SlideShare a Scribd company logo
Proceedings of IEEE International Conference on Image Processing (ICIP 2016)
September 25-28, 2016, Phoenix, Arizona
©IEEE (ICIP 2016)
4563
*Corresponding Author: dr.psjkumar@ntu.edu.sg
Fingerprint Detection and Face Recognition for
Colonization Control of Frontier Defense
P.S.Jagadeesh Kumar1
*
School of Computer Science and Engineering
Nanyang Technological University
Singapore
J.Nedumaan2
, J.Lepika3
, J.Tisa4
Malco Vidyalaya Matriculation
Higher Secondary School
Mettur Dam, Salem, Tamil Nadu, India
Abstract— The predicament of defense has been an obsession of
torment to any escalating nation. It has been branded that one
dome by which this hindrance can be scuffled is to boast a safe
border where the populace that nomadic of the nation is being
documented and properly scrutinized. In line, to skirmish the
colonization control, the manuscript consequently anticipated a
safe and sound frontier defense using dual countenance check
through Boast Cosseted (BC) scheme. The dual countenance
check exploits fingerprint detection and face recognition in the
boast cosseted scheme as adroit for detection and corroboration
of personnel inimitably. Then, indubitably the intended proposal
purges the likelihood of double registration at the frontier by the
colonizer.
Keywords—- Boast Cosseted Scheme, Dual Countenance Check,
Frontier Defense, Colonization Control, Fingerprint Detection,
Face Recognition
I. FOREWORD
Herein IT ambitious interlude, uniqueness larceny and the
slaughter or depiction of information and allied intellectual
property are growing tribulations. Each and every one has
several financial records and utilizes a number of passwords
on the growing number of system and websites. Sustaining
and supervising admittance despite the fact that shielding
together the user's individuality and the data on the record and
systems has befallen gradually trickier. Vital to all sanctuaries
is the conception of authenticated confirming that the user is
who he admits to be [1]. The quandary of the fingerprint
diploma projected by loads of the instigator is that it can by far
be flouted by the colonist. In view of the reality that only their
fingerprint is obligatory for them to be acknowledged, they
can exercise over one photograph or passport to record with
the migration official, researchers have confirmed that a few
bring into play the passport of demise citizens. This be made
once the photograph of an individual is wanted at a fraction of
the input necessities of the scheme, is integrated physically
with a camera, which give them the chance by a different
personal passport or an entity as a delineation as here is no
facial gratitude to decide it whether is right or not [2].
Moreover, here are populace with disabilities devoid of hands,
which fingerprint recognition will not labor for them as there
is no finger that can be incarcerate, to boast cosseted scheme
those natives countenance can be confined and second-hand to
recognize them. On the other hand, with the BC scheme, it
will be extremely hard for Migratory, have trodden the method
as together the fingerprint and face is mortal confined. Lack of
security is an inexorable and significant concern that wants
vital notice. The striking augment in the global gush of people,
merchandise and belief has bent a new crowd of intimidation.
At hand is widespread felony, such as smuggling, kidnapping,
rivalry, international lapse, illicit exodus, among them. It has
been renowned that the interloper, machinate a method of
whipping security policy installed in a bizarre position at the
border. The biographer afforded BC scheme, which coalesces
to advance, that is fingerprint and face recognition measures
for the practice of colonist data and substantiation at the
frontier, the thought is to perceive how the blemish of one can
composite the other. It also thrills that hard work ought to be
prepared to diminish radical behavior by the government all
the way through apposite approve and equipment constructed
in consign at the borders, i.e. gearing of the intrinsic dispute of
mixing BC proposal. Biometrics are employed for dissimilar
rationale, nevertheless, they are generally a division of either
identification or verification system. The dissimilarity between
these two forms of method can craft a divergence in how
rapidly the method maneuvers and how precise it is as the
volume of a biometric record augments. Corroboration system
inquires to reply the query ―Subsist an individual who they
articulate they are?‖ Underneath a certification method, a
personage in crowd presents himself or herself as an
unambiguous one [3]. The structure ensures ones biometric
along a biometric silhouette that before now subsist in the
record tied to that individual‘s dossier in order to learn an
equivalent. Verification schemes are usually depicted as a one-
to-one toning scheme since the system attempts to bout the
biometric obtained by the person beside an exact biometric
previously on sleeve. In view of the fact that verification
arrangement barely requires to contrast the existing biometric
to a biometric allusion hoarded in the classification, they can
engender consequences further rapidly and are more precise
than identification structures, still when the size of the catalog
enhances. Identification methods are unalike from verification
methods for an identification system seeks to identify an
unfamiliar person, or indefinite biometric. The method strives
to respond the inquiry ―Who is this human being?‖ or ―Who
Proceedings of IEEE International Conference on Image Processing (ICIP 2016)
September 25-28, 2016, Phoenix, Arizona
©IEEE (ICIP 2016) 4564
engender this biometric?‖ and have to ensure the biometric
offered beside all others by now on the record. Identification
method is portrayed as a one-to-n identical arrangement,
where n is the entire amount of biometrics in the record.
Forensic records, where a government deeds to distinguish an
underhanded stamp or DNA not needed at a transgression
panorama, habitually maneuver as identification methods.
This paper also checks the parameters of both the fingerprint
and face recognition loom for the progression of identification
and verification inured in seeing how both ways can
harmonize every other‘s in a boundary [4].
II. PROSE APPRAISAL
The scheme strives to stumble on an elucidation to troubles
that are how simple it is to hoodwink the method. This turn
into being momentous as the worth of data breed hasty [5]. It
confers an occasion to be prepared for two types of assails;
(a) Solitude attack when the assailant right to use the
information to which he is not authoritative.
(b) Seditious attack when the invader takes delivery of an
event to maneuver the method.
The archaic drawn on biometric support is fingerprinting.
Thumbprints prepared on clay seals are worded as resources of
distinctive identification as a distant flip side in olden China.
The current biometric affirmation has turned out to be nearly
instant, and is steadily more precise with the initiation of
mechanized record and digitization of analog data. Sebastian
predicted a bi-modal validation display method that replicates
the login of a consumer through its face and its voice [6]. This
expression is called BioLogin. The request rush mutually for
Linux and Windows; the Windows edition is freely accessible
for download. BioLogin is grasped by way of an open source
machine acquaintance annals and its machine hallucination
package [7]. In concert, the face and the speaker verification
methods are based on Gaussian Mixture Models.
Single countenance checks have to emphasize with divers
tribulations such as raucous statistics, intra-class discrepancy,
constrained extent of liberty, spoof assail, and intolerable fault
