ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
The biometric technology is used to identify
individuals effectively compared to existing traditional
methods. In this paper we propose Bimodal Biometric System
using Multiple Transformation features of Fingerprint and
Iris (BBMFI). The iris image is preprocessed to generate iris
template. The two level Discrete Wavelet Transformation
(DWT) is applied on iris template and Discrete Cosine
Transformation (DCT) is performed on second level low
frequency band to generate DCT coefficients which results in
features of iris. The fingerprint is preprocessed to obtain
Region of Interest (ROI) and segmented into four cells. Then
the DWT is applied on each cell to derive approximation band
and detailed bands. The Fast Fourier Transformation (FFT)
is applied on approximation band to compute absolute values
that results in features of fingerprint. The iris features and
fingerprint features are fused by concatenation to obtain final
set of features. The final feature vector of test and database
are compared using Euclidean distance matching. It is observed
that the values of Total Success Rate (TSR), False Rejection
Rate (FRR) and False Acceptance Rate (FAR) are improved in
the proposed system compared to existing algorithm.
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
The biometric technology is used to identify
individuals effectively compared to existing traditional
methods. In this paper we propose Bimodal Biometric System
using Multiple Transformation features of Fingerprint and
Iris (BBMFI). The iris image is preprocessed to generate iris
template. The two level Discrete Wavelet Transformation
(DWT) is applied on iris template and Discrete Cosine
Transformation (DCT) is performed on second level low
frequency band to generate DCT coefficients which results in
features of iris. The fingerprint is preprocessed to obtain
Region of Interest (ROI) and segmented into four cells. Then
the DWT is applied on each cell to derive approximation band
and detailed bands. The Fast Fourier Transformation (FFT)
is applied on approximation band to compute absolute values
that results in features of fingerprint. The iris features and
fingerprint features are fused by concatenation to obtain final
set of features. The final feature vector of test and database
are compared using Euclidean distance matching. It is observed
that the values of Total Success Rate (TSR), False Rejection
Rate (FRR) and False Acceptance Rate (FAR) are improved in
the proposed system compared to existing algorithm.
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
Personal identification system based on pass word
and other entities are ineffective. Nowadays biometric based
systems are used for human identification in almost many
real time applications. The current state-of-art biometric
identification focuses on accuracy and hence a good
performance result in terms of response time on small scale
database is achieved. But in today’s real life scenario biometric
database are huge and without any intelligent scheme the
response time should be high, but the existing algorithms
requires an exhaustive search on the database which increases
proportionally when the size of the database grows. This paper
addresses the problem of biometric indexing in the context of
fingerprint. Indexing is a technique to reduce the number of
candidate identities to be considered by the identification
algorithm. The fingerprint indexing methodology projected
in this work is based on a combination of Level 1, Level 2 and
Level-3 fingerprint features. The result shows the fusion of
level 1, level 2 and level 3 features gives better performance
and good indexing rate than with any one level of fingerprint
feature.
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from Curvelet transform. The Curvelet feature dimension is selected based on d-prime number. The increase in feature dimension is reduced by using template averaging, moment features and by Principal component analysis (PCA). The algorithm is tested on in-house multimodal database comprising of 3000 samples and Chimeric databases. Identification performance of the system is evaluated using SVM classifier. A maximum GAR of 97.15% is achieved with Curvelet-PCA features.
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
In identity management system, commonly used biometric recognition system needs attention
towards issue of biometric template protection as far as more reliable solution is concerned. In
view of this biometric template protection algorithm should satisfy security, discriminability and
cancelability. As no single template protection method is capable of satisfying the basic
requirements, a novel technique for face template generation and protection is proposed. The
novel approach is proposed to provide security and accuracy in new user enrollment as well as
authentication process. This novel technique takes advantage of both the hybrid approach and
the binary discriminant analysis algorithm. This algorithm is designed on the basis of random
projection, binary discriminant analysis and fuzzy commitment scheme. Three publicly available
benchmark face databases are used for evaluation. The proposed novel technique enhances the
discriminability and recognition accuracy by 80% in terms of matching score of the face images
and provides high security.
