The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Iris recognition is considered to be the most reliable and accurate biometric identification system available. Iris recognition system captures an image of an individual person’s eye, than the image of iris is meant for the further segmentation and normalization for extracting its feature.Segmentation is used for the localization of the correct iris region in the particular portion of an eye and it should be done accurately and correctly to remove the eyelids, eyelashes, reflection and pupil noises present in iris region. The features of the iris were encoded by convolving the normalize iris region with 1D Log-Gabor filters and phase quantizing the output in order to produce a bit-wise biometric template. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
In this study, an end-to-end human iris recognition system is presented to automatically identify individuals for high level of security purposes. The deep learning technology based new 2D convolutional neural network (CNN) model is introduced for extracting the features and classifying the iris patterns. Firstly, the iris dataset is collected, preprocessed and augmented. The dataset are expanded and enhanced using data augmentation, histogram equalization (HE) and contrast-limited adaptive histogram equalization (CLAHE) techniques. Secondly, the features of the iris patterns were extracted and classified using CNN. The structure of CNN comprises of convolutional layers and ReLu layers for extracting the features, pooling layers for reducing the parameters, fully connected layer and Softmax layer for classifying the extracted features into N classes. For the training process and updating the weights, the backpropagation algorithm and adaptive moment estimation Adam optimizer are used. The experimental results carried out based on a graphics processing unit (GPU) and using Matlab. The overall training accuracy of the introduced system was 95.33% with a consumption time of 17.59 minutes for training set. While the testing accuracy 100% with a consumption time of 12 seconds. The introduced iris recognition system has been successfully applied.
Iris recognition is considered to be the most reliable and accurate biometric identification system available. Iris recognition system captures an image of an individual person’s eye, than the image of iris is meant for the further segmentation and normalization for extracting its feature.Segmentation is used for the localization of the correct iris region in the particular portion of an eye and it should be done accurately and correctly to remove the eyelids, eyelashes, reflection and pupil noises present in iris region. The features of the iris were encoded by convolving the normalize iris region with 1D Log-Gabor filters and phase quantizing the output in order to produce a bit-wise biometric template. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
In this study, an end-to-end human iris recognition system is presented to automatically identify individuals for high level of security purposes. The deep learning technology based new 2D convolutional neural network (CNN) model is introduced for extracting the features and classifying the iris patterns. Firstly, the iris dataset is collected, preprocessed and augmented. The dataset are expanded and enhanced using data augmentation, histogram equalization (HE) and contrast-limited adaptive histogram equalization (CLAHE) techniques. Secondly, the features of the iris patterns were extracted and classified using CNN. The structure of CNN comprises of convolutional layers and ReLu layers for extracting the features, pooling layers for reducing the parameters, fully connected layer and Softmax layer for classifying the extracted features into N classes. For the training process and updating the weights, the backpropagation algorithm and adaptive moment estimation Adam optimizer are used. The experimental results carried out based on a graphics processing unit (GPU) and using Matlab. The overall training accuracy of the introduced system was 95.33% with a consumption time of 17.59 minutes for training set. While the testing accuracy 100% with a consumption time of 12 seconds. The introduced iris recognition system has been successfully applied.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
Biometric Iris Recognition Based on Hybrid Techniqueijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONijaia
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION gerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
Transfer Learning with Convolutional Neural Networks for IRIS Recognitiongerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize
persons with a high degree of assurance. Extracting effective features is the most important stage in the
iris recognition system. Different features have been used to perform iris recognition system. A lot of
them are based on hand-crafted features designed by biometrics experts. According to the achievement of
deep learning in object recognition problems, the features learned by the Convolutional Neural Network
(CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed
an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The
proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for
features extracting and classification. The performance of the iris recognition system is tested on four
public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The
results show that the proposed system is achieved a very high accuracy rate.