rates. Preferred of these precincts can be tackled by means of
multimodal method that incorporate the indication offered by
manifold sources of data. Mojtaba, Cristinel and Wamadeva in
2010 argued the different conditions that are probable in
multimodal methods, the echelons of fusion that are plausible
and the assimilation tactics that can be espoused to secure
data. They offered numerous instances of multimodal methods
that have been portrayed in their prose. Le Hoang, Ha Nhat in
2010 projected two-in-one convenient, low price digital signal
processing microcontroller based method for instantaneous
handwritten signature proof and face credit. The method has
two 640 x 480 pixel color cameras, one for face imprisons,
and the other provides handwritten signature scanner. The
facet vector extorts from the geometric silhouette and traits of
an offline signature image are dilapidated for certification. The
face appreciation algorithm is supported on the belief of
principal component analysis to decide the source vector
recognized as EigenFace. The method founded on DSC with
two digital color cameras has been urbanized for face
acknowledgment and offline signature proof. The appreciation
fallouts for face recognition and signature certification are
adequate mutually on the host PC and on the intent entrenched
scheme. They anticipated a manageable low-cost scheme that
employs iris and fingerprint to substantiate business deal
mainly in banking. The patron‘s Automated Teller Machine
card hold iris and fingerprint stencils in accumulation to the
usual pin. The built-up ATM card has the analogous echelon
of its data relaxed defense as the offered ATM cards. Towards
supplying utmost protection, both the iris and fingerprint have
to be legitimate for any deal to scale all the way through. A
low down cost, convenient certification system supported on
both iris and fingerprint has been residing.
Omaima Allaf in 2014 intended and urbanized the two
modal biometrics arrangement that is very proficient not only
for authenticating people distinctively but also for eradicating
any leeway of two time registration. The anticipated structure
comprises what is identified in diligence as Automatic
Biometrics Identification System. Rabia Jafri, Hamid in 2009
employed the face and voice natures of a person from
exposure. HyperBF arrangement is used to combine the
control achieved by five different classifiers serving on the
voice and face feature sets. Ming Hsuan Yang in 2002
expanded an algebraic skeleton stranded on Bayesian statistics
to incorporate the speech and face information of a customer.
The document projected a system they will recognize and
validate persons distinctively and also eliminating any
likelihood of double registration.
III. BOAST COSSESTED SCHEME
A. Conscription of the BC Scheme
The Colonist is built-in to the biometric method. A firm
number of biometric dramatization of a meticulous client is
obtained, preprocessed, malformed into traits, and post
processed, after that used to guide a consumer replica and
adjust if required. The user sculpts beside charlatan donation
may be second-hand to attain a door-sill for that consumer.
The new replica is then hoarded, down the porch for that
consumer if wanted.
B. Fingerprint Aspect Mining
Fractious integer looms was engaged as it was the majorly
used technique of trivia aspect mining. This process digs out
the crest finales and divergences from the outline picture. The
trivia aspects are mined by inspecting the confined locality of
every crest pixel in the icon by a 3x3 casement. The fractious
integer worth is then calculated, which is distinct as partly the
total of the distinctions amid duo of contiguous pixels. Face
detection aspect mining is similar to the Fingerprint aspect
mining, but executes reason, linked to removal of face stencils
from face pictures incarcerated by means of cameras.
Proceedings of IEEE International Conference on Image Processing (ICIP 2016)
September 25-28, 2016, Phoenix, Arizona
©IEEE (ICIP 2016) 4565
C. Fingerprint Pattern Testing
For proficient testing process, the mined statistics is hoard
in the matrix arrangement. During the matching process, each
input minutiae point is compared with template minutiae point
considering the above properties. In each case, template and
input minutiae are selected as reference points for their
respective data sets. The reference points are used to convert
the remaining data points to polar coordinates.
D. Face Identification Testing
Finding eigenvalues and analogous eigenvectors of matrix
M x N is computationally intractable even for a reticent size
image. Therefore, will again acquire J eigenvalues and related
J eigenvectors of extent J. These eigenvectors are akin to the
face imagery that's why they are termed as eigenfaces. Every
eigenface has anecdotal implication varying on the enormity
of its eigenvalue. Consequently, it is liberal to opt for a rift J‘
of the J eigenfaces equivalent to J‘ peak valued eigenvalues as
describing the complete guidance face images. This condensed
rift eigenfaces are amassed, beside to the mean face. Compute
power vectors by prognostic training face images onto the
hoarded eigenfaces. The input of a hoarded eigenface to a zero
mean guidance face image can be intended as a scalar power.
Consequently, a power vector of length J‘ whose rudiments
symbolize the degree of contribution of the parallel eigenface
to that zero mean picture is acquired.
IV. DUAL COUNTENANCE CHECK
A. Apex of synthesis
A standard biometric scheme has four significant elements:
(a) The antenna element which confines the characteristic
in the sort of unprocessed biometric facts.
(b) The aspect mining component which practices the data
to wrest a facet set that is a condensed depiction of the
quality.
(c) The identical elements which use a classifier to contrast
the extort facet set with the stencil dwells in the
testimony to reason similar counts.
(d) The choice system which exploits the identical counts
to moreover authorize an alleged person.
In multiple-level biometric system data ceasefire can crop
up in several of the aforesaid elements. The concluding output
of manifold classifiers is strengthened through the scheme;
(a) Synthesis at the information or aspect stage:
The information itself or the facet sets instigated from
multiple antennas/causes are amalgamated.
(b) Synthesis at the bout count stage:
The counts spawned by several classifiers distressing to
diverse modalities are shared.
(c) Synthesis at the choice stage:
The choice stage, which develops the matching reckons
to additionally empower a supposed facade as shown in
Figure 1 to identify the rationale.
B. Methods of Procedure
A multiple-level scheme can labor within the least, one of
three particular modes explicitly:
(i) Sequential approach
In the sequential approach, the yield of one modality is
usually utilized to trim along the numeral of probable identity
prior to ensuing modality is tattered. Consequently, multiple
sources of information do not have to be attained immediately.
Auxiliary, a choice might be prepared prior to obtaining all the
features. This can lessen the general detection, instant.
(ii) Analogous approach
In the analogous approach, the information from many
modalities is second hand instantly in-turn to accomplish
identification.
(iii) Layered approach
In the layered approach, entity classifiers are pooled in a
branch wise arrangement. This approach is pertinent when the
amount of classifiers is outsized. The method uses the layered
approach since the quantity of claimant is very huge whilst
discussing about colonist who will be scheduled in the
boundary. It is significant to remind that the three approaches
pull off as soon as the moment dements on the amount of
multiple traits and number of classifiers.
C. Choice Blending System