Multimodal biometric systems are those that utilize more than one physical or behavioural characteristic for enrolment , verification, or identification.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Personal identification using multibiometrics score level fusioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
User verification systems that use a single source of biometric information are not sufficient to meet today’s high security requirements for applications. This is because these systems have to contend with noisy data, intra-class variations, spoof attack and non-universality. Therefore, there is need for employing multiple sources of biometric information to provide better recognition performance as compared to the systems based on single trait. This paper is an overview of different categories of multibiometric systems, information fusion in multibiometric systems, and approaches to feature fusion at feature selection phase.
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
Biometric system is often not able to meet the desired performance requirements.
In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.
In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification.
Information Security using Cryptography and Image Processingijsrd.com
Meaning of Information security is protecting information and the systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. Therefore it is necessary to apply effective encryption/decryption methods to achieve data security. The user only needs to remember the short password to retrieve the key. The password can be forgotten and stolen. As Biometrics based authentication systems confirm an individual's identity based on the physiological and/or behavioral characteristics of the individual. It has advantages over password based methods. Biometrics based method provides direct link between the service and actual user. With biometrics, there is nothing to lose or forget, and it is relatively difficult to manipulate. Biometrics and cryptography are the two most prominent solutions for user authentication, data integrity preservation, and trustworthy verification. By combining biometrics with cryptography, high level of security can be achieved.
IRIS Recognition Based Authentication System In ATMIJTET Journal
Security and Authentication of individuals is necessary for our daily lives especially in ATMs. It has been improved by using biometric verification techniques like face recognition, fingerprints, voice and other traits, comparing these existing traits, there is still need for considerable computer vision. Iris recognition is a particular type of biometric system that can be used to reliably identify a person uniquely by analyzing the patterns found in the iris. Initially Iris images are collected as datasets and maintained in agent memory. Then the Iris and pupil are detected from the image, removing noises. The features of the iris were encoded by convolving the normalized iris region with 2DGabor filter. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
Personal identification system based on pass word
and other entities are ineffective. Nowadays biometric based
systems are used for human identification in almost many
real time applications. The current state-of-art biometric
identification focuses on accuracy and hence a good
performance result in terms of response time on small scale
database is achieved. But in today’s real life scenario biometric
database are huge and without any intelligent scheme the
response time should be high, but the existing algorithms
requires an exhaustive search on the database which increases
proportionally when the size of the database grows. This paper
addresses the problem of biometric indexing in the context of
fingerprint. Indexing is a technique to reduce the number of
candidate identities to be considered by the identification
algorithm. The fingerprint indexing methodology projected
in this work is based on a combination of Level 1, Level 2 and
Level-3 fingerprint features. The result shows the fusion of
level 1, level 2 and level 3 features gives better performance
and good indexing rate than with any one level of fingerprint
feature.
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from Curvelet transform. The Curvelet feature dimension is selected based on d-prime number. The increase in feature dimension is reduced by using template averaging, moment features and by Principal component analysis (PCA). The algorithm is tested on in-house multimodal database comprising of 3000 samples and Chimeric databases. Identification performance of the system is evaluated using SVM classifier. A maximum GAR of 97.15% is achieved with Curvelet-PCA features.
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
In identity management system, commonly used biometric recognition system needs attention
towards issue of biometric template protection as far as more reliable solution is concerned. In
view of this biometric template protection algorithm should satisfy security, discriminability and
cancelability. As no single template protection method is capable of satisfying the basic
requirements, a novel technique for face template generation and protection is proposed. The
novel approach is proposed to provide security and accuracy in new user enrollment as well as
authentication process. This novel technique takes advantage of both the hybrid approach and
the binary discriminant analysis algorithm. This algorithm is designed on the basis of random
projection, binary discriminant analysis and fuzzy commitment scheme. Three publicly available
benchmark face databases are used for evaluation. The proposed novel technique enhances the
discriminability and recognition accuracy by 80% in terms of matching score of the face images
and provides high security.
