tried to match the vascular vein pattern for authentication. Result of the matching algorithm is not only optimized as per the proposed approach but also quite efficient.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Verification or Authentication systems use a single biometric sensor which having higher error rate due to single evidence of identity (voice can be change due to cold, face can be changed due facial hairs, cosmetics, fingerprint can be change due to scar etc.). To enhance the performance of single biometric systems in these situations may not be effective because of these problems. Multi-biometric systems overcome some of these limitations by providing multiple proofs of any identity. This paper presents an effective multimodal biometric system which can be used to reduce the above mentioned drawbacks of unimodal systems.
BIOMETRIC BASED AUTHENTICATION SYSTEM TECHNOLOGY
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Ingerprint based student attendance system with sms alert to parentseSAT Journals
Abstract
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among two fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records.
Keywords – GSM, LCD
This paper discusses the implementation issues of installing a commercially available hand geometry system in the current infrastructure of Purdue University's Recreational Sports Center. In addition to a performance analysis of the system, a pre- and post- data collection survey was distributed to the 129 test subjects gathering information on perceptions of biometrics, in particular hand geometry, as well as participants' thoughts and feelings during their interaction with the hand geometry device. The results of the survey suggest that participants were accepting of hand geometry. Additionally, analyses of the participants' survey responses revealed that 93% liked using hand geometry, 98% thought it was easy to use, and 87% preferred it to the existing card-based system, while nobody thought the device invaded their personal privacy. System performance achieved a 3-try match rate of 99.02% (FRR 0.98%) when "gaming"/potential impostor attempts were removed from analysis. The failure to enroll rate was zero. Statistical analyses exposed a significant difference in the scores of attempts made by users with prior hand geometry usage, and subjects that could not straighten out their hand on the device. However, there were no statistical difference in the effects of rings/no rings, improper hand placements/proper hand placements, or gender on hand geometry score.
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
This paper proposes a Bio metric identification system for person identification using two bio metric traits
hand geometry and palm print. The hand image captured from digital camera is preprocessed to identify
key points on palm region of hand. Identified key points are used to find hand geometry feature and palm
print Region of interest (ROI). The discriminative palm print features are extracted by applying local
binary descriptor on palm print ROI. In a bio metric identification system the identity corresponding to the
input image (probe) is determined by comparing probe template with the templates of all identities enrolled
in biometric system (gallery). Response time to establish the identity of an individual increases in proportion to the number of enrollees. One way to reduce the response time is to retrieve a smaller set of candidate identity templates from the database for explicit comparison. In this paper we propose a coarseto-fine hierarchical approach to retrieve a smaller set of candidate identities called as candidate set to reduce the response time. The proposed approach is tested on the database collected at our institute.Proposed approach is of significance since hand geometry and palm print features can be extracted from the palm region of the hand. Also performance of identification system is enhanced by reducing the response time without compromising the identification accuracy.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Multiple features based fingerprint identification systemeSAT Journals
Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
This paper presents an optimized palm vein authentication algorithm which will match the similar type of vascular pattern from the database given i.e. CASIA-Palmprint V1 dataset. . The palm vein authentication technology offers a high level of accuracy. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. If we compare with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. Also, we have also outlined opinions about the utility of Biometric authentication systems. We have processed the raw image from the dataset before implementing authentication algorithm. After getting the suitable image after pre- processing, we have used local binary pattern (LBP) for feature extraction purpose & then using a machine learning algorithm, with support vector machine (SVM), we tried to match the vascular vein pattern for authentication. Result of the matching algorithm is not only optimized as per the proposed approach but also quite efficient.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Verification or Authentication systems use a single biometric sensor which having higher error rate due to single evidence of identity (voice can be change due to cold, face can be changed due facial hairs, cosmetics, fingerprint can be change due to scar etc.). To enhance the performance of single biometric systems in these situations may not be effective because of these problems. Multi-biometric systems overcome some of these limitations by providing multiple proofs of any identity. This paper presents an effective multimodal biometric system which can be used to reduce the above mentioned drawbacks of unimodal systems.