The choice blending system is purely predestined on the
two identical overheads. Therefore, for identifying rationale;
cataloging the dual countenance check must contain a yield of
identification as rationale or else the concluding outcome is
not standard.
V. IMPLEMENTATION
The dual countenance check using boast cosseted scheme
has been put into practice by Matlab Simulink environment for
face identification as made known in Figure 2. Verifinger/
Megamatcher algorithm was engaged for fingerprint detection
as exposed in Figure 3 and 4. The elucidation is currently
pedestal on the subsequent discrete components.
A. Conscription Procedure
Prior to a migrant being acknowledged or confirmed by a
biometric device, the conscription procedure must be finished.
The put forward of this conscription procedure is to fashion a
rundown silhouette of the colonist. The progression consists of
the minutiae, which encompass as listed;
(a) A biological statistics confine module that incarcerates
person's name, date of birth, address, and place, etc.
which take alphabetic typescript.
(b) Nationality of the migrant take alphabetic and string
typeset, date of birth takes string nature and the date of
colonist register seizes string nature too.
(c) The place information is bottomed on Nationality, State
in which the migrant is imminent as of, and Continent
of the colonist.
Proceedings of IEEE International Conference on Image Processing (ICIP 2016)
September 25-28, 2016, Phoenix, Arizona
©IEEE (ICIP 2016) 4566
The biological statistics confine module that sends down
fingerprints and face descriptions of a registered. Face and
Fingerprints must be detained for every register ahead of
mustering can proceed far afield biological statistics confine
module. Fingerprint testing is ascetically obligatory in the
biological statistics confine module.
The mustering of a register ceases this fragment; if his
information is previously in the record or else listing carry on
to the biological statistics confine module. The elucidation is
put into operation have dynamic, revealing utility to make sure
that the coordination retort only if it sense that a vibrant
register is certainly there at the spot of data possession.
B. Conscription Hoarding
The record has all the particulars of the populace about
who has been enrolled and chucks them with the passport
credential. Whilst there is obliged to inspect enrollee‘s
minutiae or formulate atonement this can by far be made as
the passport naming integer preserve second-hand to delineate
personage‘s niceties and it creates the procedure of
verification lighter and quicker as it salt away era.
In this script, together the fingerprint and face appreciation
algorithms are mutual, such that the inadequacy of one is
accomplished by the other. Consequently, the procedure of
authentication is made by inflating the enrollee‘s passport
naming integer and the enrollee is solicited to surpass the
substantiation practice by the inclusion of their finger on the
scanner and as well the face of the individual is being
employed to authenticate. This is incarcerated and the
commissioner, judge against the dynamic fingerprint confined
and face detained with the one on the record, for verification
rationale.
Both looms calculate its testing count and the presage of
the count from the two advances is evaluated with the
conventional threshold count. If the resulting count from the
testing is better than the threshold count, the system exhibits
―Authenticated‖, and the enrollee‘s passport is put on a show
to prove that the enrollee is truly the individual alleges to be.
But if the ensuing count is less than the conventional
threshold, the system disregards it and displays ―Counterfeit‖.
C. Authentication Stage
This is the stage where the migrants are confirmed to make
persuaded that they are who, they beyond doubt assert to be
across the border. The migrants are impelled to contribute
their fingerprint and face appreciation; it is afterward located
on the fingerprint scanner and face recognition camera. Once
done, then they are evaluated with the one amass in the record
with the assist of fingerprint and face detection algorithms and
the system figures the mean count of the outcome.
CULMINATION
An embryonic fortification fascia in colonization control of
coercion and brutality corporeal on the trudge elevation, delve
through it is notorious that detrimental doing and mayhem are
being relegated by interlopers as a corollary of acquiescent
frontier. In contemplation, Boast Cosseted Scheme rummage
around for wearisome to glimpse how these perform can be
abridged to the slightest, if not completely exterminated. This
manuscript has probed a loom baptized as Dual Countenance
Check; blending fingerprint and face detection to engrave the
records of illegitimate colonist inflating a frontier devoid of
legal credentials, and by means of some devious manners to
the flight being wedged by the contraption that has been laid
down. This is accomplished by endowing a consistent mining
and testing procedure through a mish-mashing of the
fingerprint and face appreciation practices.
The central inspiration in the wake of this is that solitary
method crafts for the deficit of the other, thereby fetching
about a consistent and competent effect. It grants a further
tenable milieu where colonist will not be intellect to wallop
the design with their counterfeit diplomacy if the BC Scheme
draws on in frontier defense.
ACKNOWLEDGMENT
It is our supreme gratification in conceding the board and
the supervision of NTU, Singapore and London Metropolitan
University, England in elevating this libretto. We bestow this
article to the fatalities of Paris Attack on 13th
day of November
2015 and plead for their soul to reprieve in serenity.
REFERENCES
[1] Mojtaba, Cristinel, Wamadeva, ―Vitality Detection in Fingerprint
Identification,‖ WSEAS Transactions on Information Science and
Applications, Volume 7, Issue 4, April 2010, pp. 498–507.
[2] Le Hoang Thai, Ha Nhat, ―Fingerprint Recognition Using Standardized
Fingerprint Model‖, International Journal of Computer Science Issues,
Vol. 7, Issue 3, No 7, May 2010, pp.11–17.
[3] Raffaele Cappelli, Alessandra Lumini, Dario Maio, ―Fingerprint Image
Reconstruction from Standard Templates,‖ IEEE Transaction on Pattern
Analysis and Machine Intelligence, Vol. 29, No. 9, September 2007, pp.
1489-1503.
[4] Rabia Jafri, Hamid, ―A Survey of Face Recognition Technique,‖ Journal
of Information Processing Systems, Vol.5, No.2, June 2009, pp.41-66.
[5] Omaima Allaf, ―Review of Face Detection Systems based Artificial
Neural Networks Algorithms,‖ The International Journal of Multimedia
& its Applications, Vol.6, No.1, February ‗2014. pp.1-16.
[6] Faizan Ahmad, Aaima Najam and Zeeshan Ahmed, ―Image-based Face
Detection and Recognition: State of the Art,‖ International Journal of
Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012, pp.
169–172.
[7] Ming-Hsuan Yang, ―Detecting Faces in Images: A Survey‖, IEEE
Transactions on Pattern Analysis and Machine Intelligence, Vol. 24,
No.1, January 2002, pp.34-57.
Proceedings of IEEE International Conference on Image Processing (ICIP 2016)
September 25-28, 2016, Phoenix, Arizona
©IEEE (ICIP 2016) 4567
Fingerprint
Pattern
Cohort
Fingerprint
Testing
Pre-
Processing
Aspect
Mining
Doubt
Finger
Sensor
Face
Pattern
Cohort
Face
Testing
Pre-
Processing
Aspect
Mining
Guide
Doubt
Face
Camera
Rationale
Choice
Blending
System
Figure 1. Boast Cosseted Scheme with Dual Countenance Check for Colonization Control
Figure 2. Face Identification using BC Scheme
Proceedings of IEEE International Conference on Image Processing (ICIP 2016)
September 25-28, 2016, Phoenix, Arizona
©IEEE (ICIP 2016) 4568
Figure 3. Fingerprint Aspect Mining using BC Scheme
Figure 4. Fingerprint Pattern Testing using BC Scheme

