SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 93
A NEW MULTIMODEL APPROACH FOR HUMAN
AUTHENTICATION: SCLERA VEIN AND FINGER VEIN
RECOGNITION
G.Radha1
, C.Saranya2
, B.Suganyadevi3
1
M.E Scholar, Department of CSE, Ranganathan Engineering College, Coimbatore, India
2
M.E Scholar, Department of CSE, Ranganathan Engineering College, Coimbatore, India
3
Assistant Professor, Department of CSE, Ranganathan Engineering College, Coimbatore, India
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has
blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature.
A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for
personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is
distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more
security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves,
low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of
the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated
either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used
repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According
to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures
higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage
and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature
Extraction, Finger Vein Recognition, Multimodel Biometrics.
--------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
User authentication is extremely important for computer and
network system security. Currently, knowledge-based
methods (e.g., passwords) and token based methods (e.g.,
smart cards) are the most popular approaches [1]. However,
these methods have a number of security flaws. For
example, passwords can be easily shared, stolen, and
forgotten [2], [3].Similarly, smart cards can be shared,
stolen, duplicated, or lost. To circumvent these issues, a
number of login authentication methods, including textual,
graphical passwords [4] and biometric authentication [5],
have been utilized. All of the above login methods share a
common problem, namely, they authenticate a user only at
the initial log-in session and do not reauthenticate a user
until the user logs out. Anyone can access the system
resources if the initial user does not properly log out or the
user leaves the workstation unattended to take a short break
without logging out.
To resolve this problem, the system must continuously
monitor and authenticate the user after the initial login
session. In order to achieve this objective, we need to
develop robust, reliable, and user-friendly methods for
continuous user authentication. It is desirable that the
resulting system has good usability by authenticating a user
without his active cooperation. Continuous Authentication is
essential in online examinations where the user has to be
continuously verified during the entire session. It can be
used in many real time applications, when accessing a secure
file or during the online banking transactions where there is
need of highly secure continuous verification of the user. A
number of biometric characteristics exist and are used in
various applications. Each biometric has its own strengths
and weaknesses, and the choice depends on the application.
Some of the commonly used hard biometrics are Face, Hand
geometry, Fingerprint, Iris. Soft biometrics include
Keystroke, Voice, Colour of the clothing, Facial colour etc
[2,4].
A single biometric trait (unimodal technique) is not
sufficient to authenticate a user continuously because the
system sometimes cannot observe the biometric information.
To address the limitations of single biometrics, using
multimodal biometrics is a good solution. It is the
combination of two or more biometric traits to raise systems
security and reliability. Multimodal has several advantages
over unimodal. Combining the results obtained by different
biometric traits by an effective fusion scheme can
significantly improve the overall accuracy of the biometric
system. Multimodal system increases the number of
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 94
individuals that can enroll. It provides resistance against
spoofing. The proposed work includes Sclera and
Fingerprint as their Multimodal biometric traits for
continuous authentication of the user. The blood vessel
structure of the sclera is unique to each person, and it can be
obtained using Y-shape descriptor.
The rest of the paper is organized as follows: related work is
discussed in Section 2. The proposed system is explained in
Section 3. The experimental result and discussion is
explained in Section 4. In section 5, the conclusion and
future work is described.
2. RELATED WORK
Some research studies have been reported on continuous
authentication. Many of them use multimodal biometrics,
but none of them can identify the user in the absence of
biometric observation. Zhi Zhou, Eliza Yingzi Du, and N.
Luke Thomas [6] proposed sclera recognition method which
can achieve comparable accuracy (EER = 1.34% and 3.83%)
with that of the two iris recognition methods using visible-
light acquired images (EER = 2.38% and 3.72%). In
particular, note that the iris patterns in dark eyes are hard to
extract under visible light illumination. Therefore, these
results show that sclera recognition could have some
advantage over iris recognition in the visible wavelengths. F.
Pernus, S. Kovacic, and L. Gyergyek defined the Fingerprint
is one of the most important biometric technology as it is
more distinct, persistence and ease of acquisition.
Fingerprint recognition is a process of determining whether
two sets of fingerprint ridge detail are from the same person
[7]. There are multiple approaches that are used in many
different ways for fingerprint recognition which are
minutiae, correlation, ridge pattern. These types of
approaches can be broadly categorized as minutiae based or
texture based recognition [8]. Minutiae are the most popular
approach that is used for fingerprint representation. It is
based on local landmarks. The minutiae-based systems
locate the points firstly. These points are called minutiae
points which represent the fingerprint ridges either terminate
or bifurcate in the fingerprint image, and then these minutiae
points are matched in a given fingerprint and the stored
template.[9] Minutiae points perform fairly high accurate
fingerprint matching. Sim and Zhang [10, 11] proposed a
continuous authentication technique using face and
fingerprint biometrics. They used a mouse with a built-in
fingerprint sensor, which made fingerprint authentication a
passive method for authentication. Sim and Zhang’s
technique had the same limitations as [12]; when no
biometric observations are available, the authentication
certainty must go down rapidly with time in order to protect
the security, irrespective of whether the user is in front of the
console or not. On comparing, the proposed method uses the
same fingerprint biometric mouse for verification since
sclera is more accurate biometric than face, it is used as
initial login. Similar to Sim and Zhang [10, 11], Azzini and
Marrara [13,14] also proposed a continuous authentication
technique using face and fingerprint biometrics. Their
system checked the identity of the user only on the basis of
face recognition. If the authentication certainty of face
recognition falls below a threshold, then a new fingerprint
acquisition is required. Again, the authentication certainty in
this approach must go down rapidly with time in order to
ensure the security, regardless of whether the user is in front
of the console or not. Kang and Ju [15] proposed a
continuous authentication technique using face and
behavioural biometrics. They used face trajectory and its
pose as behavioural features. Because behavioural
biometrics was used only for assisting face and the features
are not consistent throughout the session, and also it is soft
biometric so less reliable when compared to proposed
method where we have used hard biometrics. Finally, only
limited works were carried out which paves way for the
researchers to invent new methods to reduce the error rates
and to improve the accuracy and speed of the systems.