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
Embedded artificial intelligence system using deep learning and raspberrypi f...IAESIJAI
Melanoma is a kind of skin cancer that originates in melanocytes responsible for producing melanin, it can be a severe and potentially deadly form of cancer because it can metastasize to other regions of the body if not detected and treated early. To facilitate this process, Recently, various computer-assisted low-cost, reliable, and accurate diagnostic systems have been proposed based on artificial intelligence (AI) algorithms, particularly deep learning techniques. This work proposed an innovative and intelligent system that combines the internet of things (IoT) with a Raspberry Pi connected to a camera and a deep learning model based on the deep convolutional neural network (CNN) algorithm for real-time detection and classification of melanoma cancer lesions. The key stages of our model before serializing to the Raspberry Pi: Firstly, the preprocessing part contains data cleaning, data transformation (normalization), and data augmentation to reduce overfitting when training. Then, the deep CNN algorithm is used to extract the features part. Finally, the classification part with applied Sigmoid Activation Function. The experimental results indicate the efficiency of our proposed classification system as we achieved an accuracy rate of 92%, a precision of 91%, a sensitivity of 91%, and an area under the curve- receiver operating characteristics (AUC-ROC) of 0.9133.
Face and liveness detection with criminal identification using machine learni...IAESIJAI
In the past, real-world photos have been used to train classifiers for face liveness identification since the related face presentation attacks (PA) and real-world images have a high degree of overlap. The use of deep convolutional neural networks (CNN) and real-world face photos together to identify the liveness of a face, however, has received very little study. A face recognition system should be able to identify real faces as well as efforts at faking utilizing printed or digital presentations. A true spoofing avoidance method involves observing facial liveness, such as eye blinking and lip movement. However, this strategy is rendered useless when defending against replay assaults that use video. The anti-spoofing technique consists of two modules: the ConvNet classifier module and the blinking eye module, which measure lip and eye movement. The results of the testing demonstrate that the developed module is capable of identifying various face spoof assaults, including those made with the use of posters, masks, or smartphones. To assess the convolutional features in this study adaptively fused from deep CNN produced face pictures and convolutional layers learned from real-world identification. Extensive tests using intra-database and cross-database scenarios on cutting-edge face anti-spoofing databases including CASIA, OULU, NUAA and replay-attack dataset demonstrate that the proposed solution methods for face liveness detection. The algorithm has a 94.30% accuracy rate.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
More Related Content
Similar to A Novel Biometric Approach for Authentication In Pervasive Computing Environments
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
Biometric Iris Recognition Based on Hybrid Techniqueijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
Biometric Iris Recognition Based on Hybrid Technique ijsc
Iris Recognition is one of the important biometric recognition systems that identify people based on their eyes and iris. In this paper the iris recognition algorithm is implemented via histogram equalization and wavelet techniques. In this paper the iris recognition approach is implemented via many steps, these steps are concentrated on image capturing, enhancement and identification. Different types of edge detection mechanisms; Canny scheme, Prewitt scheme, Roberts scheme and Sobel scheme are used to detect iris boundaries in the eyes digital image. The implemented system gives adequate results via different types of iris images.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITIONijaia
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
TRANSFER LEARNING WITH CONVOLUTIONAL NEURAL NETWORKS FOR IRIS RECOGNITION gerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted features designed by biometrics experts. According to the achievement of deep learning in object recognition problems, the features learned by the Convolutional Neural Network (CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for features extracting and classification. The performance of the iris recognition system is tested on four public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The results show that the proposed system is achieved a very high accuracy rate.
Transfer Learning with Convolutional Neural Networks for IRIS Recognitiongerogepatton
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize
persons with a high degree of assurance. Extracting effective features is the most important stage in the
iris recognition system. Different features have been used to perform iris recognition system. A lot of
them are based on hand-crafted features designed by biometrics experts. According to the achievement of
deep learning in object recognition problems, the features learned by the Convolutional Neural Network
(CNN) have gained great attention to be used in the iris recognition system. In this paper, we proposed
an effective iris recognition system by using transfer learning with Convolutional Neural Networks. The
proposed system is implemented by fine-tuning a pre-trained convolutional neural network (VGG-16) for
features extracting and classification. The performance of the iris recognition system is tested on four
public databases IITD, iris databases CASIA-Iris-V1, CASIA-Iris-thousand and, CASIA-Iris-Interval. The
results show that the proposed system is achieved a very high accuracy rate.
