— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
Personal identification using multibiometrics score level fusioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
7 multi biometric fake detection system using image quality based liveness de...INFOGAIN PUBLICATION
Biometric systems mostly popular in all over the world because of its user friendly and credible nature in security. In spite of this advantages, many attacks that done through synthetic , self manufactured, fake, reconstructed samples affected on the performance and accuracy of biometric system which becomes major problem in biometrics. Hence, new effective measures have to be taken to protect the biometric systems. In this paper, we propose novel software based multi-biometric fake detection system to detect various types of attacks. The main moto of this system is to enhance security level of biometric recognition systems through Image Quality Assessment (IQA) which is one of the liveness detection method.25 image quality measures calculated from test image which used to classify between real and fake trait using Linear Discriminative Analysis(LDA) classifier. The experimental results is done on the database of 2D face and fingerprint modalities, shows the proposed system is ease in implementation in real time application as complexities is very less because of one input image. Also this system is fast, user-friendly, non-intrusive which is more competitive with any other state of the art approaches, classifies between real and fake traits.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Verification or Authentication systems use a single biometric sensor which having higher error rate due to single evidence of identity (voice can be change due to cold, face can be changed due facial hairs, cosmetics, fingerprint can be change due to scar etc.). To enhance the performance of single biometric systems in these situations may not be effective because of these problems. Multi-biometric systems overcome some of these limitations by providing multiple proofs of any identity. This paper presents an effective multimodal biometric system which can be used to reduce the above mentioned drawbacks of unimodal systems.
BIOMETRIC BASED AUTHENTICATION SYSTEM TECHNOLOGY
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
User verification systems that use a single source of biometric information are not sufficient to meet today’s high security requirements for applications. This is because these systems have to contend with noisy data, intra-class variations, spoof attack and non-universality. Therefore, there is need for employing multiple sources of biometric information to provide better recognition performance as compared to the systems based on single trait. This paper is an overview of different categories of multibiometric systems, information fusion in multibiometric systems, and approaches to feature fusion at feature selection phase.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Review of Multimodal Biometrics: Applications, Challenges and Research AreasCSCJournals
Biometric systems for today’s high security applications must meet stringent performance requirements. The fusion of multiple biometrics helps to minimize the system error rates. Fusion methods include processing biometric modalities sequentially until an acceptable match is obtained. More sophisticated methods combine scores from separate classifiers for each modality. This paper is an overview of multimodal biometrics, challenges in the progress of multimodal biometrics, the main research areas and its applications to develop the security system for high security areas
Personal identification using multibiometrics score level fusioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
7 multi biometric fake detection system using image quality based liveness de...INFOGAIN PUBLICATION
Biometric systems mostly popular in all over the world because of its user friendly and credible nature in security. In spite of this advantages, many attacks that done through synthetic , self manufactured, fake, reconstructed samples affected on the performance and accuracy of biometric system which becomes major problem in biometrics. Hence, new effective measures have to be taken to protect the biometric systems. In this paper, we propose novel software based multi-biometric fake detection system to detect various types of attacks. The main moto of this system is to enhance security level of biometric recognition systems through Image Quality Assessment (IQA) which is one of the liveness detection method.25 image quality measures calculated from test image which used to classify between real and fake trait using Linear Discriminative Analysis(LDA) classifier. The experimental results is done on the database of 2D face and fingerprint modalities, shows the proposed system is ease in implementation in real time application as complexities is very less because of one input image. Also this system is fast, user-friendly, non-intrusive which is more competitive with any other state of the art approaches, classifies between real and fake traits.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Verification or Authentication systems use a single biometric sensor which having higher error rate due to single evidence of identity (voice can be change due to cold, face can be changed due facial hairs, cosmetics, fingerprint can be change due to scar etc.). To enhance the performance of single biometric systems in these situations may not be effective because of these problems. Multi-biometric systems overcome some of these limitations by providing multiple proofs of any identity. This paper presents an effective multimodal biometric system which can be used to reduce the above mentioned drawbacks of unimodal systems.
BIOMETRIC BASED AUTHENTICATION SYSTEM TECHNOLOGY
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
User verification systems that use a single source of biometric information are not sufficient to meet today’s high security requirements for applications. This is because these systems have to contend with noisy data, intra-class variations, spoof attack and non-universality. Therefore, there is need for employing multiple sources of biometric information to provide better recognition performance as compared to the systems based on single trait. This paper is an overview of different categories of multibiometric systems, information fusion in multibiometric systems, and approaches to feature fusion at feature selection phase.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Review of Multimodal Biometrics: Applications, Challenges and Research AreasCSCJournals
Biometric systems for today’s high security applications must meet stringent performance requirements. The fusion of multiple biometrics helps to minimize the system error rates. Fusion methods include processing biometric modalities sequentially until an acceptable match is obtained. More sophisticated methods combine scores from separate classifiers for each modality. This paper is an overview of multimodal biometrics, challenges in the progress of multimodal biometrics, the main research areas and its applications to develop the security system for high security areas
The increasing use of distributed authentication architecture
has made interoperability of systems an important issue. Interoperabil ity of systems affects the maturity of the technology and also improves confidence of users in the technology. Biometric systems are not immune to the concerns of interoperability. Interoperability of fingerprint sensors and its effect on the overall performance of the recognition system is an area of interest with a considerable amount of work directed
towards it. This research analyzed effects of interoperability on error rates for fingerprint datasets captured from two optical sensors and a capacitive sensor when using a single commercially available fingerprint
matching algorithm. The main aim of this research was to emulate a
centralized storage and matching architecture with multiple acquisition
stations. Fingerprints were collected from 44 individuals on all three sensors and interoperable False Reject Rates of less than .31% were achieved using two different enrolment strategies.