3. PROPOSED METHODOLOGY
The design of a multimodal biometric system is strongly
dependent on the application scenario. A number of
multimodal biometric systems have been proposed but they
are differ from one another in terms of their architecture, the
number and choice of biometric modalities, the level at
which the evidence is accumulated, and the methods used
for the integration or fusion of information. The proposed
system adopts multiple biometric traits of an individual, to
establish the identity. From the Fig.1 the proposed system
architecture shows initially in enrollment, input data eye
image and finger vein image have to register. Then the eye
image and the finger image are segmented to obtain the
enhanced vein patterns. Then feature extraction takes place
to drive the vein features of sclera and finger vein and stored
into database with respect to account number. Required
proof details are registered with personal details of the user.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 95
Fig.1. System Architecture
3.1 Finger Vein Recognition
Finger vein biometric system can verify a person’s identity
by recognizing the pattern of blood veins in the Finger.
Finger vein authentication uses the vascular patterns of an
individual’s Finger as personal identification data. Like
fingerprints, the pattern of blood veins in the Finger is
unique to every individual, even twins have different
patterns and apart from size, this pattern will not vary over
the course of a person’s lifetime. The Finger is an ideal part
of the body for this technology; it normally does not have
hair which can be an obstacle for photographing the blood
vessel pattern, and it is less susceptible to a change in skin
color, unlike a finger or the back of a hand.
3.2 Line Tracking Algorithm
The method is based on line tracking, which starts at various
positions. Local dark lines are identified, and line tracking is
executed by moving along the lines, pixel by pixel. When a
dark line is not detectable, a new tracking operation starts at
another position. All the dark lines in the image can be
tracked by repeatedly executing such local line tracking
operations. Finally, the loci of the lines overlap and the
pattern of finger veins is obtained statistically. As the parts
of the dark lines are tracked again and again in the repeated
operations, they are increasingly emphasized. Although
noise may also be tracked, noise is emphasized to a smaller
degree than the dark lines. This makes line extraction robust.
3.3 Iris Recognition
The iris is the coloured ring around the pupil of every human
being and like a snowflake, no two are alike. Each is unique
in its own way, exhibiting a distinctive pattern. The iris
remains stable over time as long as there are no injuries and
a single enrolment scan can last a lifetime. Even blind
people can use this scan technology since iris recognition
technology is iris pattern dependent not sight dependent.
Today’s commercial iris cameras use infrared light to
illuminate the iris without causing harm or discomfort to the
subject. Localization of the iris is an important step in iris
recognition because, if done improperly, resultant noise (i.e.:
eyelashes, reflections, pupils and eyelids) in the image may
lead to poor performance.
3.4 Sclera Recognition
The sclera is the part of the eye commonly known as the
"white". It is the outer and protective covering of the eye. It
is made up of four layers of tissue i.e. the episclera, stroma,
laminafusca and endothelia. The blood vessel structure of
the sclera is unique to each person, and it can be remotely
obtained non intrusively in the visible wavelengths. The
structure of blood vessels is visible and stable over time in
sclera. With increasing age collation and elastic fibers
deteriorates, sclera dehydration occurs and calcium and lipid
salts accumulate but the blood vessels do not deteriorates.
Therefore, it is well suited for human identification. Sclera
recognition is a challenging research problem because
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 96
images of sclera vessel patterns are often defocused and/or
saturated and, most importantly, the vessel structure in the
sclera is multilayered and has complex nonlinear
deformations.
3.5 Sclera Vein Segmentation
Segmentation is the one of the steps in image processing; it
divides an image into multiple parts so that we can extract
more accurate image attributes. In this project the input eye
image have to segment for getting the sclera vein pattern for
authentication.
3.6 Estimation of Sclera Area
First the pre-processing step includes task to convert the
input color image to gray scale image for easy computation.
Then there are two classes in an input eye image, foreground
(object) and background, which can be separated into two
classes by intensity. The hue of the sclera area should have
low hue (about bottom 1/3), low saturation (bottom 2/5), and
high intensity (top 2/3). Therefore, the following heuristic is
developed:
With the thresholds calculated using:
and
Here, is the normalized histogram of the hue image,
is the normalized histogram of the saturation image,
is the normalized histogram of the intensity image,
and result(x, y) is the binary sclera map. The thresholds ,
and are 1/3, 2/5, and 1/3 respectively. This way, we
eliminate non-sclera areas and detect the sclera area in Fig.2.