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
Embedded artificial intelligence system using deep learning and raspberrypi f...IAESIJAI
Melanoma is a kind of skin cancer that originates in melanocytes responsible for producing melanin, it can be a severe and potentially deadly form of cancer because it can metastasize to other regions of the body if not detected and treated early. To facilitate this process, Recently, various computer-assisted low-cost, reliable, and accurate diagnostic systems have been proposed based on artificial intelligence (AI) algorithms, particularly deep learning techniques. This work proposed an innovative and intelligent system that combines the internet of things (IoT) with a Raspberry Pi connected to a camera and a deep learning model based on the deep convolutional neural network (CNN) algorithm for real-time detection and classification of melanoma cancer lesions. The key stages of our model before serializing to the Raspberry Pi: Firstly, the preprocessing part contains data cleaning, data transformation (normalization), and data augmentation to reduce overfitting when training. Then, the deep CNN algorithm is used to extract the features part. Finally, the classification part with applied Sigmoid Activation Function. The experimental results indicate the efficiency of our proposed classification system as we achieved an accuracy rate of 92%, a precision of 91%, a sensitivity of 91%, and an area under the curve- receiver operating characteristics (AUC-ROC) of 0.9133.
Face and liveness detection with criminal identification using machine learni...IAESIJAI
In the past, real-world photos have been used to train classifiers for face liveness identification since the related face presentation attacks (PA) and real-world images have a high degree of overlap. The use of deep convolutional neural networks (CNN) and real-world face photos together to identify the liveness of a face, however, has received very little study. A face recognition system should be able to identify real faces as well as efforts at faking utilizing printed or digital presentations. A true spoofing avoidance method involves observing facial liveness, such as eye blinking and lip movement. However, this strategy is rendered useless when defending against replay assaults that use video. The anti-spoofing technique consists of two modules: the ConvNet classifier module and the blinking eye module, which measure lip and eye movement. The results of the testing demonstrate that the developed module is capable of identifying various face spoof assaults, including those made with the use of posters, masks, or smartphones. To assess the convolutional features in this study adaptively fused from deep CNN produced face pictures and convolutional layers learned from real-world identification. Extensive tests using intra-database and cross-database scenarios on cutting-edge face anti-spoofing databases including CASIA, OULU, NUAA and replay-attack dataset demonstrate that the proposed solution methods for face liveness detection. The algorithm has a 94.30% accuracy rate.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to A Novel Biometric Approach for Authentication In Pervasive Computing Environments (20)
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Planning Of Procurement o different goods and services
A Novel Biometric Approach for Authentication In Pervasive Computing Environments
1. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
DOI:10.5121/acii.2016.3202 15
A NOVEL BIOMETRIC APPROACH FOR
AUTHENTICATION IN PERVASIVE COMPUTING
ENVIRONMENTS
Rachappa1
, Divyajyothi M G 2
and Dr. D H Rao3
1
Research Scholar, Department of Computer Science, Jain University, Bangalore
2
Research Scholar, Department of Computer Science, Jain University, Bangalore
3
Professor and Dean, S.G. Balekundri Institute of Technology, Belgaum India
ABSTRACT
The paradigm of embedding computing devices in our surrounding environment has gained more interest
in recent days. Along with contemporary technology comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed for identification should be robust and dynamic. In this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics
termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and
retinal scanning algorithms have been discussed which promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
KEYWORDS
Pervasive computing, Biometrics, Privacy, Security, Iris recognition, Advanced computing, Authentication
1. INTRODUCTION
A lot of computing devices have already started assisting people in their day to day activities.