Palmprint and Handgeometry Recognition using FAST features and Region propertiesEditor IJCATR
Biometrics recognition system is more reliable and popular. In this paper we describe a palmprint and handgeometry based person
identification consisting of three main steps - preprocessing techniques such as morphological operations. The feature extraction techniques
such as FAST feature algorithm and region properties is used to independently extract palmprint and handgeometry features. Feature matching
with euclidean distance classifier. These techniques are more reliable and faster than traditional techniques used. We finally conclude that the
proposed methodology has better performance .This is supported by our experiments which are able to achieve recognition rate for palmprint
100 % and for handgeometry 93.75 %.
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from Curvelet transform. The Curvelet feature dimension is selected based on d-prime number. The increase in feature dimension is reduced by using template averaging, moment features and by Principal component analysis (PCA). The algorithm is tested on in-house multimodal database comprising of 3000 samples and Chimeric databases. Identification performance of the system is evaluated using SVM classifier. A maximum GAR of 97.15% is achieved with Curvelet-PCA features.
Abstract—Biometric systems are increasingly deployed in networked environment, and issues related to interoperability are bound to arise as single vendor, monolithic architectures become less desirable. Interoperability issues affect every subsystem of the biometric system, and a statistical framework to evaluate interoperability is proposed. The framework was applied to the acquisition subsystem for a fingerprint recognition system and the results were evaluated using the framework. Fingerprints were collected from 100 subjects on 6 fingerprint sensors. The results show that performance of interoperable fingerprint datasets is not easily predictable and the proposed framework can aid in removing unpredictability to some degree.
Accounting for people is the first step of every manpower-based organization in today’s world. Hence, it takes up a signification amount of energy and value in the form of money from respective organizations for both implementing a suitable system for manpower management as well as maintaining that same system. Although this amount of expenditure for big organizations is near to nothing, rather just a formality, it does not hold as much truth for small organizations such as schools, colleges, and even universities to a certain degree. This is the first point. The second point for discussion is that much work has been done to solve this issue. Various technologies like Biometrics, RFID, Bluetooth, GPS, QR Code, etc., have been used to tackle the issues of attendance collection. This study paves the path for researchers by reviewing practical methods and technologies used for existing attendance systems
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
Biometric technology is a science that used to verify or identify the individual based on physical and/or
behavioral traits. Although biometric systems are considered more secure than other traditional methods such as
password, or key, they also have many limitations such as noisy image, or spoof attack. One of the solutions to
overcome these limitations, is by applying a multibiometric system. Multibiometric system has a significant
effect in improving the performance of both security and accuracy of the system. It also can alleviate the spoof
attacks and reduce the fail to enroll error. A multi-sample is one implementations of the multibiometric systems.
In this study, a new algorithm is suggested to provide a second chance for the genuine user who is rejected, to
compare his/her provided finger with the other samples of the same finger. Multisampling fingerprint is used to
implement this new algorithm. The algorithm is activated when the match score of the user is not equal to a
threshold but close to it, then the system provides another chance to compare the finger with another sample of
the same trait. Using multi-sample biometric system improved the performance of the system by reducing the
False Reject Rate (FRR). Applying the original matching algorithm on the presented database produced 3
genuine users, and 5 imposters for the same fingerprint. While after implementing the suggested condition, the
system performance is enhanced by producing 6 genuine users, and 2 imposters for the same fingerprint. This
work was built and executed depending on a previous Matlab code presented by Zhi Li Wu. Thresholds and
Receiver Operating Characteristic (ROC) curves computed before and after implementing the suggested
multibiometric algorithm. Both ROC curves compared. A final decision and recommendations are provided
depending on the results obtained from this project
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
The use of multiple biometric sources for human recognition, referred to as multibiometrics, mitigates some of the limitations of unimodal biometric systems by increasing recognition accuracy, improving population coverage, imparting fault-tolerance, and enhancing security. In a biometric identification system, the identity corresponding to the input data (probe) is typically determined by comparing it against the templates of all identities in a database (gallery). An alternative e approach is to limit the number of identities against which matching is performed based on criteria that are fast to evaluate. We propose a method for generating fixed-length codes for indexing biometric databases. An index code is constructed by computing match scores between a biometric image and a fixed set of reference images. Candidate identities are retrieved based on the similarity between the index code of the probe image and those of the identities in the database. The number of multibiometric systems deployed on a national scale is increasing and the sizes of the underlying databases are growing. These databases are used extensively, thereby requiring efficient ways for searching and retrieving relevant identities. Searching a biometric database for an identity is usually done by comparing the probe image against every enrolled identity in the database and generating a ranked list of candidate identities. Depending on the nature of the matching algorithm, the matching speed in some systems can be slow. The proposed technique can be easily extended to retrieve pertinent identities from multimodal databases. Experiments on a chimeric face and fingerprint bimodal database resulted in an 84% average reduction in the search space at a hit rate of 100%. These results suggest that the proposed indexing scheme has the potential to substantially reduce the response time without compromising the accuracy of identification. New representation schemes that allow for faster search and, therefore, shorter response time are needed.