Fig.2. Weighted Image
3.7 Sclera Vessel Pattern Enhancement
As a result, the sclera vascular patterns are often blurry
and/or have very low contrast. Because the vascular patterns
could have multiple orientations, in this paper, a bank of
directional Gabor filters is used for vascular pattern
enhancement.
Where ( , ) is the center frequency of the filter, s is the
variance of the Gaussian, and ϑ is the angle of the sinusoidal
modulation. Here, only the even filter was used for feature
extraction of the vessels, since the even filter is symmetric
and its response was determined to identify the locations of
vessels adequately. The image is first filtered with Gabor
filters with different and scales
where I(x, y) is the original intensity image, G(x, y, ϑ, s) is
the Gabor filter, and I(x, y, ϑ, s) is the Gabor-filtered image
at orientation θ and scale s. All the filtered images are fused
together to generate the vessel boosted image F(x, y);
Gabor filtered image
where B(x, y) is the binary vessel mask image, F(x, y) is the
vessel-boosted image, and p(x) is the normalized histogram
of the nonzero elements of F(x,y). The morphological
operations are applied to the binary maps to remove isolated
pixels, and small regions of contiguous pixels. Sclera Vein
Pattern is shown in Fig.3.
Fig.3. Sclera Vein Pattern
3.8 Sclera Vein Feature Extraction
Within the sclera, there can be several layers of veins. The
motion of these different layers can cause the blood vessels
of sclera show different patterns. But in the same layers,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 97
blood vessels keep some of their forms. As present in Fig.4,
the set of vessel segments combine to create Y shape
branches often belonging to same sclera layer.
Fig.4. Y-Shape Vessel Branch in Sclera
When the numbers of branches is more than three, the
vessels branches may come from different sclera layers and
its pattern will deform with movement of eye. Y shape
branches are observed to be a stable feature and can be used
as sclera feature descriptor. To detect the Y shape branches
in the original template, we search for the nearest neighbors
set of every line segment in a regular distance, classified the
angles among these neighbors. If there were two types of
angle values in the line segment set, this set may be inferred
as a Y shape structure and the line segment angles would be
recorded as a new feature of the sclera. Even when the head
tilts, the eye moves, or the camera zooms occurs at the
image acquisition step, ϕ1, ϕ2, and ϕ3 are quite stable. To
tolerate errors from the pupil center calculation in the
segmentation step, we also recorded the center position (x,y)
of the Y shape branches as auxiliary parameters. So in our
rotation, shift and scale invariant feature vector is defined as:
Y(ϕ1, ϕ2, ϕ3, x, y). The Y-shape descriptor is generated with
reference to the iris center. Therefore, it is automatically
aligned to the iris centers. It is a rotational- and scale-
invariant descriptor.
3.9 Y-Shaped Descriptor
Within the sclera, there can be several layers of veins. The
motion of these different layers can cause the blood vessels
of sclera show different patterns. But in the same layers,
blood vessels keep some of their forms. The set of vessel
segments combine to create Y shape branches often
belonging to same sclera layer. When the numbers of
branches is more than three, the vessels branches may come
from different sclera layers and its pattern will deform with
movement of eye. Y shape branches are observed to be a
stable feature and can be used as sclera feature descriptor.
To detect the Y shape branches in the original template, we
search for the nearest neighbors set of every line segment in
a regular distance, classified the angles among these
neighbors. If there were two types of angle values in the line
segment set, this set may be inferred as a Y shape structure
and the line segment angles would be recorded as a new
feature of the sclera. The Y-shaped descriptor is very fast to
match because no registration was needed. The matching
result in this stage can help filter out image pairs with low
similarities.
3.10 Sclera Vein Matching
The feature vector for all images that are in the databases are
pre-computed and stored during enrollment stage. When
coming to verification stage and are the Y shape
descriptors of test template and target template
respectively. is the Euclidian distance of angle element
of descriptors vector defined. is the Euclidian distance
of two descriptor centers. and are the matched
descriptor pairs’ number and their centers distance
respectively. is a distance threshold and t is the
threshold to restrict the searching area. We set to 30 and
to 675 in our experiment. Here
And
To match two sclera templates, searched the areas nearby to
all the Y shape branches. Here, is a factor to fuse the
matching score which was set to 30 in our study. and
is the total numbers of feature vectors in template i and j
separately. The decision is regulated by the threshold t: if the
sclera’s matching score is lower than t, the sclera will be
discarded.
4. EXPERIMENTAL RESULT AND DISCUSSION
The metrics used for evaluation are False Acceptance rate (FAR) and False Rejection Rate (FRR).
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 98
The FRR is the frequency that an authorized person is
rejected access. The evaluation of sclera recognition was
carried out with 100 images taken from UBIRIS database
were grouped into ten users and the results are tabulated for
FAR and FRR.
Table I and Fig.5 shows the resulted (FRR) as obtained for
the proposed sclera vein and existing iris technique. From
the result, it can be observed that the proposed technique
results in lesser False Rejection Rate when compared to the
existing techniques. The FAR is the frequency that a non-
authorized person is accepted as authorized. The result is
shown in Fig.6.