Multimodal biometric systems are those that utilize more than one physical or behavioural characteristic for enrolment , verification, or identification.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Personal identification using multibiometrics score level fusioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
User verification systems that use a single source of biometric information are not sufficient to meet today’s high security requirements for applications. This is because these systems have to contend with noisy data, intra-class variations, spoof attack and non-universality. Therefore, there is need for employing multiple sources of biometric information to provide better recognition performance as compared to the systems based on single trait. This paper is an overview of different categories of multibiometric systems, information fusion in multibiometric systems, and approaches to feature fusion at feature selection phase.
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
Biometric system is often not able to meet the desired performance requirements.
In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.
In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification.
Information Security using Cryptography and Image Processingijsrd.com
Meaning of Information security is protecting information and the systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. Therefore it is necessary to apply effective encryption/decryption methods to achieve data security. The user only needs to remember the short password to retrieve the key. The password can be forgotten and stolen. As Biometrics based authentication systems confirm an individual's identity based on the physiological and/or behavioral characteristics of the individual. It has advantages over password based methods. Biometrics based method provides direct link between the service and actual user. With biometrics, there is nothing to lose or forget, and it is relatively difficult to manipulate. Biometrics and cryptography are the two most prominent solutions for user authentication, data integrity preservation, and trustworthy verification. By combining biometrics with cryptography, high level of security can be achieved.
IRIS Recognition Based Authentication System In ATMIJTET Journal
Security and Authentication of individuals is necessary for our daily lives especially in ATMs. It has been improved by using biometric verification techniques like face recognition, fingerprints, voice and other traits, comparing these existing traits, there is still need for considerable computer vision. Iris recognition is a particular type of biometric system that can be used to reliably identify a person uniquely by analyzing the patterns found in the iris. Initially Iris images are collected as datasets and maintained in agent memory. Then the Iris and pupil are detected from the image, removing noises. The features of the iris were encoded by convolving the normalized iris region with 2DGabor filter. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Prospective Evaluation of Intra operative Nucleus 22-channel cochlear implant...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Time Dependent Quadratic Demand Inventory Models when Delay in Payments is Ac...IJMER
An EOQ model is constructed for deteriorating items with time dependent quadratic demand rate. It is assumed that the deterioration rate is constant and the supplier offers his retailer the credit period to settle the account of the procurement units. To solve the model it is further assumed that shortages are not allowed and the replenishment rate is instantaneous. We have presented the models under two different scenarios, viz., (i)the offered credit period is less than or equal to the cycle time and (ii) the offered credit period by the supplier to the retailer for settling the account is greater than cycle time. The objective is to minimize the retailers total inventory cost. Salvage value is also taken to see its effect on the total cost. A numerical example is given to study the effect of allowable credit period and the total cost of the retailer.
A survey on Inverse ECG (electrocardiogram) based approachesIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...IJMER
Abstract: The major problem associated with the use of rock aggregates in engineering construction, is the difficulty of
predicting their probable field performance. This is mainly due to the inadequate understanding of the decisive factors that
control their engineering behavior. The mineralogy and fabric of the Miango granite porphyry was studied to assess their
influence on engineering properties. The uniaxial compressive strength and aggregate crushing values show that the rocks are
weak while other tests such as aggregate impact strength, water absorption, and absorption under saturation, soundness and
specific gravity values are fairly good. However, thin section studies revealed three distinctive features which greatly influence
the physico-mechanical properties: (a) abundant fractures of varying sizes (b) Sericitization of the orthoclase and or plagioclase
feldspars (c) intergrowth of quartz and or orthoclase feldspars. The quartz grains shows extensive cracking which further reduces
their mechanical strength. The strength loss of the granite porphyry could be attributed to the presence of the fractures on the
quartz grains and the sericitization of the orthoclase and plagioclase feldspars. Geotechnical characterization of the rocks shows
that they can be utilized as roadstone or could be polished and used as facing stones because of their non disintegration to
sulphate attack and the large feldspar phenocrysts in the rock.