Embedded sensors are already part of cars and home appliances and will soon find widespread
application in the whole environment where all the surrounding objects will be smart to assist
users each possessing computing capability [4] [5]. So it’s time to envision a future where the
devices can comprehend with the picture of the real and virtual world. Though right now most
devices have simple functionality, with not much knowledge about the people with whom they
are communicating and interacting, it is highly essential to make the pervasive setup “human
aware”, so that the identity of the user in the proximity of the computing device is known. The
usage of traditional authentication methods may not be feasible for pervasive environments, and
needs an erudite identity recognition technology which is more accurate and non-forgeable. The
efficient use of biometrics can serve the purpose of such identification and verification due to
their prodigious ability of providing security in many applications. Keeping in mind the
significant limitations of the previously proposed biometric schemes available in literature such
as spoofing, back end and input level attacks, hill climbing attacks, designing multimodal
biometric systems is essential. [1] [6] [8]. The multimodal biometric systems should encompass
innovative tools and methods that can deal with most of these attacks. In this work we discuss the
technique of iris and retinal scanning as a promising model for authentication for a pervasive
computing environment, keeping in mind the ease of use, cost effectiveness and computation
speed. Although the usage of biometric identifiers in pervasive domain in the future for
authentication is upbeat, it also gives rise to interesting research problems for inventing
2. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
16
appropriate innovative techniques and algorithms that can fit into various pervasive application
realms.
1.1. Related Work
A periocular biometric iris recognition scheme based on analysis of iris texture was designed that
takes into account the shape of eyelids and even skin wrinkles promising improved performance
[13]. NSF and Texas state university have proposed a reliable, more secure biometric approach
which is three layered and is highly reliable[9] [10] [11] [12].
Though these results are not being discussed or applied on pervasive computing devices, it would
be interesting to learn about their performance and functioning on the same. Speech and facial
biometric identifiers have been deployed by the Australian market in the latest range of LED’s
and Television by Panasonic Company [15].
2. OCULAR BIOMETRICS
Accurate user and service provider authentication is a must in pervasive computing environments.
The combination of iris scanning and retinal scanning is termed as ocular biometrics. Here both
iris and retinal scanning being highly accurate serves as a strong candidate for authentication [2]
[7].
Ocular biometric systems provide accurate results when compared to uni-modal biometric
identifier and can be robust against spoofing attacks because multiple biometric traits are hard to
fake.
2.1. Structural Background
The complexity of ocular biometric identifiers lies in the complex eye structure of an individual
which is unique in every person. Also the movement of the eye takes different states depending
on various provocations. There can be stable eye balls, centred ones, rotating ones or a
combination of all these. For pervasive deployment cost of equipment used and accurate
biometric results are very important. Using low cost image sensors can serve the purpose.
2.2. Iris
Iris recognition technique is one of the main reasons for the wide application of ocular biometry.
The Indian government’s UIDAI program is capable of matching 10000 billion iris patterns daily
[18]. The acquisition techniques for a pervasive environment can be through sensor technology.
The first region of interest to capture iris data is the region surrounding the pupil for which an
appropriate edge detection algorithm has to be applied after which template matching can be
done.
2.3. Periocular
The portion of the face surrounding by the eyes is referred to as the periocular region. This can be
used along with iris and retina to form a strong biometric identification trait, which in turn can
form a basis to determine the age, gender, culture of various individuals.
3. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
17
2.4. Retina
Though a number of middleware solutions have been proposed for data, service management,
owing to the wide heterogeneity of network resources involved in pervasive computing there are
numerous coordination problems that exists in such computing environments. A secured single
middleware solution is very much desirable in such environments.
3. IRIS RECOGNITION ALGORITHMS
The random structure of the iris can be absolutely reliable to determine a person’s identity.
Already it is being widely used in airports to authenticate / identify users. The iris patterns, as
shown in the figure, have more uniqueness, randomness, come in different shapes and sizes, and
can be a better contestant than face recognition or any other biometric identifiers.
Figure 3.1: The Complex Iris Pattern
3.1. Daughman’s Algorithm
The most widely used iris recognition algorithm [3]. The Daughman’s Integro-Differential
equation is as follows:
Here, for each of the iris and pupil, r is the radius and (xo,yo) is the centre of the coarse circle.