Table 1 FRR and FAR results
Number
of
Users
FRR (%) FAR (%)
Existing
Fingerprint
+ Iris
Proposed
Finger
vein +
Sclera
Vein
Existing
Fingerprint
+ Iris
Proposed
Finger
vein +
Sclera
Vein
1-20 87.7 84.3 0.36 0.12
21-40 88.1 83.9 0.33 0.17
41-60 88.9 84.8 0.31 0.12
61-80 89.6 85.4 0.39 0.14
81-100 88.8 84.5 0.36 0.13
Fig.5 FRR comparison result
Fig.6 FAR comparison result
81
82
83
84
85
86
87
88
89
90
91
20 40 60 80 100
FRR(%)
Number of Users
ExistingFingerprint + Iris Proposed Finger vein + Sclera Vein
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
20 40 60 80 100
FAR(%)
Number of Users
ExistingFingerprint + Iris Proposed Finger vein + Sclera Vein
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 99
5. CONCLUSION AND FUTURE WORK
In this paper we have presented a secured multimodal
biometric system by fusing eye vein and Finger vein images.
In this system of fusion, we have considered both of the eye
vein and finger vein features for verification. In proposed
work the user can be authenticated through sclera vein
recognition by using a rotation and scale-invariant Y-shape
descriptor based feature extraction method efficiently
eliminate most unlikely matches. The proposed model has
improved the security of the system as verified using FAR
and FRR curves. Automatic authentication is possible with
state of art technologies like sclera recognition on the move
and finger vein scanner on the steering of car. As future
improvements the cryptographic key of multimodal
biometrics like sclera and iris can be developed and issued
for enhancing security. Thus the performance and accuracy
of human authentication was increased by the proposed
sclera vein biometric recognition.
REFERENCES
[1] Yong Lin, Eliza Yingzi Du, Zhi Zhou, and N. Luke
Thomas, “An Efficient Parallel Approach for Sclera
Vein Recognition”, IEEE Transactions on
Information Forensics and Security, vol. 9, no. 2,
February 2014
[2] A. K. Jain, A. Ross, and S. Prabhakar, ―An
introduction to biometric recognition, IEEE Trans.
Circuits Syst. Video Technol., vol. 14, no. 1,pp. 4–20,
Jan. 2004.
[3] A. K. Jain, A. Ross, and S. Pankanti, ―Biometrics: A
tool for information security, IEEE Trans. Inf.
Forensics Security, vol. 1, no. 2, pp.125–143, Jun.
2006.
[4] X. Suo, Y. Zhu, and G. Owen, ―Graphical
passwords: A survey,in Proc. Annu. Computer
Security Applications, 2005, pp. 463– 472
[5] A. K. Jain, P. Flynn, and A. A. Ross, Eds., Handbook
of Biometrics. New York: Springer, 2007.
[6] F. Pernus, S. Kovacic, and L. Gyergyek, Minutiae-
based fingerprint recognition, Proceedings of the
Fifth international Conference on Pattern
Recognition, 1380-1382, 1980.
[7] Zhi Zhou, Student Member, IEEE, Eliza Yingzi Du,
Senior Member, IEEE, N. Luke Thomas, and Edward
J. Delp, Fellow, IEEE, A New Human Identification
Method:Sclera Recognition, IEEE transactions on
systems, man, and cybernetics— part a: systems and
humans, vol. 42, no. 3, may 2012
[8] A. K. Jain, S. Prabhakar, and S. Chen, Combining
multiple Matchers for a High SecurityFingerprint
Verification System, Pattern Recognition Letters,
20(11-13), 1371-1379,1999.
[9] A.K.Jain, L. Hong, and R. Bolle, On-line fingerprint
verification, IEEE Transactions on Pattern Analysis
and Machine Intelligence, vol. 19, 302-314,
1997.Fingerprint Recognition Page 41 of 123
[10] S. Zhang, R. Janakiraman, T. Sim and S. Kumar,
―Continuous Verification Using Multimodal
Biometrics, Proc.Second Int’l Conf. Biometrics, pp.
562-570, 2006.
[11] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar,
―Continuous verification using multimodal
biometrics, IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 29, no. 4, pp. 687–700, Apr. 2007.
[12] A. Altinok and M. Turk, ―Temporal Integration for
Continuous Multimodal Biometrics,Proc. Workshop
on Multimodal User Authentication, pp. 131-137,
2003.
[13] Antonia Azzini, Stefania Marrara, Roberto Sassi and
Fabio Scotti, ―A fuzzy approach to multimodal
biometric continuous authentication, Fuzzy Optimal
Decision Making, vol. 7, pp. 243-256, 2008.
[14] Antonia Azzini and Stefania Marrara, ―Impostor
Users Discovery Using a Multimodal Biometric
Continuous Authentication Fuzzy System, Lecture
Notes In Artificial Intelligence, vol. 5178,
Proceedings of the 12th International Conference on
Knowledge Based Intelligent Information and
Engineering Systems, Part II, Section II,pp. 371-378,
2008.