Key Words: Aggregate Impact Value Tests; Aggregate Crushing Value; Water Absorption; Crushing Load
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...IJMER
The micro air bubbles in concrete mix act as fine aggregates which lead to reduction of the
aggregates. The reduction of fine aggregates will cause reduction of water required for concrete mix
without impairing the strength of concrete mix. This reduction has to be considered in designing an air
entrained concrete mix. Theoretical (equations) and experimental study have been carried out to study the
effect of air entrainment on compressive strength, density and ingredients of fresh concrete mix. During
all the study, water cement ratio (w/c) was maintained constant at 0.5 to study the affection of air
entrainment (a %) on concrete mix. The results have shown substantial decreasing in cement, water,
aggregates and concrete density followed with decreasing in compressive strength of concrete. The results
of this study has given more promising to use it as a guide for concrete mix design to choose the most
appropriate concrete mix design economically.
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric community's interest, motivating them to develop anti-spoofing techniques to secure it. Photo, video, or mask attacks can compromise face biometric systems (types of presentation attacks). Spoofing attacks are detected using liveness detection techniques, which determine whether the facial image presented at a biometric system is a live face or a fake version of it. We discuss the classification of face anti-spoofing techniques in this paper. Anti-spoofing techniques are divided into two categories: hardware and software methods. Hardware-based techniques are summarized briefly. A comprehensive study on software-based countermeasures for presentation attacks is discussed, which are further divided into static and dynamic methods. We cited a few publicly available presentation attack datasets and calculated a few metrics to demonstrate the value of anti-spoofing techniques.
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
What Is Biometric Authentication? A Complete Overview | Enterprise WiredEnterprise Wired
This article explores the intricacies of biometric authentication, its diverse applications, the underlying technologies, and the potential it holds in revolutionizing the landscape of digital security.
Similar to Feature Level Fusion of Multibiometric Cryptosystem in Distributed System (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
The present day technology demands eco-friendly developments. In this era the
composite material are playing a vital roal in different field of Engineering .The composite materials
are using as a principle materials. Nowaday the composite materials are utilizing as a important
component of engineering field .Where as the importance of the applications of composites is well
known, but thrust on the use of natural fibres in it for reinforcement has been given priority for some
times. But changing from synthetic fibres to natural fibres provides only half green-composites. A
partial green composite will be achieved if the matrix component is also eco-friendly. Keeping this in
view, a detailed literature surveyed has been carried out through various issues of the Journals
related to this field. The material systems used are sunnhemp fibres. Some epoxy and hardener has
been also added for stability and drying of the bio-composites. Various graphs and bar-charts are
super-imposed on each other for comparison among themselves and Graphs is plotted on MAT LAB
and ORIGIN 6.0 software. To determining tensile strengths, Various properties for different biocomposites
have been compared among themselves. Comparison of the behaviour of bio-composites of
this work has been also compare with other works. The bio-composites developed in this work are
likely to get applications in fall ceilings, partitions, bio-degradable packagings, automotive interiors,
sports things (e.g. rackets, nets, etc.), toys etc.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
The proposal of this paper is to present Spring Framework which is widely used in
developing enterprise applications. Considering the current state where applications are developed using
the EJB model, Spring Framework assert that ordinary java beans(POJO) can be utilize with minimal
modifications. This modular framework can be used to develop the application faster and can reduce
complexity. This paper will highlight the design overview of Spring Framework along with its features that
have made the framework useful. The integration of multiple frameworks for an E-commerce system has
also been addressed in this paper. This paper also proposes structure for a website based on integration of
Spring, Hibernate and Struts Framework.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
In this paper we introduce and characterize some new generalized locally closed sets
known as
δ
ˆ
s-locally closed sets and spaces are known as
δ
ˆ
s-normal space and
δ
ˆ
s-connected space and
discussed some of their properties
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
"Natural language processing" here refers to the use and ability of systems to process
sentences in a natural language such as English, rather than in a specialized artificial computer
language such as C++. The systems of real interest here are digital computers of the type we think of as
personal computers and mainframes. Of course humans can process natural languages, but for us the
question is whether digital computers can or ever will process natural languages. We have tried to
explore in depth and break down the types of ambiguities persistent throughout the natural languages
and provide an answer to the question “How it affects the machine translation process and thereby
machine learning as whole?” .