More Related Content

What's hot

HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
ijtsrd
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
IJNSA Journal
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security Techniques
IJCSIS Research Publications
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET Journal
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
kanchannawkar
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
International Center for Biometric Research
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
 

What's hot (10)

HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security Techniques
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security Enhancement
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in Kenya
 

Similar to Fingerprint detection and face recognition for colonization control of frontier defense

Biometrics
BiometricsBiometrics
Biometrics
N/A
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
Vivek Soni
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Arhind Gautam
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
ijait
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
Jennifer York
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Jigisha Aryya
 
biometrics.ppt
biometrics.pptbiometrics.ppt
biometrics.ppt
SarojKumar864774
 
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
ijcisjournal
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
desire120
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
vargas2011.pdf
vargas2011.pdfvargas2011.pdf
vargas2011.pdf
HouBou3
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
IAESIJAI
 

Similar to Fingerprint detection and face recognition for colonization control of frontier defense (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
biometrics.ppt
biometrics.pptbiometrics.ppt
biometrics.ppt
 
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
 
H029044050
H029044050H029044050
H029044050
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
vargas2011.pdf
vargas2011.pdfvargas2011.pdf
vargas2011.pdf
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 

More from DR.P.S.JAGADEESH KUMAR

Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...
DR.P.S.JAGADEESH KUMAR
 
Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...
Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...
Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...
DR.P.S.JAGADEESH KUMAR
 
Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...
Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...
Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...
DR.P.S.JAGADEESH KUMAR
 
Optical Picbots as a Medicament for Leukemia
Optical Picbots as a Medicament for LeukemiaOptical Picbots as a Medicament for Leukemia
Optical Picbots as a Medicament for Leukemia
DR.P.S.JAGADEESH KUMAR
 
Integrating Medical Robots for Brain Surgical Applications
Integrating Medical Robots for Brain Surgical ApplicationsIntegrating Medical Robots for Brain Surgical Applications
Integrating Medical Robots for Brain Surgical Applications
DR.P.S.JAGADEESH KUMAR
 
Automatic Speech Recognition and Machine Learning for Robotic Arm in Surgery
Automatic Speech Recognition and Machine Learning for Robotic Arm in SurgeryAutomatic Speech Recognition and Machine Learning for Robotic Arm in Surgery
Automatic Speech Recognition and Machine Learning for Robotic Arm in Surgery
DR.P.S.JAGADEESH KUMAR
 
Continuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet TransformContinuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet Transform
DR.P.S.JAGADEESH KUMAR
 
A Theoretical Perception of Gravity from the Quantum to the Relativity
A Theoretical Perception of Gravity from the Quantum to the RelativityA Theoretical Perception of Gravity from the Quantum to the Relativity
A Theoretical Perception of Gravity from the Quantum to the Relativity
DR.P.S.JAGADEESH KUMAR
 
Advanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical ApplicationsAdvanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical Applications
DR.P.S.JAGADEESH KUMAR
 
Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...
Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...
Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...
DR.P.S.JAGADEESH KUMAR
 
Intelligent Detection of Glaucoma Using Ballistic Optical Imaging
Intelligent Detection of Glaucoma Using Ballistic Optical ImagingIntelligent Detection of Glaucoma Using Ballistic Optical Imaging
Intelligent Detection of Glaucoma Using Ballistic Optical Imaging
DR.P.S.JAGADEESH KUMAR
 