[15] Hang-Bong Kang and Myung-Ho Ju, ―Multi-modal
Feature Integration for Secure Authentication,
International Conference on Intelligent Computing,
pp.1191-1200, 2006.

More Related Content

What's hot

Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496IJRAT
 
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
International Center for Biometric Research
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
ijcsa
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2IAEME Publication
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
IRJET Journal
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognition
Rishabh shah
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
rahulmonikasharma
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Journal For Research
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
International Center for Biometric Research
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
Anooja Pillai
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
 

What's hot (16)

Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2A comparison of multiple wavelet algorithms for iris recognition 2
A comparison of multiple wavelet algorithms for iris recognition 2
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognition
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 

Similar to A new multimodel approach for human authentication sclera vein and finger vein recognition

An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
eSAT Publishing House
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
eSAT Publishing House
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
IJTET Journal
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
eSAT Publishing House
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
eSAT Journals
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
nooriasukmaningtyas
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
eSAT Journals
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
eSAT Journals
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
Bhavi Bhatia
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET Journal
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Kishor Singh
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
ijiert bestjournal
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
eSAT Publishing House
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 

Similar to A new multimodel approach for human authentication sclera vein and finger vein recognition (20)

An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security Enhancement
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 

Recently uploaded (20)

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 

A new multimodel approach for human authentication sclera vein and finger vein recognition

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 93 A NEW MULTIMODEL APPROACH FOR HUMAN AUTHENTICATION: SCLERA VEIN AND FINGER VEIN RECOGNITION G.Radha1 , C.Saranya2 , B.Suganyadevi3 1 M.E Scholar, Department of CSE, Ranganathan Engineering College, Coimbatore, India 2 M.E Scholar, Department of CSE, Ranganathan Engineering College, Coimbatore, India 3 Assistant Professor, Department of CSE, Ranganathan Engineering College, Coimbatore, India Abstract The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition. Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics. --------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION User authentication is extremely important for computer and network system security. Currently, knowledge-based methods (e.g., passwords) and token based methods (e.g., smart cards) are the most popular approaches [1]. However, these methods have a number of security flaws. For example, passwords can be easily shared, stolen, and forgotten [2], [3].Similarly, smart cards can be shared, stolen, duplicated, or lost. To circumvent these issues, a number of login authentication methods, including textual, graphical passwords [4] and biometric authentication [5], have been utilized. All of the above login methods share a common problem, namely, they authenticate a user only at the initial log-in session and do not reauthenticate a user until the user logs out. Anyone can access the system resources if the initial user does not properly log out or the user leaves the workstation unattended to take a short break without logging out. To resolve this problem, the system must continuously monitor and authenticate the user after the initial login session. In order to achieve this objective, we need to develop robust, reliable, and user-friendly methods for continuous user authentication. It is desirable that the resulting system has good usability by authenticating a user without his active cooperation. Continuous Authentication is essential in online examinations where the user has to be continuously verified during the entire session. It can be used in many real time applications, when accessing a secure file or during the online banking transactions where there is need of highly secure continuous verification of the user. A number of biometric characteristics exist and are used in various applications. Each biometric has its own strengths and weaknesses, and the choice depends on the application. Some of the commonly used hard biometrics are Face, Hand geometry, Fingerprint, Iris. Soft biometrics include Keystroke, Voice, Colour of the clothing, Facial colour etc [2,4]. A single biometric trait (unimodal technique) is not sufficient to authenticate a user continuously because the system sometimes cannot observe the biometric information. To address the limitations of single biometrics, using multimodal biometrics is a good solution. It is the combination of two or more biometric traits to raise systems security and reliability. Multimodal has several advantages over unimodal. Combining the results obtained by different biometric traits by an effective fusion scheme can significantly improve the overall accuracy of the biometric system. Multimodal system increases the number of