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
The focus of this paper is on implementation of Inter Integrated Circuit (I2C) protocol
following slave module for no data loss. In this paper, the principle and the operation of I2C bus protocol
will be introduced. It follows the I2C specification to provide device addressing, read/write operation and
an acknowledgement. The programmable nature of device provide users with the flexibility of configuring
the I2C slave device to any legal slave address to avoid the slave address collision on an I2C bus with
multiple slave devices. This paper demonstrates how I2C Master controller transmits and receives data to
and from the Slave with proper synchronization.
The module is designed in Verilog and simulated in ModelSim. The design is also synthesized in Xilinx
XST 14.1. This module acts as a slave for the microprocessor which can be customized for no data loss.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645
Feature Level Fusion of Multibiometric Cryptosystem in Distributed
System
N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini3
1, 2, 3
Department of Information Technology, SNS College of Technology, INDIA.
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
I. INTRODUCTION
The term “biometrics” is derived from the Greek words “Bio” (life) and “Metrics”(to measure). Biometrics refers to
the physiological or behavioural characteristics of a person to authenticate his/her identity [1] [2]. Biometric system is
essentially a pattern recognition system that recognizes a person by determining the authenticity of a specific physiological
or/and behavioural characteristics possessed by the person. Physiological biometrics also known as physical biometrics or
static biometrics is based on data derived from the measurement of a part of an individual’s anatomy. It includes fingerprint
recognition, Iris scan, Retina scan, Hand Geometry; Palm print, Face recognition, DNA and Vascular Pattern Recognition.
Among all fingerprint recognition is the olden technology.
Behavioural biometrics also known as dynamic biometrics is based on data derived from measurements of an action
performed by an individual and distinctively incorporating time as a metric; the measures action has a beginning, middle and
end. It includes Signature, Keystroke, Handwriting, Voice recognition and Gait. Soft biometrics is a human characteristic
that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate
any two individuals. Examples of soft biometrics include scars, marks and tattoos, color of sys and hair color [3]. Trustable
authentication plays an important role in secure communication systems. Traditionally, passwords (knowledge-based
security) and smartcards (token-based security) are used as the first step towards identity proof in the system. However,
security can be breached since dynamic passwords are easily divulged and guessed by means of social engineering or by
dictionary attacks. Token-based authentication may in pat compensate the limitation of knowledge-based authentication;
however, it is not reliable and easily stolen. If passwords and smartcards are shared or stolen form of an individual
authentication based on the certain physiological or behavioural traits associated with the individual, overcomes the
disadvantages of passwords and smartcards, but it is known that the sensed single biometric data is always noisy and
distorted.
Multibiometrics overcomes the limitations imposed by unimodal biometrics by using multiple biometric modalities [4].
These systems are expected to be more reliable due to the presence of multiple, fairly independent pieces of evidence.
Multibiometric systems address the problem of non-universality and provide anti-spoofing measures by making it difficult
for an intruder to simultaneously spoof the multiple biometric traits of a legitimate user. The variety of factors should be
considered when designing a multibiometric system. These include the choice and number of biometric traits; the level in the
biometric system at which information provided by multiple traits should be integrated.
II. PROBLEM DEFINITION
If an attacker can hack into a biometric database, he can easily obtain the stored biometric information of a user.
Biometric information can be used to gain unauthorized access to the system by either reverse engineering the template to
create a physical spoof or replaying the stolen template. Biometric template information for unintended purposes (e.g.,
covertly track a user across different applications by cross-matching the templates from the associated databases) leading to
violation of user privacy. The challenge in designing a biometric template protection scheme [15] is to overcome the large
intra user variability among multiple acquisitions of the same biometric trait.