BIOMETRIC BASED AUTHENTICATION SYSTEM TECHNOLOGY
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Ingerprint based student attendance system with sms alert to parentseSAT Journals
Abstract
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among two fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records.
Keywords – GSM, LCD
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
Biometric identification systems, which use physical features to check a person's identity, ensure much higher security than password and number systems. Biometric features such as the face or a fingerprint can be stored on a microchip in a credit card, for example. A single modal biometric identification system fails to extract enough features for identification. Another disadvantage of using only one feature is not always readable. In this article, a smart multimodal biometric verification model for identifying and verifying a person's identity is recommended based on artificial intelligence methods. The proposed model is identified the iris and finger vein unique patterns each individual to overcome many challenges such as identity fraud, poor image quality, noise, and instability of the surrounding environment. Several experiments were performed on a dataset containing 50 people by using many matching methods. The results of the proposed model were provided a higher accuracy of 98%, with FAR and FRR of 0.0015% and 0.025%, respectively.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A review on fake biometric detection system for various applicationseSAT Journals
Abstract Now a days Security is a major concern for Scenario. So many securities are available but it should be reliable. A biometric system is a computer system which is related to the human characteristic. It is mainly used in identification and access control on their behavioral and physiological category. For example signature, voice, retina, key stroke, face, iris and fingerprint etc. This paper introduces a software base multi attack protection method which is based on various biometric modalities such as iris, face, signature and hand palm image.. This Hand palm technique is used for physical access. The real and fake images are identified by using image quality assessment (IQA) technique. Fake identities always have some different feature than original such as sharpness, different color, information quality etc. In this paper, liveness detection method is used. Which provide a very good performance and low degree of complexity. Also quality of Image is using two methods Full- Reference (FR) and No-Reference (NR). This image quality assessment (IQA) method is suitable for real time application which has been used for very low complexity. Keyword: Statistical Feature Extraction Biometric, Attack, Image Quality Assessment, Full-reference IQA, NO-Reference IQA,.
Abstract
The advancement in new technologies has significantly resulted more perfection in authentication issues. In ATM machine, access
permission is usually taking personal identification numbers (PIN) for authentication. Through this paper, this old method is
being exhausted by introducing a combination of embedded 3 layered bio-metric molding to setup an ATM simulator. Finger print
scanner, retina scanner followed by the onetime password (OTP) will help the user for smart and secured tractions. It will
reduced the duplication and makes the ATM machine more secured compare to current version.
Keywords: ATM, Biometric Security, OTP, Duplication Free, Retina Scanner.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to A new multimodel approach for human authentication sclera vein and finger vein recognition (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
A new multimodel approach for human authentication sclera vein and finger vein recognition
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 93
A NEW MULTIMODEL APPROACH FOR HUMAN
AUTHENTICATION: SCLERA VEIN AND FINGER VEIN
RECOGNITION
G.Radha1
, C.Saranya2
, B.Suganyadevi3
1
M.E Scholar, Department of CSE, Ranganathan Engineering College, Coimbatore, India
2
M.E Scholar, Department of CSE, Ranganathan Engineering College, Coimbatore, India
3
Assistant Professor, Department of CSE, Ranganathan Engineering College, Coimbatore, India
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has
blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature.
A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for
personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is
distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more
security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves,
low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of
the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated
either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used
repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According
to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures
higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage
and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature
Extraction, Finger Vein Recognition, Multimodel Biometrics.
--------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
User authentication is extremely important for computer and
network system security. Currently, knowledge-based
methods (e.g., passwords) and token based methods (e.g.,
smart cards) are the most popular approaches [1]. However,
these methods have a number of security flaws. For
example, passwords can be easily shared, stolen, and
forgotten [2], [3].Similarly, smart cards can be shared,
stolen, duplicated, or lost. To circumvent these issues, a
number of login authentication methods, including textual,
graphical passwords [4] and biometric authentication [5],
have been utilized. All of the above login methods share a
common problem, namely, they authenticate a user only at
the initial log-in session and do not reauthenticate a user
until the user logs out. Anyone can access the system
resources if the initial user does not properly log out or the
user leaves the workstation unattended to take a short break
without logging out.