Robotic Simulation of Human Brain Using Convolutional Deep Belief Networks
Robotic Simulation of Human Brain Using Convolutional Deep Belief NetworksRobotic Simulation of Human Brain Using Convolutional Deep Belief Networks
Robotic Simulation of Human Brain Using Convolutional Deep Belief Networks
DR.P.S.JAGADEESH KUMAR
 
Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...
DR.P.S.JAGADEESH KUMAR
 
Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...
Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...
Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...
DR.P.S.JAGADEESH KUMAR
 
Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...
Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...
Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...
DR.P.S.JAGADEESH KUMAR
 
Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...
Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...
Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...
DR.P.S.JAGADEESH KUMAR
 
Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...
Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...
Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...
DR.P.S.JAGADEESH KUMAR
 
Machine Learning based Retinal Therapeutic for Glaucoma
Machine Learning based Retinal Therapeutic for GlaucomaMachine Learning based Retinal Therapeutic for Glaucoma
Machine Learning based Retinal Therapeutic for Glaucoma
DR.P.S.JAGADEESH KUMAR
 
New Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsNew Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking Applications
DR.P.S.JAGADEESH KUMAR
 
Accepting the Challenges in Devising Video Game Leeway and Contrivance
Accepting the Challenges in Devising Video Game Leeway and ContrivanceAccepting the Challenges in Devising Video Game Leeway and Contrivance
Accepting the Challenges in Devising Video Game Leeway and Contrivance
DR.P.S.JAGADEESH KUMAR
 

More from DR.P.S.JAGADEESH KUMAR (20)

Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Particle Swa...
 
Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...
Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...
Bi-directional Recurrent Neural Networks in Classifying Dementia, Alzheimer’s...
 
Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...
Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...
Promise and Risks Tangled in Hybrid Wavelet Medical Image Fusion Using Firefl...
 
Optical Picbots as a Medicament for Leukemia
Optical Picbots as a Medicament for LeukemiaOptical Picbots as a Medicament for Leukemia
Optical Picbots as a Medicament for Leukemia
 
Integrating Medical Robots for Brain Surgical Applications
Integrating Medical Robots for Brain Surgical ApplicationsIntegrating Medical Robots for Brain Surgical Applications
Integrating Medical Robots for Brain Surgical Applications
 
Automatic Speech Recognition and Machine Learning for Robotic Arm in Surgery
Automatic Speech Recognition and Machine Learning for Robotic Arm in SurgeryAutomatic Speech Recognition and Machine Learning for Robotic Arm in Surgery
Automatic Speech Recognition and Machine Learning for Robotic Arm in Surgery
 
Continuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet TransformContinuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet Transform
 
A Theoretical Perception of Gravity from the Quantum to the Relativity
A Theoretical Perception of Gravity from the Quantum to the RelativityA Theoretical Perception of Gravity from the Quantum to the Relativity
A Theoretical Perception of Gravity from the Quantum to the Relativity
 
Advanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical ApplicationsAdvanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical Applications
 
Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...
Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...
Pragmatic Realities on Brain Imaging Techniques and Image Fusion for Alzheime...
 
Intelligent Detection of Glaucoma Using Ballistic Optical Imaging
Intelligent Detection of Glaucoma Using Ballistic Optical ImagingIntelligent Detection of Glaucoma Using Ballistic Optical Imaging
Intelligent Detection of Glaucoma Using Ballistic Optical Imaging
 
Robotic Simulation of Human Brain Using Convolutional Deep Belief Networks
Robotic Simulation of Human Brain Using Convolutional Deep Belief NetworksRobotic Simulation of Human Brain Using Convolutional Deep Belief Networks
Robotic Simulation of Human Brain Using Convolutional Deep Belief Networks
 
Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...
Panchromatic and Multispectral Remote Sensing Image Fusion Using Machine Lear...
 
Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...
Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...
Classification and Evaluation of Macular Edema, Glaucoma and Alzheimer’s Dise...
 
Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...
Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...
Multilayer Perceptron Neural Network Based Immersive VR System for Cognitive ...
 
Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...
Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...
Computer Aided Therapeutic of Alzheimer’s Disease Eulogizing Pattern Classifi...
 
Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...
Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...
Congenital Bucolic and Farming Region Taxonomy Using Neural Networks for Remo...
 
Machine Learning based Retinal Therapeutic for Glaucoma
Machine Learning based Retinal Therapeutic for GlaucomaMachine Learning based Retinal Therapeutic for Glaucoma
Machine Learning based Retinal Therapeutic for Glaucoma
 
New Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsNew Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking Applications
 
Accepting the Challenges in Devising Video Game Leeway and Contrivance
Accepting the Challenges in Devising Video Game Leeway and ContrivanceAccepting the Challenges in Devising Video Game Leeway and Contrivance
Accepting the Challenges in Devising Video Game Leeway and Contrivance
 

Recently uploaded

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 

Recently uploaded (20)

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 

Fingerprint detection and face recognition for colonization control of frontier defense