III. LITERATURE SURVEY
The earlier work in the fingerprint recognition was done by Moses and Ignatius [16]. They have used the fingerprint
recognition in ATM for security purpose. Minutiae based technique was introduced by Jain et.al [17] presented among
current fingerprint matching algorithms like minutiae based matching, correlation filters based matching, transform feature
based matching, graph based matching and generic algorithm based matching; minutiae based fingerprint matching is
www.ijmer.com 4643 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645
dominant. Abhishek and K.Jain provided security to the biometric template using biometric template using biometric
cryptosystem and feature level fusion is used to combine multibiometrics [5]. To overcome the cancelable biometrics, by not
storing the original template in the database is given by N.K.Ratna [6]. The biometrics authentication systems are done with
two stages of enrollment and authentication. The problems of hacking a biometric template and usage of ECC (Error
Correcting Code) and feature extraction of Iris biometrics is given by Emanuele and Chiara [7].Multibiometrics can be
applied to distributed system using biometric cryptosystem is given by Manish et.Al [18].
IV. ENROLLMENT AND VERIFICATION OF UNIMODAL BIOMETRICS
Unimodal biometrics makes use of single source of biometrics for personal identification. The biometrics which is
taken under consideration is fingerprint biometrics [14]. The biometric system operates in two modes namely, enrollment
and authentication. The features are extracted using singular point detection and minutiae extraction. Singular point makes
use of core and delta [15] and minutiae extraction is done with ridge endings and ridge bifurcations.
In the enrollment stage, the fingerprint images were collected using optical fingerprint sensor. Once fingerprint is
acquired, next stage is to preprocess the fingerprint and to extract the feature using minutiae extraction and it is stored in the
database. In authentication stage, the fingerprint query is given which undergoes image segmentation, image binarization and
image minutiae shown in figure1, which either accepts or rejects the user’s identity by matching against an existing
fingerprint database.
1. Image Segmentation
The original image is given and the image undergoes image segmentation [13]. The fingerprint enhancement
algorithm is image segmentation. Segmentation is the process of partitioning a digital image into multiple segments and
typically used to locate objects and boundaries in images. In segmentation only a Region of Interest (ROI) is useful to be
recognized for each fingerprint image. The image area without effective ridges and furrows is first discarded since it only
holds background information.
2. Image Binarization
After performing segmentation the noisy area will be removed. In the image binarization, the gray scale image is
transformed into a binary image by computing the mean value of each 32-by-32 input block matrix and transferring the pixel
value to 1 if larger than the mean or to 0 if smaller. This improves the contrast between the ridges and valleys in a fingerprint
image and consequently facilitates the extraction of minutiae.
Fig.1 Ridge ending and bifurcation Fig.2 Fingerprint Feature Extraction
3. Image Minutiae
Most minutiae extraction algorithms operate on binary images where the black pixels that represent ridges, and the
white pixels that represent valleys. Minutiae-based fingerprint representation [11] can also assist privacy issues since one
cannot reconstruct the original image from using only minutiae information. The minutiae are relatively stable and robust to
contrast; image resolutions and global distortion are compared to other fingerprint representations. Two fingerprint match if
their minutiae points match. Most minutiae extraction algorithms operate on binary images where the black pixels that
represent ridges, and the white pixels that represent valleys.
V. FEATURE LEVEL FUSION USING MULTIBIOMETRICS
Multibiometrics is a combination of one or more biometrics, which is taken into consideration in this paper are
fingerprint and Iris. Using feature level fusion the features are extracted separately and combined into a single biometric
feature set. Instead of storing the original template in the database, secure sketch is generated and stored in the database to
provide protection to the template [8], which is achieved by two well known biometric cryptosystem fuzzy vault and fuzzy
commitment.
The most important thing in an information fusion system is to determine the type of information that should be
consolidated by the fusion module [19]. In feature level fusion which is shown in figure 3, the data or feature set originating
from multiple sensors are first pre-processed and features are extracted separately from each sensor, form a feature vector.