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 94 individuals that can enroll. It provides resistance against spoofing. The proposed work includes Sclera and Fingerprint as their Multimodal biometric traits for continuous authentication of the user. The blood vessel structure of the sclera is unique to each person, and it can be obtained using Y-shape descriptor. The rest of the paper is organized as follows: related work is discussed in Section 2. The proposed system is explained in Section 3. The experimental result and discussion is explained in Section 4. In section 5, the conclusion and future work is described. 2. RELATED WORK Some research studies have been reported on continuous authentication. Many of them use multimodal biometrics, but none of them can identify the user in the absence of biometric observation. Zhi Zhou, Eliza Yingzi Du, and N. Luke Thomas [6] proposed sclera recognition method which can achieve comparable accuracy (EER = 1.34% and 3.83%) with that of the two iris recognition methods using visible- light acquired images (EER = 2.38% and 3.72%). In particular, note that the iris patterns in dark eyes are hard to extract under visible light illumination. Therefore, these results show that sclera recognition could have some advantage over iris recognition in the visible wavelengths. F. Pernus, S. Kovacic, and L. Gyergyek defined the Fingerprint is one of the most important biometric technology as it is more distinct, persistence and ease of acquisition. Fingerprint recognition is a process of determining whether two sets of fingerprint ridge detail are from the same person [7]. There are multiple approaches that are used in many different ways for fingerprint recognition which are minutiae, correlation, ridge pattern. These types of approaches can be broadly categorized as minutiae based or texture based recognition [8]. Minutiae are the most popular approach that is used for fingerprint representation. It is based on local landmarks. The minutiae-based systems locate the points firstly. These points are called minutiae points which represent the fingerprint ridges either terminate or bifurcate in the fingerprint image, and then these minutiae points are matched in a given fingerprint and the stored template.[9] Minutiae points perform fairly high accurate fingerprint matching. Sim and Zhang [10, 11] proposed a continuous authentication technique using face and fingerprint biometrics. They used a mouse with a built-in fingerprint sensor, which made fingerprint authentication a passive method for authentication. Sim and Zhang’s technique had the same limitations as [12]; when no biometric observations are available, the authentication certainty must go down rapidly with time in order to protect the security, irrespective of whether the user is in front of the console or not. On comparing, the proposed method uses the same fingerprint biometric mouse for verification since sclera is more accurate biometric than face, it is used as initial login. Similar to Sim and Zhang [10, 11], Azzini and Marrara [13,14] also proposed a continuous authentication technique using face and fingerprint biometrics. Their system checked the identity of the user only on the basis of face recognition. If the authentication certainty of face recognition falls below a threshold, then a new fingerprint acquisition is required. Again, the authentication certainty in this approach must go down rapidly with time in order to ensure the security, regardless of whether the user is in front of the console or not. Kang and Ju [15] proposed a continuous authentication technique using face and behavioural biometrics. They used face trajectory and its pose as behavioural features. Because behavioural biometrics was used only for assisting face and the features are not consistent throughout the session, and also it is soft biometric so less reliable when compared to proposed method where we have used hard biometrics. Finally, only limited works were carried out which paves way for the researchers to invent new methods to reduce the error rates and to improve the accuracy and speed of the systems. 3. PROPOSED METHODOLOGY The design of a multimodal biometric system is strongly dependent on the application scenario. A number of multimodal biometric systems have been proposed but they are differ from one another in terms of their architecture, the number and choice of biometric modalities, the level at which the evidence is accumulated, and the methods used for the integration or fusion of information. The proposed system adopts multiple biometric traits of an individual, to establish the identity. From the Fig.1 the proposed system architecture shows initially in enrollment, input data eye image and finger vein image have to register. Then the eye image and the finger image are segmented to obtain the enhanced vein patterns. Then feature extraction takes place to drive the vein features of sclera and finger vein and stored into database with respect to account number. Required proof details are registered with personal details of the user.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 95 Fig.1. System Architecture 3.1 Finger Vein Recognition Finger vein biometric system can verify a person’s identity by recognizing the pattern of blood veins in the Finger. Finger vein authentication uses the vascular patterns of an individual’s Finger as personal identification data. Like fingerprints, the pattern of blood veins in the Finger is unique to every individual, even twins have different patterns and apart from size, this pattern will not vary over the course of a person’s lifetime. The Finger is an ideal part of the body for this technology; it normally does not have hair which can be an obstacle for photographing the blood vessel pattern, and it is less susceptible to a change in skin color, unlike a finger or the back of a hand. 3.2 Line Tracking Algorithm The method is based on line tracking, which starts at various positions. Local dark lines are identified, and line tracking is executed by moving along the lines, pixel by pixel. When a dark line is not detectable, a new tracking operation starts at another position. All the dark lines in the image can be tracked by repeatedly executing such local line tracking operations. Finally, the loci of the lines overlap and the pattern of finger veins is obtained statistically. As the parts of the dark lines are tracked again and again in the repeated operations, they are increasingly emphasized. Although noise may also be tracked, noise is emphasized to a smaller degree than the dark lines. This makes line extraction robust. 3.3 Iris Recognition The iris is the coloured ring around the pupil of every human being and like a snowflake, no two are alike. Each is unique in its own way, exhibiting a distinctive pattern. The iris remains stable over time as long as there are no injuries and a single enrolment scan can last a lifetime. Even blind people can use this scan technology since iris recognition technology is iris pattern dependent not sight dependent. Today’s commercial iris cameras use infrared light to illuminate the iris without causing harm or discomfort to the subject. Localization of the iris is an important step in iris recognition because, if done improperly, resultant noise (i.e.: eyelashes, reflections, pupils and eyelids) in the image may lead to poor performance. 3.4 Sclera Recognition The sclera is the part of the eye commonly known as the "white". It is the outer and protective covering of the eye. It is made up of four layers of tissue i.e. the episclera, stroma, laminafusca and endothelia. The blood vessel structure of the sclera is unique to each person, and it can be remotely obtained non intrusively in the visible wavelengths. The structure of blood vessels is visible and stable over time in sclera. With increasing age collation and elastic fibers deteriorates, sclera dehydration occurs and calcium and lipid salts accumulate but the blood vessels do not deteriorates. Therefore, it is well suited for human identification. Sclera recognition is a challenging research problem because