The algorithm is run twice, first to determine the iris contour followed by the pupil contour. The
original image is given by I (x, y) and the Gaussian function is denoted by Gσ(r).
A number of studies have reported a zero failure rate on applying this algorithm for iris
recognition. Given millions of possibilities, this algorithm can rightly determine an individual
with a recognition rate of 98.4% [19] [20]. Thus iris recognition is considered to be a reliable
biometric identifier in comparison with other technologies.
4. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
18
3.1.1 Enhanced Daughman’s Algorithm
The algorithm mentioned above has a limitation that if there is maximum gradient received while
scanning an image, then a bright spot can be mistaken. So the above equation needs to be
modified. There needs to be a threshold value, beyond which all image pixels resulting in a circle
has to be ignored.
3.1.2 Applicability in Pervasive Infrastructure
Owing to the complex iris structure and the fact that no two identical persons can have the same
iris construction and due to its stable results for many years, Iris scanning techniques have many
advantages to offer in comparison with many of the existing biometric identifiers.
Deployment in a pervasive domain demands optimum performance and it has been demonstrated
that in less than 2 seconds a 2 GHz processor can compare around I million iris [17].
4. RETINAL SCANNING TECHNIQUES
Retina scanning based biometrics for identification and verification takes advantage of the
complex structure of one’s retinal blood vessel patterns which is unique for every individual. This
technique is the least deployed as of now, as the retinal scanning algorithms work better with only
high quality images.
Retinal patterns can be obtained by capturing a digital image of the eye while projecting an
infrared light. This technique needs utmost cooperation from the subjects as they have to look at
the lens in a specific alignment.
Figure 4.1: The Retina structure
5. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
19
4.1. Security Implications
Retina scan technology has a robust security implication due to its unique matching capabilities
against a given identification database. The security of this technique comes from the fact that
every individual has a unique retinal vasculature which is not possible to replicate.
The only constraint that applies here is the image quality. Retina scan identification algorithms
work accurately only with high quality images.
4.2. Deployment in Pervasive Domain
Retina scanning devices can be embedded in the surrounding pervasive objects around the
environment where a high degree of security, identification, verification and accountability is
intended. Few areas to mention may be in governance and military management, Central
Intelligence agencies, medical diagnostic examinations and chronic conditions, aeronautics and
space applications, investigation agencies.
5. PERFORMANCE AND APPLICABILITY
For a pervasive environment and in its vast application, biometric authentication based on iris
scanning followed by a retinal scanning can provide accurate results. Smart homes, PC webcam
security systems, surveillance systems can make use of this authentication technique to identify
users entering / leaving a house. The same applies to any computing device embedded with a
camera and a scanning device. Military bases and nuclear reactors are already using retina
scanners.
Due to the unique identifying traits, the performance of retinas scans is much more accurate than
iris scans, and any other biometric identifiers [14]. In contrast, the refractive state of the eye and
common corneal diseases does not affect iris scanning. But if there is a loss of corneal clarity,
both the retinal and iris image results may vary radically.
In comparison with uni-modal biometric systems, future belongs to multimodal systems. They
can improve the matching performance with their ability to integrate information at various
levels. Several multimodal systems have been proposed by researchers. One such fusion model is
shown in the figure. Here the feature extraction may differ based on the biometric trait one
desires to capture. In the proposed paper, it is the iris and retina
6. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
20
Figure 5.1: Example: Multimodal Fusion system [21]
6. CONCLUSION
In this paper we have discussed a multi-layer biometric authentication scheme that can be useful
in authenticating users for varied pervasive computing applications. We have discussed in detail
the iris and retina scanning techniques and algorithms and their performance issues. The statistics
obtained from iris and retina scan can be consolidated to compute a new feature vector in a new
hyperspace. This feature vector can perform best matching. Using this multi – modal scheme,
each modal will generate a matching score which can be combined to sustain the claimed identity.