These features are then concatenated to form a single new vector. Feature level fusion can use same feature extraction
algorithm or different feature extraction algorithm on different modalities whose feature has to be fused. The composite
feature vector is then used for classification process. The fingerprint features are extracted using fingerprint minutiae and iris
www.ijmer.com 4644 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645
features are extracted using binary strings. The fingerprint image will undergo processes of image segmentation, filtering of
image using Gabor filter, noise removal and image binarization to extract the fingerprint features. Likewise the iris image
will undergo processes of image segmentation, filtering of image using Gabor filter and at last the iris binary vector is
obtained is shown in figure 5.
The templates which are extracted separately are fused with the random key which is given as input using ECC and
stored in the database. In the verification stage, the fused single vector is compared with the vector which is stored in the
database and key is regenerated. If the key which is not public matches, then the user is valid or it is decided that user is
invalid.
Matching performance of a biometric system is measured with the help of false acceptance rate (FAR) and genuine
acceptance rate (GAR). The biometric cryptosystem fuzzy vault and fuzzy commitment do not generate revocable templates.
The step by step process followed to extract features from the biometrics is shown in figure 4, to achieve the goal of
providing accuracy and security is given by:
Fig.3 Feature Level Fusion
Data Acquisition – Images are collected using sensor. The optical sensors are most popular and are inexpensive.
Pre-processing - Tasks like image alignment or region of interest (ROI) identification take place in pre-processing.
Feature Extraction – To extract the features from the segmented image, resulting in a feature vector.
Feature Vector Binarization – To generate a binary string b of length T represents the feature vector. Additional
information about interval boundaries is necessary.
ECC - In the enrollment stage, an error correcting code (ECC) is applied to b, to extract a set of parity-check bits. In the
verification stage, the new binary feature vector b’ is considered as a noisy version of the enrolled one. The stored parity-
check bits are used to attempt the correction of b’.
XOR- In order to provide the system with revocable templates, this module computes bitwise exclusive OR between a
binary feature vector and a randomly generated binary string b.
Fig.4 Block Diagram for Feature Level Fusion using Multibiometric Cryptosystem
www.ijmer.com 4645 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645
a) Fingerprint Feature Extraction b) Iris Feature Extraction
Fig.5 Level By Level Feature Extraction of Fingerprint and Iris
Hash Function – When an individual is enrolled in the system, a hash function H, is applied to z= c b. The output is stored
in the system database, ensuring the privacy of b. In the verification stage, H is applied to corrected binary string z’= c b”,
so that the output can be corrected to the stored hash.
Decision – If the stored hash H(z) and H(z’) matches, then the user is successfully verified and the key will be regenerated,
which is responsible for decision making.
VI. BIOMETRIC CRYPTOSYSTEM IN DISTRIBUTED SYSTEM
In distributed system, multibiometrics is used to provide security to the system and biometric cryptosystem for
providing protection to the templates. ATM system is designed and users register their details and face image is captured and
encrypted and stored in the binary format in the database and using feature level fusion fingerprint and iris templates are
fused and stored in database. Fuzzy vault and fuzzy commitment build the biometric cryptosystem [10]. They do not
generate revocable templates. Fuzzy Commitment is a biometric system that can be used to secure biometric traits
represented in the form of binary vectors and fuzzy vault is represented in the form of point set.
1. Fuzzy Vault and Fuzzy Commitment
In fuzzy vault encoder, the biometric template will be given along with random secret key which is converted to a
polynomial degree and polynomial is evaluated in a graph. The set of points is then secured by hiding them with chaff points
[9]. The set of genuine points along with polynomial evaluations together with chaff points constitute the sketch or vault. In
fuzzy vault decoder, the biometric will be given and then by using the filter the vault points and the query are compared. If
the biometric query set is sufficiently close to many genuine points and it can be correctly identified and polynomial is
reconstructed successfully and key is generated which is used for validity check. In multibiometric vault the feature level
fusion is used to combine the biometrics and then fuzzy vault scheme is addressed.
Fuzzy commitment is represented in the form of binary vectors. The binary string is divided into a number of
segments and each segment is separately secured using a fuzzy commitment scheme [12]. The keys associated with these
segment wise fuzzy commitment schemes are then used as additional points in the fuzzy vault constructed using the point-set
based features.