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 96 images of sclera vessel patterns are often defocused and/or saturated and, most importantly, the vessel structure in the sclera is multilayered and has complex nonlinear deformations. 3.5 Sclera Vein Segmentation Segmentation is the one of the steps in image processing; it divides an image into multiple parts so that we can extract more accurate image attributes. In this project the input eye image have to segment for getting the sclera vein pattern for authentication. 3.6 Estimation of Sclera Area First the pre-processing step includes task to convert the input color image to gray scale image for easy computation. Then there are two classes in an input eye image, foreground (object) and background, which can be separated into two classes by intensity. The hue of the sclera area should have low hue (about bottom 1/3), low saturation (bottom 2/5), and high intensity (top 2/3). Therefore, the following heuristic is developed: With the thresholds calculated using: and Here, is the normalized histogram of the hue image, is the normalized histogram of the saturation image, is the normalized histogram of the intensity image, and result(x, y) is the binary sclera map. The thresholds , and are 1/3, 2/5, and 1/3 respectively. This way, we eliminate non-sclera areas and detect the sclera area in Fig.2. Fig.2. Weighted Image 3.7 Sclera Vessel Pattern Enhancement As a result, the sclera vascular patterns are often blurry and/or have very low contrast. Because the vascular patterns could have multiple orientations, in this paper, a bank of directional Gabor filters is used for vascular pattern enhancement. Where ( , ) is the center frequency of the filter, s is the variance of the Gaussian, and ϑ is the angle of the sinusoidal modulation. Here, only the even filter was used for feature extraction of the vessels, since the even filter is symmetric and its response was determined to identify the locations of vessels adequately. The image is first filtered with Gabor filters with different and scales where I(x, y) is the original intensity image, G(x, y, ϑ, s) is the Gabor filter, and I(x, y, ϑ, s) is the Gabor-filtered image at orientation θ and scale s. All the filtered images are fused together to generate the vessel boosted image F(x, y); Gabor filtered image where B(x, y) is the binary vessel mask image, F(x, y) is the vessel-boosted image, and p(x) is the normalized histogram of the nonzero elements of F(x,y). The morphological operations are applied to the binary maps to remove isolated pixels, and small regions of contiguous pixels. Sclera Vein Pattern is shown in Fig.3. Fig.3. Sclera Vein Pattern 3.8 Sclera Vein Feature Extraction Within the sclera, there can be several layers of veins. The motion of these different layers can cause the blood vessels of sclera show different patterns. But in the same layers,
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 97 blood vessels keep some of their forms. As present in Fig.4, the set of vessel segments combine to create Y shape branches often belonging to same sclera layer. Fig.4. Y-Shape Vessel Branch in Sclera When the numbers of branches is more than three, the vessels branches may come from different sclera layers and its pattern will deform with movement of eye. Y shape branches are observed to be a stable feature and can be used as sclera feature descriptor. To detect the Y shape branches in the original template, we search for the nearest neighbors set of every line segment in a regular distance, classified the angles among these neighbors. If there were two types of angle values in the line segment set, this set may be inferred as a Y shape structure and the line segment angles would be recorded as a new feature of the sclera. Even when the head tilts, the eye moves, or the camera zooms occurs at the image acquisition step, ϕ1, ϕ2, and ϕ3 are quite stable. To tolerate errors from the pupil center calculation in the segmentation step, we also recorded the center position (x,y) of the Y shape branches as auxiliary parameters. So in our rotation, shift and scale invariant feature vector is defined as: Y(ϕ1, ϕ2, ϕ3, x, y). The Y-shape descriptor is generated with reference to the iris center. Therefore, it is automatically aligned to the iris centers. It is a rotational- and scale- invariant descriptor. 3.9 Y-Shaped Descriptor Within the sclera, there can be several layers of veins. The motion of these different layers can cause the blood vessels of sclera show different patterns. But in the same layers, blood vessels keep some of their forms. The set of vessel segments combine to create Y shape branches often belonging to same sclera layer. When the numbers of branches is more than three, the vessels branches may come from different sclera layers and its pattern will deform with movement of eye. Y shape branches are observed to be a stable feature and can be used as sclera feature descriptor. To detect the Y shape branches in the original template, we search for the nearest neighbors set of every line segment in a regular distance, classified the angles among these neighbors. If there were two types of angle values in the line segment set, this set may be inferred as a Y shape structure and the line segment angles would be recorded as a new feature of the sclera. The Y-shaped descriptor is very fast to match because no registration was needed. The matching result in this stage can help filter out image pairs with low similarities. 3.10 Sclera Vein Matching The feature vector for all images that are in the databases are pre-computed and stored during enrollment stage. When coming to verification stage and are the Y shape descriptors of test template and target template respectively. is the Euclidian distance of angle element of descriptors vector defined. is the Euclidian distance of two descriptor centers. and are the matched descriptor pairs’ number and their centers distance respectively. is a distance threshold and t is the threshold to restrict the searching area. We set to 30 and to 675 in our experiment. Here And To match two sclera templates, searched the areas nearby to all the Y shape branches. Here, is a factor to fuse the matching score which was set to 30 in our study. and is the total numbers of feature vectors in template i and j separately. The decision is regulated by the threshold t: if the sclera’s matching score is lower than t, the sclera will be discarded. 4. EXPERIMENTAL RESULT AND DISCUSSION The metrics used for evaluation are False Acceptance rate (FAR) and False Rejection Rate (FRR).