To resolve this problem, the system must continuously
monitor and authenticate the user after the initial login
session. In order to achieve this objective, we need to
develop robust, reliable, and user-friendly methods for
continuous user authentication. It is desirable that the
resulting system has good usability by authenticating a user
without his active cooperation. Continuous Authentication is
essential in online examinations where the user has to be
continuously verified during the entire session. It can be
used in many real time applications, when accessing a secure
file or during the online banking transactions where there is
need of highly secure continuous verification of the user. A
number of biometric characteristics exist and are used in
various applications. Each biometric has its own strengths
and weaknesses, and the choice depends on the application.
Some of the commonly used hard biometrics are Face, Hand
geometry, Fingerprint, Iris. Soft biometrics include
Keystroke, Voice, Colour of the clothing, Facial colour etc
[2,4].
A single biometric trait (unimodal technique) is not
sufficient to authenticate a user continuously because the
system sometimes cannot observe the biometric information.
To address the limitations of single biometrics, using
multimodal biometrics is a good solution. It is the
combination of two or more biometric traits to raise systems
security and reliability. Multimodal has several advantages
over unimodal. Combining the results obtained by different
biometric traits by an effective fusion scheme can
significantly improve the overall accuracy of the biometric
system. Multimodal system increases the number of
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 94
individuals that can enroll. It provides resistance against
spoofing. The proposed work includes Sclera and
Fingerprint as their Multimodal biometric traits for
continuous authentication of the user. The blood vessel
structure of the sclera is unique to each person, and it can be
obtained using Y-shape descriptor.
The rest of the paper is organized as follows: related work is
discussed in Section 2. The proposed system is explained in
Section 3. The experimental result and discussion is
explained in Section 4. In section 5, the conclusion and
future work is described.
2. RELATED WORK
Some research studies have been reported on continuous
authentication. Many of them use multimodal biometrics,
but none of them can identify the user in the absence of
biometric observation. Zhi Zhou, Eliza Yingzi Du, and N.
Luke Thomas [6] proposed sclera recognition method which
can achieve comparable accuracy (EER = 1.34% and 3.83%)
with that of the two iris recognition methods using visible-
light acquired images (EER = 2.38% and 3.72%). In
particular, note that the iris patterns in dark eyes are hard to
extract under visible light illumination. Therefore, these
results show that sclera recognition could have some
advantage over iris recognition in the visible wavelengths. F.
Pernus, S. Kovacic, and L. Gyergyek defined the Fingerprint
is one of the most important biometric technology as it is
more distinct, persistence and ease of acquisition.
Fingerprint recognition is a process of determining whether
two sets of fingerprint ridge detail are from the same person
[7]. There are multiple approaches that are used in many
different ways for fingerprint recognition which are
minutiae, correlation, ridge pattern. These types of
approaches can be broadly categorized as minutiae based or
texture based recognition [8]. Minutiae are the most popular
approach that is used for fingerprint representation. It is
based on local landmarks. The minutiae-based systems
locate the points firstly. These points are called minutiae
points which represent the fingerprint ridges either terminate
or bifurcate in the fingerprint image, and then these minutiae
points are matched in a given fingerprint and the stored
template.[9] Minutiae points perform fairly high accurate
fingerprint matching. Sim and Zhang [10, 11] proposed a
continuous authentication technique using face and
fingerprint biometrics. They used a mouse with a built-in
fingerprint sensor, which made fingerprint authentication a
passive method for authentication. Sim and Zhang’s
technique had the same limitations as [12]; when no
biometric observations are available, the authentication
certainty must go down rapidly with time in order to protect
the security, irrespective of whether the user is in front of the
console or not. On comparing, the proposed method uses the
same fingerprint biometric mouse for verification since
sclera is more accurate biometric than face, it is used as
initial login. Similar to Sim and Zhang [10, 11], Azzini and
Marrara [13,14] also proposed a continuous authentication
technique using face and fingerprint biometrics. Their
system checked the identity of the user only on the basis of
face recognition. If the authentication certainty of face
recognition falls below a threshold, then a new fingerprint
acquisition is required. Again, the authentication certainty in
this approach must go down rapidly with time in order to
ensure the security, regardless of whether the user is in front
of the console or not. Kang and Ju [15] proposed a
continuous authentication technique using face and
behavioural biometrics. They used face trajectory and its
pose as behavioural features. Because behavioural
biometrics was used only for assisting face and the features
are not consistent throughout the session, and also it is soft
biometric so less reliable when compared to proposed
method where we have used hard biometrics. Finally, only
limited works were carried out which paves way for the
researchers to invent new methods to reduce the error rates
and to improve the accuracy and speed of the systems.