  • 1. Proceedings of IEEE International Conference on Image Processing (ICIP 2016) September 25-28, 2016, Phoenix, Arizona ©IEEE (ICIP 2016) 4563 *Corresponding Author: dr.psjkumar@ntu.edu.sg Fingerprint Detection and Face Recognition for Colonization Control of Frontier Defense P.S.Jagadeesh Kumar1 * School of Computer Science and Engineering Nanyang Technological University Singapore J.Nedumaan2 , J.Lepika3 , J.Tisa4 Malco Vidyalaya Matriculation Higher Secondary School Mettur Dam, Salem, Tamil Nadu, India Abstract— The predicament of defense has been an obsession of torment to any escalating nation. It has been branded that one dome by which this hindrance can be scuffled is to boast a safe border where the populace that nomadic of the nation is being documented and properly scrutinized. In line, to skirmish the colonization control, the manuscript consequently anticipated a safe and sound frontier defense using dual countenance check through Boast Cosseted (BC) scheme. The dual countenance check exploits fingerprint detection and face recognition in the boast cosseted scheme as adroit for detection and corroboration of personnel inimitably. Then, indubitably the intended proposal purges the likelihood of double registration at the frontier by the colonizer. Keywords—- Boast Cosseted Scheme, Dual Countenance Check, Frontier Defense, Colonization Control, Fingerprint Detection, Face Recognition I. FOREWORD Herein IT ambitious interlude, uniqueness larceny and the slaughter or depiction of information and allied intellectual property are growing tribulations. Each and every one has several financial records and utilizes a number of passwords on the growing number of system and websites. Sustaining and supervising admittance despite the fact that shielding together the user's individuality and the data on the record and systems has befallen gradually trickier. Vital to all sanctuaries is the conception of authenticated confirming that the user is who he admits to be [1]. The quandary of the fingerprint diploma projected by loads of the instigator is that it can by far be flouted by the colonist. In view of the reality that only their fingerprint is obligatory for them to be acknowledged, they can exercise over one photograph or passport to record with the migration official, researchers have confirmed that a few bring into play the passport of demise citizens. This be made once the photograph of an individual is wanted at a fraction of the input necessities of the scheme, is integrated physically with a camera, which give them the chance by a different personal passport or an entity as a delineation as here is no facial gratitude to decide it whether is right or not [2]. Moreover, here are populace with disabilities devoid of hands, which fingerprint recognition will not labor for them as there is no finger that can be incarcerate, to boast cosseted scheme those natives countenance can be confined and second-hand to recognize them. On the other hand, with the BC scheme, it will be extremely hard for Migratory, have trodden the method as together the fingerprint and face is mortal confined. Lack of security is an inexorable and significant concern that wants vital notice. The striking augment in the global gush of people, merchandise and belief has bent a new crowd of intimidation. At hand is widespread felony, such as smuggling, kidnapping, rivalry, international lapse, illicit exodus, among them. It has been renowned that the interloper, machinate a method of whipping security policy installed in a bizarre position at the border. The biographer afforded BC scheme, which coalesces to advance, that is fingerprint and face recognition measures for the practice of colonist data and substantiation at the frontier, the thought is to perceive how the blemish of one can composite the other. It also thrills that hard work ought to be prepared to diminish radical behavior by the government all the way through apposite approve and equipment constructed in consign at the borders, i.e. gearing of the intrinsic dispute of mixing BC proposal. Biometrics are employed for dissimilar rationale, nevertheless, they are generally a division of either identification or verification system. The dissimilarity between these two forms of method can craft a divergence in how rapidly the method maneuvers and how precise it is as the volume of a biometric record augments. Corroboration system inquires to reply the query ―Subsist an individual who they articulate they are?‖ Underneath a certification method, a personage in crowd presents himself or herself as an unambiguous one [3]. The structure ensures ones biometric along a biometric silhouette that before now subsist in the record tied to that individual‘s dossier in order to learn an equivalent. Verification schemes are usually depicted as a one- to-one toning scheme since the system attempts to bout the biometric obtained by the person beside an exact biometric previously on sleeve. In view of the fact that verification arrangement barely requires to contrast the existing biometric to a biometric allusion hoarded in the classification, they can engender consequences further rapidly and are more precise than identification structures, still when the size of the catalog enhances. Identification methods are unalike from verification methods for an identification system seeks to identify an unfamiliar person, or indefinite biometric. The method strives to respond the inquiry ―Who is this human being?‖ or ―Who
  • 2. Proceedings of IEEE International Conference on Image Processing (ICIP 2016) September 25-28, 2016, Phoenix, Arizona ©IEEE (ICIP 2016) 4564 engender this biometric?‖ and have to ensure the biometric offered beside all others by now on the record. Identification method is portrayed as a one-to-n identical arrangement, where n is the entire amount of biometrics in the record. Forensic records, where a government deeds to distinguish an underhanded stamp or DNA not needed at a transgression panorama, habitually maneuver as identification methods. This paper also checks the parameters of both the fingerprint and face recognition loom for the progression of identification and verification inured in seeing how both ways can harmonize every other‘s in a boundary [4]. II. PROSE APPRAISAL The scheme strives to stumble on an elucidation to troubles that are how simple it is to hoodwink the method. This turn into being momentous as the worth of data breed hasty [5]. It confers an occasion to be prepared for two types of assails; (a) Solitude attack when the assailant right to use the information to which he is not authoritative. (b) Seditious attack when the invader takes delivery of an event to maneuver the method. The archaic drawn on biometric support is fingerprinting. Thumbprints prepared on clay seals are worded as resources of distinctive identification as a distant flip side in olden China. The current biometric affirmation has turned out to be nearly instant, and is steadily more precise with the initiation of mechanized record and digitization of analog data. Sebastian predicted a bi-modal validation display method that replicates the login of a consumer through its face and its voice [6]. This expression is called BioLogin. The request rush mutually for Linux and Windows; the Windows edition is freely accessible for download. BioLogin is grasped by way of an open source machine acquaintance annals and its machine hallucination package [7]. In concert, the face and the speaker verification methods are based on Gaussian Mixture Models. Single countenance checks have to emphasize with divers tribulations such as raucous statistics, intra-class discrepancy, constrained extent of liberty, spoof assail, and intolerable fault rates. Preferred of these precincts