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 98 The FRR is the frequency that an authorized person is rejected access. The evaluation of sclera recognition was carried out with 100 images taken from UBIRIS database were grouped into ten users and the results are tabulated for FAR and FRR. Table I and Fig.5 shows the resulted (FRR) as obtained for the proposed sclera vein and existing iris technique. From the result, it can be observed that the proposed technique results in lesser False Rejection Rate when compared to the existing techniques. The FAR is the frequency that a non- authorized person is accepted as authorized. The result is shown in Fig.6. Table 1 FRR and FAR results Number of Users FRR (%) FAR (%) Existing Fingerprint + Iris Proposed Finger vein + Sclera Vein Existing Fingerprint + Iris Proposed Finger vein + Sclera Vein 1-20 87.7 84.3 0.36 0.12 21-40 88.1 83.9 0.33 0.17 41-60 88.9 84.8 0.31 0.12 61-80 89.6 85.4 0.39 0.14 81-100 88.8 84.5 0.36 0.13 Fig.5 FRR comparison result Fig.6 FAR comparison result 81 82 83 84 85 86 87 88 89 90 91 20 40 60 80 100 FRR(%) Number of Users ExistingFingerprint + Iris Proposed Finger vein + Sclera Vein 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 20 40 60 80 100 FAR(%) Number of Users ExistingFingerprint + Iris Proposed Finger vein + Sclera Vein
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 99 5. CONCLUSION AND FUTURE WORK In this paper we have presented a secured multimodal biometric system by fusing eye vein and Finger vein images. In this system of fusion, we have considered both of the eye vein and finger vein features for verification. In proposed work the user can be authenticated through sclera vein recognition by using a rotation and scale-invariant Y-shape descriptor based feature extraction method efficiently eliminate most unlikely matches. The proposed model has improved the security of the system as verified using FAR and FRR curves. Automatic authentication is possible with state of art technologies like sclera recognition on the move and finger vein scanner on the steering of car. As future improvements the cryptographic key of multimodal biometrics like sclera and iris can be developed and issued for enhancing security. Thus the performance and accuracy of human authentication was increased by the proposed sclera vein biometric recognition. REFERENCES [1] Yong Lin, Eliza Yingzi Du, Zhi Zhou, and N. Luke Thomas, “An Efficient Parallel Approach for Sclera Vein Recognition”, IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, February 2014 [2] A. K. Jain, A. Ross, and S. Prabhakar, ―An introduction to biometric recognition, IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1,pp. 4–20, Jan. 2004. [3] A. K. Jain, A. Ross, and S. Pankanti, ―Biometrics: A tool for information security, IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp.125–143, Jun. 2006. [4] X. Suo, Y. Zhu, and G. Owen, ―Graphical passwords: A survey,in Proc. Annu. Computer Security Applications, 2005, pp. 463– 472 [5] A. K. Jain, P. Flynn, and A. A. Ross, Eds., Handbook of Biometrics. New York: Springer, 2007. [6] F. Pernus, S. Kovacic, and L. Gyergyek, Minutiae- based fingerprint recognition, Proceedings of the Fifth international Conference on Pattern Recognition, 1380-1382, 1980. [7] Zhi Zhou, Student Member, IEEE, Eliza Yingzi Du, Senior Member, IEEE, N. Luke Thomas, and Edward J. Delp, Fellow, IEEE, A New Human Identification Method:Sclera Recognition, IEEE transactions on systems, man, and cybernetics— part a: systems and humans, vol. 42, no. 3, may 2012 [8] A. K. Jain, S. Prabhakar, and S. Chen, Combining multiple Matchers for a High SecurityFingerprint Verification System, Pattern Recognition Letters, 20(11-13), 1371-1379,1999. [9] A.K.Jain, L. Hong, and R. Bolle, On-line fingerprint verification, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, 302-314, 1997.Fingerprint Recognition Page 41 of 123 [10] S. Zhang, R. Janakiraman, T. Sim and S. Kumar, ―Continuous Verification Using Multimodal Biometrics, Proc.Second Int’l Conf. Biometrics, pp. 562-570, 2006. [11] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, ―Continuous verification using multimodal biometrics, IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 687–700, Apr. 2007. [12] A. Altinok and M. Turk, ―Temporal Integration for Continuous Multimodal Biometrics,Proc. Workshop on Multimodal User Authentication, pp. 131-137, 2003. [13] Antonia Azzini, Stefania Marrara, Roberto Sassi and Fabio Scotti, ―A fuzzy approach to multimodal biometric continuous authentication, Fuzzy Optimal Decision Making, vol. 7, pp. 243-256, 2008. [14] Antonia Azzini and Stefania Marrara, ―Impostor Users Discovery Using a Multimodal Biometric Continuous Authentication Fuzzy System, Lecture Notes In Artificial Intelligence, vol. 5178, Proceedings of the 12th International Conference on Knowledge Based Intelligent Information and Engineering Systems, Part II, Section II,pp. 371-378, 2008. [15] Hang-Bong Kang and Myung-Ho Ju, ―Multi-modal Feature Integration for Secure Authentication, International Conference on Intelligent Computing, pp.1191-1200, 2006.