3. PROPOSED METHODOLOGY
The design of a multimodal biometric system is strongly
dependent on the application scenario. A number of
multimodal biometric systems have been proposed but they
are differ from one another in terms of their architecture, the
number and choice of biometric modalities, the level at
which the evidence is accumulated, and the methods used
for the integration or fusion of information. The proposed
system adopts multiple biometric traits of an individual, to
establish the identity. From the Fig.1 the proposed system
architecture shows initially in enrollment, input data eye
image and finger vein image have to register. Then the eye
image and the finger image are segmented to obtain the
enhanced vein patterns. Then feature extraction takes place
to drive the vein features of sclera and finger vein and stored
into database with respect to account number. Required
proof details are registered with personal details of the user.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 95
Fig.1. System Architecture
3.1 Finger Vein Recognition
Finger vein biometric system can verify a person’s identity
by recognizing the pattern of blood veins in the Finger.
Finger vein authentication uses the vascular patterns of an
individual’s Finger as personal identification data. Like
fingerprints, the pattern of blood veins in the Finger is
unique to every individual, even twins have different
patterns and apart from size, this pattern will not vary over
the course of a person’s lifetime. The Finger is an ideal part
of the body for this technology; it normally does not have
hair which can be an obstacle for photographing the blood
vessel pattern, and it is less susceptible to a change in skin
color, unlike a finger or the back of a hand.
3.2 Line Tracking Algorithm
The method is based on line tracking, which starts at various
positions. Local dark lines are identified, and line tracking is
executed by moving along the lines, pixel by pixel. When a
dark line is not detectable, a new tracking operation starts at
another position. All the dark lines in the image can be
tracked by repeatedly executing such local line tracking
operations. Finally, the loci of the lines overlap and the
pattern of finger veins is obtained statistically. As the parts
of the dark lines are tracked again and again in the repeated
operations, they are increasingly emphasized. Although
noise may also be tracked, noise is emphasized to a smaller
degree than the dark lines. This makes line extraction robust.
3.3 Iris Recognition
The iris is the coloured ring around the pupil of every human
being and like a snowflake, no two are alike. Each is unique
in its own way, exhibiting a distinctive pattern. The iris
remains stable over time as long as there are no injuries and
a single enrolment scan can last a lifetime. Even blind
people can use this scan technology since iris recognition
technology is iris pattern dependent not sight dependent.
Today’s commercial iris cameras use infrared light to
illuminate the iris without causing harm or discomfort to the
subject. Localization of the iris is an important step in iris
recognition because, if done improperly, resultant noise (i.e.:
eyelashes, reflections, pupils and eyelids) in the image may
lead to poor performance.
3.4 Sclera Recognition
The sclera is the part of the eye commonly known as the
"white". It is the outer and protective covering of the eye. It
is made up of four layers of tissue i.e. the episclera, stroma,
laminafusca and endothelia. The blood vessel structure of
the sclera is unique to each person, and it can be remotely
obtained non intrusively in the visible wavelengths. The
structure of blood vessels is visible and stable over time in
sclera. With increasing age collation and elastic fibers
deteriorates, sclera dehydration occurs and calcium and lipid
salts accumulate but the blood vessels do not deteriorates.