Ocular Biometrics is progressing rapidly [16], and promises acute security for various practical
based applications. It facilitates several tools to carry out business transactions in a protected
manner. The research effort continues from around the world to improve the efficacy and
accuracy of this biometric domain. As the technology ripens further, one can expect increased
user acceptance, applicability and credibility to the service providers.
With every innovative technology, comes a set of limitations. Careful system Design however
can minimize these precincts. Every system must be designed with a cost-benefit analysis.
7. ACKNOWLEDGMENTS
We extend our thanks to our Prof. Dr. D. H. Rao for his discussions, time and ideas given during
the course of our work.
8. REFERENCES
[1] Abdulmonam Omar Alaswad, “Vulnerabilities of Biometric Authentication “Threats and
Countermeasures”, International Journal of Information & Computation Technology. ISSN 0974-
2239 Volume 4, Number 10 (2014), pp. 947-958
[2] Prateek Verma, “Daughman’S Algorithm Method For Iris Recognition-A Biometric Approach”,
International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 6,
June 2012.
[3] Daugman, John G., PhD, “How Iris Recognition Works”, IEEE Transactions on Circuits and
Systems for Video Technology, Vol. 14, No. 1, January 2004, DOI 10.1109/TCSVT.2003.818350.
[4] Divyajyothi M G, Rachappa and Dr. D H Rao,” Techniques of Lattice Based Cryptography
Studied On A Pervasive Computing Environment,” International Journal on Computational
Science & Applications (IJCSA), Vol.5, No.4, August 2015.
7. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
21
[5] Divyajyothi M G, Rachappa and Dr. D H Rao, “A Scenario Based Approach for Dealing with
Challenges in A Pervasive Computing Environment,” International Journal on Computational
Sciences & Applications (IJCSA), Vol.4, No.2, April 2014.
[6] David D. Zhang,” Biometric Solutions: For Authentication in an E-World”, Springer Science and
Business.
[7] O. V. Komogortsev, A. Karpov. "Automated Classification and Scoring of Smooth Pursuit Eye
Movements in Presence of Fixations and Saccades," Journal of Behavioral Research
Methods, v.45, 2013, p. 203. doi:10.3758/s13428-012-0234-9
[8] O. V. Komogortsev, C. Holland, S. Jayarathna, A. Karpov. "2D Linear Oculomotor Plant
Mathematical Model: Verification and Biometric Applications," ACM Transactions on Applied
Perception, v.10, 2013. doi:10.1145/2536764.2536774
[9] Complex Eye Movement Pattern Biometrics: The Effects of Environment and Stimulus. "Complex
Eye Movement Pattern Biometrics: The Effects of Environment and Stimulus," IEEE Transactions
on Information Forensics and Security, v.8, 2013, p. 2115. doi:10.1109/TIFS.2013.2285884
[10] O. V. Komogortsev, A. Karpov, C. Holland.. "Attack of Mechanical Replicas: Liveness Detection
with Eye Movements," IEEE Transactions on Information Forensics and Security, v.10, 2015, p.
716.
[11] O. V. Komogortsev, C. Holland, A. Karpov, L. R. Price. "Biometrics via Oculomotor Plant
Characteristics: Impact of Parameters in Oculomotor Plant Model," ACM Transactions on
Applied Perception, v.11, 2014, p. 1.
[12] I. Rigas and O. V. Komogortsev. "Biometric Recognition via Probabilistic Spatial Projection of
Eye Movement Trajectories in Dynamic Visual Environments," IEEE Transactions on Information
Forensics and Security, v.9, 2014, p. 1743.
[13] Proença H., “Ocular biometrics by score-level fusion of disparate experts”, IEEE Trans Image
Process. 2014 Dec; 23(12):5082-93. doi: 10.1109/TIP.2014.2361285. Epub 2014 Oct 2.