can be tackled by means of multimodal method that incorporate the indication offered by manifold sources of data. Mojtaba, Cristinel and Wamadeva in 2010 argued the different conditions that are probable in multimodal methods, the echelons of fusion that are plausible and the assimilation tactics that can be espoused to secure data. They offered numerous instances of multimodal methods that have been portrayed in their prose. Le Hoang, Ha Nhat in 2010 projected two-in-one convenient, low price digital signal processing microcontroller based method for instantaneous handwritten signature proof and face credit. The method has two 640 x 480 pixel color cameras, one for face imprisons, and the other provides handwritten signature scanner. The facet vector extorts from the geometric silhouette and traits of an offline signature image are dilapidated for certification. The face appreciation algorithm is supported on the belief of principal component analysis to decide the source vector recognized as EigenFace. The method founded on DSC with two digital color cameras has been urbanized for face acknowledgment and offline signature proof. The appreciation fallouts for face recognition and signature certification are adequate mutually on the host PC and on the intent entrenched scheme. They anticipated a manageable low-cost scheme that employs iris and fingerprint to substantiate business deal mainly in banking. The patron‘s Automated Teller Machine card hold iris and fingerprint stencils in accumulation to the usual pin. The built-up ATM card has the analogous echelon of its data relaxed defense as the offered ATM cards. Towards supplying utmost protection, both the iris and fingerprint have to be legitimate for any deal to scale all the way through. A low down cost, convenient certification system supported on both iris and fingerprint has been residing. Omaima Allaf in 2014 intended and urbanized the two modal biometrics arrangement that is very proficient not only for authenticating people distinctively but also for eradicating any leeway of two time registration. The anticipated structure comprises what is identified in diligence as Automatic Biometrics Identification System. Rabia Jafri, Hamid in 2009 employed the face and voice natures of a person from exposure. HyperBF arrangement is used to combine the control achieved by five different classifiers serving on the voice and face feature sets. Ming Hsuan Yang in 2002 expanded an algebraic skeleton stranded on Bayesian statistics to incorporate the speech and face information of a customer. The document projected a system they will recognize and validate persons distinctively and also eliminating any likelihood of double registration. III. BOAST COSSESTED SCHEME A. Conscription of the BC Scheme The Colonist is built-in to the biometric method. A firm number of biometric dramatization of a meticulous client is obtained, preprocessed, malformed into traits, and post processed, after that used to guide a consumer replica and adjust if required. The user sculpts beside charlatan donation may be second-hand to attain a door-sill for that consumer. The new replica is then hoarded, down the porch for that consumer if wanted. B. Fingerprint Aspect Mining Fractious integer looms was engaged as it was the majorly used technique of trivia aspect mining. This process digs out the crest finales and divergences from the outline picture. The trivia aspects are mined by inspecting the confined locality of every crest pixel in the icon by a 3x3 casement. The fractious integer worth is then calculated, which is distinct as partly the total of the distinctions amid duo of contiguous pixels. Face detection aspect mining is similar to the Fingerprint aspect mining, but executes reason, linked to removal of face stencils from face pictures incarcerated by means of cameras.
  • 3. Proceedings of IEEE International Conference on Image Processing (ICIP 2016) September 25-28, 2016, Phoenix, Arizona ©IEEE (ICIP 2016) 4565 C. Fingerprint Pattern Testing For proficient testing process, the mined statistics is hoard in the matrix arrangement. During the matching process, each input minutiae point is compared with template minutiae point considering the above properties. In each case, template and input minutiae are selected as reference points for their respective data sets. The reference points are used to convert the remaining data points to polar coordinates. D. Face Identification Testing Finding eigenvalues and analogous eigenvectors of matrix M x N is computationally intractable even for a reticent size image. Therefore, will again acquire J eigenvalues and related J eigenvectors of extent J. These eigenvectors are akin to the face imagery that's why they are termed as eigenfaces. Every eigenface has anecdotal implication varying on the enormity of its eigenvalue. Consequently, it is liberal to opt for a rift J‘ of the J eigenfaces equivalent to J‘ peak valued eigenvalues as describing the complete guidance face images. This condensed rift eigenfaces are amassed, beside to the mean face. Compute power vectors by prognostic training face images onto the hoarded eigenfaces. The input of a hoarded eigenface to a zero mean guidance face image can be intended as a scalar power. Consequently, a power vector of length J‘ whose rudiments symbolize the degree of contribution of the parallel eigenface to that zero mean picture is acquired. IV. DUAL COUNTENANCE CHECK A. Apex of synthesis A standard biometric scheme has four significant elements: (a) The antenna element which confines the characteristic in the sort of unprocessed biometric facts. (b) The aspect mining component which practices the data to wrest a facet set that is a condensed depiction of the quality. (c) The identical elements which use a classifier to contrast the extort facet set with the stencil dwells in the testimony to reason similar counts. (d) The choice system which exploits the identical counts to moreover authorize an alleged person. In multiple-level biometric system data ceasefire can crop up in several of the aforesaid elements. The concluding output of manifold classifiers is strengthened through the scheme; (a) Synthesis at the information or aspect stage: The information itself or the facet sets instigated from multiple antennas/causes are amalgamated. (b) Synthesis at the bout count stage: The counts spawned by several classifiers distressing to diverse modalities are shared. (c) Synthesis at the choice stage: The choice stage, which develops the matching reckons to additionally empower a supposed facade as shown in Figure 1 to identify the rationale. B. Methods of Procedure A multiple-level scheme can labor within the least, one of three particular modes explicitly: (i) Sequential approach In the sequential approach, the yield of one modality is usually utilized to trim along the numeral of probable identity prior to ensuing modality is tattered. Consequently, multiple sources of information do not have to be attained immediately. Auxiliary, a choice might be prepared prior to obtaining all the features. This can lessen the general detection, instant. (ii) Analogous approach In the analogous approach, the information from many modalities is second hand instantly in-turn to accomplish identification. (iii) Layered approach In the layered approach, entity classifiers are pooled in a branch wise arrangement. This approach is pertinent when the amount of classifiers is outsized. The method uses the layered approach since the quantity of claimant is very huge whilst discussing about colonist who will be scheduled in the boundary. It is significant to remind that the three approaches pull off as soon as the moment dements on the amount of multiple traits and number of classifiers. C. Choice Blending