Therefore, it is well suited for human identification. Sclera
recognition is a challenging research problem because
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 96
images of sclera vessel patterns are often defocused and/or
saturated and, most importantly, the vessel structure in the
sclera is multilayered and has complex nonlinear
deformations.
3.5 Sclera Vein Segmentation
Segmentation is the one of the steps in image processing; it
divides an image into multiple parts so that we can extract
more accurate image attributes. In this project the input eye
image have to segment for getting the sclera vein pattern for
authentication.
3.6 Estimation of Sclera Area
First the pre-processing step includes task to convert the
input color image to gray scale image for easy computation.
Then there are two classes in an input eye image, foreground
(object) and background, which can be separated into two
classes by intensity. The hue of the sclera area should have
low hue (about bottom 1/3), low saturation (bottom 2/5), and
high intensity (top 2/3). Therefore, the following heuristic is
developed:
With the thresholds calculated using:
and
Here, is the normalized histogram of the hue image,
is the normalized histogram of the saturation image,
is the normalized histogram of the intensity image,
and result(x, y) is the binary sclera map. The thresholds ,
and are 1/3, 2/5, and 1/3 respectively. This way, we
eliminate non-sclera areas and detect the sclera area in Fig.2.
Fig.2. Weighted Image
3.7 Sclera Vessel Pattern Enhancement
As a result, the sclera vascular patterns are often blurry
and/or have very low contrast. Because the vascular patterns
could have multiple orientations, in this paper, a bank of
directional Gabor filters is used for vascular pattern
enhancement.
Where ( , ) is the center frequency of the filter, s is the
variance of the Gaussian, and ϑ is the angle of the sinusoidal
modulation. Here, only the even filter was used for feature
extraction of the vessels, since the even filter is symmetric
and its response was determined to identify the locations of
vessels adequately. The image is first filtered with Gabor
filters with different and scales
where I(x, y) is the original intensity image, G(x, y, ϑ, s) is
the Gabor filter, and I(x, y, ϑ, s) is the Gabor-filtered image
at orientation θ and scale s. All the filtered images are fused
together to generate the vessel boosted image F(x, y);
Gabor filtered image
where B(x, y) is the binary vessel mask image, F(x, y) is the
vessel-boosted image, and p(x) is the normalized histogram
of the nonzero elements of F(x,y). The morphological
operations are applied to the binary maps to remove isolated
pixels, and small regions of contiguous pixels. Sclera Vein
Pattern is shown in Fig.3.
Fig.3. Sclera Vein Pattern
3.8 Sclera Vein Feature Extraction
Within the sclera, there can be several layers of veins. The
motion of these different layers can cause the blood vessels
of sclera show different patterns. But in the same layers,
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 97
blood vessels keep some of their forms. As present in Fig.4,
the set of vessel segments combine to create Y shape
branches often belonging to same sclera layer.
Fig.4. Y-Shape Vessel Branch in Sclera
When the numbers of branches is more than three, the
vessels branches may come from different sclera layers and
its pattern will deform with movement of eye. Y shape
branches are observed to be a stable feature and can be used
as sclera feature descriptor. To detect the Y shape branches
in the original template, we search for the nearest neighbors
set of every line segment in a regular distance, classified the
angles among these neighbors. If there were two types of
angle values in the line segment set, this set may be inferred
as a Y shape structure and the line segment angles would be
recorded as a new feature of the sclera. Even when the head
tilts, the eye moves, or the camera zooms occurs at the
image acquisition step, ϕ1, ϕ2, and ϕ3 are quite stable. To
tolerate errors from the pupil center calculation in the
segmentation step, we also recorded the center position (x,y)
of the Y shape branches as auxiliary parameters. So in our
rotation, shift and scale invariant feature vector is defined as:
Y(ϕ1, ϕ2, ϕ3, x, y). The Y-shape descriptor is generated with
reference to the iris center. Therefore, it is automatically
aligned to the iris centers. It is a rotational- and scale-
invariant descriptor.