[14] Matthew Haughn, “Retina Scan” July 2014, Available at :
http://whatis.techtarget.com/definition/retina-scan
[15] Steve Bell ,” The invasion of biometrics”, Security Expert at Bull Guard - Monday, 27 April 2015,
Available at : http://www.net-security.org/article.php?id=2260&p=1
[16] M. Vatsa, R. Singh, A. Noore, A. Ross, “On the dynamic selection of biometric fusion
algorithms”, IEEE Transactions on Information Forensics and Security, 5 (3) (2010), pp. 470–479
[17] Available : http://clinfowiki.org/wiki/index.php/Ocular_biometrics
[18] Unique Identification Authority of India, http://uidai.gov.in/
[19] R. Wildes, J. Asmuth, G. Green, S. Hsu, R. Kolczynski, J. Matey, S. McBride, “A system for
automated iris recognition”, Proceedings IEEE Workshop on Applications of Computer Vision,
Sarasota, FL, pp. 121-128, 1994
[20] S. Sanderson, J. Erbetta., “Authentication for secure environments based on iris scanning
technology”, IEE Colloquium on Visual Biometrics, 2000.
[21] N. Celik1*
, N. Manivannan1
, W. Balachandran1
and S. Kosunalp2 “
Multimodal Biometrics for
Robust Fusion Systems using Logic Gates”, Biom Biostat 6:218, doi: 10.4172/2155-6180.1000218
Authors
Mr. Rachappa is currently working as Lecturer at the Department of Information
Technology, Al Musanna College of Technology, Sultanate of Oman. His teaching
interests include Computer Security, Pervasive Computing, E-Commerce, Computer
Networks, Intrusion detection System, Network Security and Cryptography, Internet
Protocols, Client Server Computing, Unix internals, Linux internal, Kernel
Programming, Object Oriented Analysis and Design, Programming Languages,
Operating Systems, Web Design and Development, etc. His most recent research
focus is in the area of Security Challenges in Pervasive Computing. He received his
Bachelor Degree in Computer Science from Gulbarga University, Master of Science
Degree from Marathwada University and Master of Technology in Information
Technology Degree from Punjabi University (GGSIIT). He has been associated as a
Lecturer of the Department of Information Technology since 2006. He has worked
as Lecturer at R.V. College of Engineering, Bangalore. He has guided many project
thesis for UG/PG level. He is a Life member of CSI, ISTE.
8. Advanced Computational Intelligence: An International Journal (ACII), Vol.3, No.2, April 2016
22
Mrs DivyaJyothi M.G. is currently working as Lecturer at the Department of
Information Technology, Al Musanna College of Technology, and Sultanate of
Oman. Her teaching interests include Pervasive Computing, Firewalls and Internet
Security Risks, E-Commerce, Computer Networks, Intrusion detection System,
Network Security and Cryptography, Internet Protocols, Client Server Computing,
Unix internals, Linux internal, Kernel Programming, Object Oriented Analysis and
Design, Programming Languages, Operating Systems, Image Processing, Web
Design and Development, etc. Her most recent research focus is in the area of
Pervasive Computing. She received her Bachelor and Master Degree in Computer
Science from Mangalore University, She bagged First Rank in Master’s Degree at
Mangalore University. She has been associated as a Lecturer of the Department of
Information Technology since 2007. She has worked as Lecturer at ICFAI Tech.,
Bangalore, T John College for MCA, Bangalore, Alva’s Education Foundation
Mangalore. She has guided many project thesis for UG/PG level.
Dr. D H Rao is Currently working as Professor and Dean, S.G. Balekundri
Institute of Technology, Belgaum. He has worked as a Dean, Faculty of
Engineering, VTU, Belgaum. He was Principal at KLS Gogte Institute of
Technology, Belgaum and Jain College of Engineering, Belgaum.
He is the Chairman, Board of Studies in E & C Engineering, VTU, Belgaum. He
is a Member, Academic Senate, VTU Belgaum. He has over 100+ publications in
reputed Journals and conferences. He obtained B.E. (in Electronics from B.M.S.
College of Engineering), M.E. (from Madras University), M.S. (University of
Saskatchewan, Canada) Ph.D. (Univ. of Saskatchewan, Canada).