System The choice blending system is purely predestined on the two identical overheads. Therefore, for identifying rationale; cataloging the dual countenance check must contain a yield of identification as rationale or else the concluding outcome is not standard. V. IMPLEMENTATION The dual countenance check using boast cosseted scheme has been put into practice by Matlab Simulink environment for face identification as made known in Figure 2. Verifinger/ Megamatcher algorithm was engaged for fingerprint detection as exposed in Figure 3 and 4. The elucidation is currently pedestal on the subsequent discrete components. A. Conscription Procedure Prior to a migrant being acknowledged or confirmed by a biometric device, the conscription procedure must be finished. The put forward of this conscription procedure is to fashion a rundown silhouette of the colonist. The progression consists of the minutiae, which encompass as listed; (a) A biological statistics confine module that incarcerates person's name, date of birth, address, and place, etc. which take alphabetic typescript. (b) Nationality of the migrant take alphabetic and string typeset, date of birth takes string nature and the date of colonist register seizes string nature too. (c) The place information is bottomed on Nationality, State in which the migrant is imminent as of, and Continent of the colonist.
  • 4. Proceedings of IEEE International Conference on Image Processing (ICIP 2016) September 25-28, 2016, Phoenix, Arizona ©IEEE (ICIP 2016) 4566 The biological statistics confine module that sends down fingerprints and face descriptions of a registered. Face and Fingerprints must be detained for every register ahead of mustering can proceed far afield biological statistics confine module. Fingerprint testing is ascetically obligatory in the biological statistics confine module. The mustering of a register ceases this fragment; if his information is previously in the record or else listing carry on to the biological statistics confine module. The elucidation is put into operation have dynamic, revealing utility to make sure that the coordination retort only if it sense that a vibrant register is certainly there at the spot of data possession. B. Conscription Hoarding The record has all the particulars of the populace about who has been enrolled and chucks them with the passport credential. Whilst there is obliged to inspect enrollee‘s minutiae or formulate atonement this can by far be made as the passport naming integer preserve second-hand to delineate personage‘s niceties and it creates the procedure of verification lighter and quicker as it salt away era. In this script, together the fingerprint and face appreciation algorithms are mutual, such that the inadequacy of one is accomplished by the other. Consequently, the procedure of authentication is made by inflating the enrollee‘s passport naming integer and the enrollee is solicited to surpass the substantiation practice by the inclusion of their finger on the scanner and as well the face of the individual is being employed to authenticate. This is incarcerated and the commissioner, judge against the dynamic fingerprint confined and face detained with the one on the record, for verification rationale. Both looms calculate its testing count and the presage of the count from the two advances is evaluated with the conventional threshold count. If the resulting count from the testing is better than the threshold count, the system exhibits ―Authenticated‖, and the enrollee‘s passport is put on a show to prove that the enrollee is truly the individual alleges to be. But if the ensuing count is less than the conventional threshold, the system disregards it and displays ―Counterfeit‖. C. Authentication Stage This is the stage where the migrants are confirmed to make persuaded that they are who, they beyond doubt assert to be across the border. The migrants are impelled to contribute their fingerprint and face appreciation; it is afterward located on the fingerprint scanner and face recognition camera. Once done, then they are evaluated with the one amass in the record with the assist of fingerprint and face detection algorithms and the system figures the mean count of the outcome. CULMINATION An embryonic fortification fascia in colonization control of coercion and brutality corporeal on the trudge elevation, delve through it is notorious that detrimental doing and mayhem are being relegated by interlopers as a corollary of acquiescent frontier. In contemplation, Boast Cosseted Scheme rummage around for wearisome to glimpse how these perform can be abridged to the slightest, if not completely exterminated. This manuscript has probed a loom baptized as Dual Countenance Check; blending fingerprint and face detection to engrave the records of illegitimate colonist inflating a frontier devoid of legal credentials, and by means of some devious manners to the flight being wedged by the contraption that has been laid down. This is accomplished by endowing a consistent mining and testing procedure through a mish-mashing of the fingerprint and face appreciation practices. The central inspiration in the wake of this is that solitary method crafts for the deficit of the other, thereby fetching about a consistent and competent effect. It grants a further tenable milieu where colonist will not be intellect to wallop the design with their counterfeit diplomacy if the BC Scheme draws on in frontier defense. ACKNOWLEDGMENT It is our supreme gratification in conceding the board and the supervision of NTU, Singapore and London Metropolitan University, England in elevating this libretto. We bestow this article to the fatalities of Paris Attack on 13th day of November 2015 and plead for their soul to reprieve in serenity. REFERENCES [1] Mojtaba, Cristinel, Wamadeva, ―Vitality Detection in Fingerprint Identification,‖ WSEAS Transactions on Information Science and Applications, Volume 7, Issue 4, April 2010, pp. 498–507. [2] Le Hoang Thai, Ha Nhat, ―Fingerprint Recognition Using Standardized Fingerprint Model‖, International Journal of Computer Science Issues, Vol. 7, Issue 3, No 7, May 2010, pp.11–17. [3] Raffaele Cappelli, Alessandra Lumini, Dario Maio, ―Fingerprint Image Reconstruction from Standard Templates,‖ IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 29, No. 9, September 2007, pp. 1489-1503. [4] Rabia Jafri, Hamid, ―A Survey of Face Recognition Technique,‖ Journal of Information Processing Systems, Vol.5, No.2, June 2009, pp.41-66. [5] Omaima Allaf, ―Review of Face Detection Systems based Artificial Neural Networks Algorithms,‖ The International Journal of Multimedia & its Applications, Vol.6, No.1, February ‗2014. pp.1-16. [6] Faizan Ahmad, Aaima Najam and Zeeshan Ahmed, ―Image-based Face Detection and Recognition: State of the Art,‖ International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012, pp. 169–172. [7] Ming-Hsuan Yang, ―Detecting Faces in Images: A Survey‖, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No.1, January 2002, pp.34-57.
  • 5. Proceedings of IEEE International Conference on Image Processing (ICIP 2016) September 25-28, 2016, Phoenix, Arizona ©IEEE (ICIP 2016) 4567 Fingerprint Pattern Cohort Fingerprint Testing Pre- Processing Aspect Mining Doubt Finger Sensor Face Pattern Cohort Face Testing Pre- Processing Aspect Mining Guide Doubt Face Camera Rationale Choice Blending System Figure 1. Boast Cosseted Scheme with Dual Countenance Check for Colonization Control Figure 2. Face Identification using BC Scheme
  • 6. Proceedings of IEEE International Conference on Image Processing (ICIP 2016) September 25-28, 2016, Phoenix, Arizona ©IEEE (ICIP 2016) 4568 Figure 3. Fingerprint Aspect Mining using BC Scheme Figure 4. Fingerprint Pattern Testing using BC Scheme