VII. CONCLUSION
Biometrics is not only a fascinating pattern recognition research problem but, if carefully used, could also be an
embedding technology with the potential to make our society safer, reduce fraud and lead to user convenience. The proposed
methodology presented here provides security to the distributed system and feature level fusion framework is provided.
Likewise, it cannot be guessed it out how many biometrics is used and what type of biometrics are used. As secure sketch is
generated from the template and stored in the database, the hackers cannot be able to use the template, unless and until they
know the secret key. In future, the work is to overcome the failure of biometrics, which can be addressed by using
multimodal model which gain the advantage of other biometrics in case of failure of one biometrics.
www.ijmer.com 4646 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645
REFERENCES
[1] A.Ross , K.Nandakumar and A.K. Jain, “Handbook of Multibiometrics”, New York: Springer,2006.
[2] Jain A.K, Ross A. and Prabhakar S, IEEE Transactions on Circuits and Systems for Video Technology,14, 4-20, 2009.
[3] Jain A.K, Dass SC and Nandakumar K, “Soft Biometric Traits for Personal Recognition Systems”. Proc of
International Conference on Biometric Authentication, Hong Kong: 731-738, 2004.
[4] Brunelli, R., and Falavigna, D. “Person Identification Using Multiple Cues”, IEEE Trans. on Pattern Analysis and
Machine Intelligence (Oct. 1995). IEEE, NY, 955–966.
[5] Abhishek Nagar, Karthik Nandakumar and AnilK. Jain, “Multibiometric Cryptosystems Based on Feature-Level
Fusion”, IEEE transactions on information forensics and security, vol. 7, no. 1255-268, 2012
[6] N. K. Ratha, S. Chikkerur, J. H. Connell, and R.M. Bolle, “Generating Cancelable Fingerprint Templates,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561–572, Apr. 2007.
[7] Emanuele Maiorana, Chiara Ercole, “Secure Biometric Authentication System Architecture using Error Correcting
Codes and Distributed Cryptography”, 2007.
[8] A. Jain, K. Nandakumar, and A. Nagar, “Biometric Template Security,” EURASIP J. Adv. Signal Process., 2008.
[9] K. Nandakumar and A. K. Jain, “Multibiometric Template Security Using Fuzzy Vault,” in Proc. IEEE 2nd Int. Conf.
Biometrics: Theory, Applications, and Systems, Washington, DC, Sep. 2008.
[10] A. Nagar, K. Nandakumar, and A. K. Jain, “Adapting Biometric Representations For Cryptosystems” Department of
Computer Science and Engineering, Michigan State University,2011.
[11] Raymond Thai, “Fingerprint Image Enhancement and Minutiae Extraction”, 2003.
[12] Juels and Wattenberg, “A Fuzzy Commitment Scheme“, in proc, 6 th ACM conf, Computer and Communication
Security, 1999.
[13] Sangram Bana and Dr.Davinder Kaur, “Fingerprint Recognition using Image Segmentation”, IJAEST, Volume no.5,
012-023, 2011.
[14] Ing. Martin Drahansky, “Biometric Security Systems Fingerprint Recognition Technology”, 2005.
[15] D. Maltoni, D. Maio, A.K.Jain and S.Prabhakar, “Handbook of Fingerprint Recognition” , Springer, Berlin,
Germany,2003.
[16] Moses Okechukwu Onyesolu and Ignatius Majesty Ezeani, “ ATM Security Using Fingerprint Biometric Identifier: An
Investigate Study”, IJACSA Vol.3,No.4,2012.
[17] Jain et.al. “On-line Fingerprint Verification”, IEEE Transactions on Pattern Analysis.
[18] Manish Manoria , Ajit Kumar, Satyendra Singh and Debu Sinha, “ Secure Biometric Cryptosystem for Distributed
System”, IJCNS, Vol 1, 2011.
[19] Mini Singh Ahuja and Sumit Chabbra, “ A Survey of Multimodal Biometrics”, IJCSA,2250-3765,2011.
www.ijmer.com 4647 | Page