3.9 Y-Shaped Descriptor
Within the sclera, there can be several layers of veins. The
motion of these different layers can cause the blood vessels
of sclera show different patterns. But in the same layers,
blood vessels keep some of their forms. The set of vessel
segments combine to create Y shape branches often
belonging to same sclera layer. When the numbers of
branches is more than three, the vessels branches may come
from different sclera layers and its pattern will deform with
movement of eye. Y shape branches are observed to be a
stable feature and can be used as sclera feature descriptor.
To detect the Y shape branches in the original template, we
search for the nearest neighbors set of every line segment in
a regular distance, classified the angles among these
neighbors. If there were two types of angle values in the line
segment set, this set may be inferred as a Y shape structure
and the line segment angles would be recorded as a new
feature of the sclera. The Y-shaped descriptor is very fast to
match because no registration was needed. The matching
result in this stage can help filter out image pairs with low
similarities.
3.10 Sclera Vein Matching
The feature vector for all images that are in the databases are
pre-computed and stored during enrollment stage. When
coming to verification stage and are the Y shape
descriptors of test template and target template
respectively. is the Euclidian distance of angle element
of descriptors vector defined. is the Euclidian distance
of two descriptor centers. and are the matched
descriptor pairs’ number and their centers distance
respectively. is a distance threshold and t is the
threshold to restrict the searching area. We set to 30 and
to 675 in our experiment. Here
And
To match two sclera templates, searched the areas nearby to
all the Y shape branches. Here, is a factor to fuse the
matching score which was set to 30 in our study. and
is the total numbers of feature vectors in template i and j
separately. The decision is regulated by the threshold t: if the
sclera’s matching score is lower than t, the sclera will be
discarded.
4. EXPERIMENTAL RESULT AND DISCUSSION
The metrics used for evaluation are False Acceptance rate (FAR) and False Rejection Rate (FRR).
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 98
The FRR is the frequency that an authorized person is
rejected access. The evaluation of sclera recognition was
carried out with 100 images taken from UBIRIS database
were grouped into ten users and the results are tabulated for
FAR and FRR.
Table I and Fig.5 shows the resulted (FRR) as obtained for
the proposed sclera vein and existing iris technique. From
the result, it can be observed that the proposed technique
results in lesser False Rejection Rate when compared to the
existing techniques. The FAR is the frequency that a non-
authorized person is accepted as authorized. The result is
shown in Fig.6.
Table 1 FRR and FAR results
Number
of
Users
FRR (%) FAR (%)
Existing
Fingerprint
+ Iris
Proposed
Finger
vein +
Sclera
Vein
Existing
Fingerprint
+ Iris
Proposed
Finger
vein +
Sclera
Vein
1-20 87.7 84.3 0.36 0.12
21-40 88.1 83.9 0.33 0.17
41-60 88.9 84.8 0.31 0.12
61-80 89.6 85.4 0.39 0.14
81-100 88.8 84.5 0.36 0.13
Fig.5 FRR comparison result
Fig.6 FAR comparison result
81
82
83
84
85
86
87
88
89
90
91
20 40 60 80 100
FRR(%)
Number of Users
ExistingFingerprint + Iris Proposed Finger vein + Sclera Vein
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
20 40 60 80 100
FAR(%)
Number of Users
ExistingFingerprint + Iris Proposed Finger vein + Sclera Vein
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 99
5. CONCLUSION AND FUTURE WORK
In this paper we have presented a secured multimodal
biometric system by fusing eye vein and Finger vein images.
In this system of fusion, we have considered both of the eye
vein and finger vein features for verification. In proposed
work the user can be authenticated through sclera vein
recognition by using a rotation and scale-invariant Y-shape
descriptor based feature extraction method efficiently
eliminate most unlikely matches. The proposed model has
improved the security of the system as verified using FAR
and FRR curves. Automatic authentication is possible with
state of art technologies like sclera recognition on the move
and finger vein scanner on the steering of car. As future
improvements the cryptographic key of multimodal
biometrics like sclera and iris can be developed and issued
for enhancing security. Thus the performance and accuracy
of human authentication was increased by the proposed
sclera vein biometric recognition.
REFERENCES
[1] Yong Lin, Eliza Yingzi Du, Zhi Zhou, and N. Luke
Thomas, “An Efficient Parallel Approach for Sclera
Vein Recognition”, IEEE Transactions on
Information Forensics and Security, vol. 9, no. 2,
February 2014
[2] A. K. Jain, A. Ross, and S. Prabhakar, ―An
introduction to biometric recognition, IEEE Trans.
Circuits Syst. Video Technol., vol. 14, no. 1,pp. 4–20,
Jan. 2004.
[3] A. K. Jain, A. Ross, and S. Pankanti, ―Biometrics: A
tool for information security, IEEE Trans. Inf.
Forensics Security, vol. 1, no. 2, pp.125–143, Jun.
2006.
[4] X. Suo, Y. Zhu, and G. Owen, ―Graphical
passwords: A survey,in Proc. Annu. Computer
Security Applications, 2005, pp. 463– 472
[5] A. K. Jain, P. Flynn, and A. A. Ross, Eds., Handbook
of Biometrics. New York: Springer, 2007.
[6] F. Pernus, S. Kovacic, and L. Gyergyek, Minutiae-
based fingerprint recognition, Proceedings of the
Fifth international Conference on Pattern
Recognition, 1380-1382, 1980.
[7] Zhi Zhou, Student Member, IEEE, Eliza Yingzi Du,
Senior Member, IEEE, N. Luke Thomas, and Edward
J. Delp, Fellow, IEEE, A New Human Identification
Method:Sclera Recognition, IEEE transactions on
systems, man, and cybernetics— part a: systems and
humans, vol. 42, no. 3, may 2012
[8] A. K. Jain, S. Prabhakar, and S. Chen, Combining
multiple Matchers for a High SecurityFingerprint
Verification System, Pattern Recognition Letters,
20(11-13), 1371-1379,1999.
[9] A.K.Jain, L. Hong, and R. Bolle, On-line fingerprint
verification, IEEE Transactions on Pattern Analysis
and Machine Intelligence, vol. 19, 302-314,
1997.Fingerprint Recognition Page 41 of 123
[10] S. Zhang, R. Janakiraman, T. Sim and S. Kumar,
―Continuous Verification Using Multimodal
Biometrics, Proc.Second Int’l Conf. Biometrics, pp.
562-570, 2006.
[11] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar,
―Continuous verification using multimodal
biometrics, IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 29, no. 4, pp. 687–700, Apr. 2007.
[12] A. Altinok and M. Turk, ―Temporal Integration for
Continuous Multimodal Biometrics,Proc. Workshop
on Multimodal User Authentication, pp. 131-137,
2003.
[13] Antonia Azzini, Stefania Marrara, Roberto Sassi and
Fabio Scotti, ―A fuzzy approach to multimodal
biometric continuous authentication, Fuzzy Optimal
Decision Making, vol. 7, pp. 243-256, 2008.
[14] Antonia Azzini and Stefania Marrara, ―Impostor
Users Discovery Using a Multimodal Biometric
Continuous Authentication Fuzzy System, Lecture
Notes In Artificial Intelligence, vol. 5178,
Proceedings of the 12th International Conference on
Knowledge Based Intelligent Information and
Engineering Systems, Part II, Section II,pp. 371-378,
2008.
[15] Hang-Bong Kang and Myung-Ho Ju, ―Multi-modal
Feature Integration for Secure Authentication,
International Conference on Intelligent Computing,
pp.1191-1200, 2006.