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
Biometric identification systems, which use physical features to check a person's identity, ensure much higher security than password and number systems. Biometric features such as the face or a fingerprint can be stored on a microchip in a credit card, for example. A single modal biometric identification system fails to extract enough features for identification. Another disadvantage of using only one feature is not always readable. In this article, a smart multimodal biometric verification model for identifying and verifying a person's identity is recommended based on artificial intelligence methods. The proposed model is identified the iris and finger vein unique patterns each individual to overcome many challenges such as identity fraud, poor image quality, noise, and instability of the surrounding environment. Several experiments were performed on a dataset containing 50 people by using many matching methods. The results of the proposed model were provided a higher accuracy of 98%, with FAR and FRR of 0.0015% and 0.025%, respectively.
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
Token based security (ID Cards) have been used to restrict access to the Secured systems. The purpose of
Biometrics is to identify / verify the correctness of an individual by using certain physiological or
behavioural traits associated with the person. Current biometric systems make use of face, fingerprints,
iris, hand geometry, retina, signature, palm print, voiceprint and so on to establish a person’s identity.
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport,
pan card, etc. In this paper, we consider face and fingerprint patterns for identification/verification. Using
this data we proposed a novel model for authentication in multimodal biometrics often called ContextSensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for
biometrics fusion patterns. In stage 1, fusion of face and finger patterns using Principal Component
Analysis (PCA), in stage 2 by applying Sparse SVD decomposition to extract the feature patterns from the
fusion data and face pattern and then in stage 3, using CSEAM model, the extracted feature vectors can be
encoded. The final key will be stored in the smart cards as Associative Memory (M), which is often called
Context-Sensitive Associative Memory (CSAM). In CSEAM model, the CSEAM will be computed using
exponential kronecker product for encoding and verification of the chosen samples from the users. The
exponential of matrix can be computed in various ways such as Taylor Series, Pade Approximation and
also using Ordinary Differential Equations (O.D.E.). Among these approaches we considered first two
methods for computing exponential of a feature space. The result analysis of SVD and Sparse SVD for
feature extraction process and also authentication/verification process of the proposed system in terms of
performance measures as Mean square error rates will be presented.
The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt to build robust cryptographic keys, because, human users detect difficulties to call up long cryptographic keys. Biometric recognition provides an authentic solution to the authentication of the user problem in the identity administration systems. With the extensive utilization of biometric methods in different applications, there is growing concern about the confidentiality and security of the biometric technologies. This paper proposes biometric based key recreation scheme. Since human ears are not correlated. Until now, the encryption keys are generated using a swarm intelligence approach. Collective intelligence of simple groups of autonomous agents have been emerged by swarm intelligence. The crow search algorithm which is known as (CSA) is a new meta-intuitive method assembled by the intelligent group behavior of crows. Despite that CSA demonstrates important features, its search approach poses excessive challenges while faced with great multimodal formularization.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
Multi Slot Uwb Antennas to Minimize the Interferences from Wlan & X-Band Appl...IOSRJECE
In this paper designs of different UWB patch antennas with two rejected bands are given. The reference antenna consists of a rectangular patch etched on FR4- epoxy substrate with 50 Ω feed line and relative permittivity 4.4.. The simulated bandwidth with return loss (RL) ≥10 dB is 3.42–11.7 GHz. The rejected bands here are the WLAN and X-bands, achieved by inserting slots in the patch and the feed. The simulation results of the antennas indicate higher gain at the pass bands while a sharp drop at the rejected bands is seen. The second (reference) antenna consists of a hexagonal patch etched on FR4- epoxy substrate with 50 Ω feed line and relative permittivity 4.4,shows better return loss and rejection of the bands. The high frequency structure simulator (HFSS) is used to design and simulate the antennas behaviour over the different frequency ranges. Measurements confirm the antenna characteristic as predicted in the simulation with a slight shift in frequencies.
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...IOSRJECE
The binary adder is the critical element in most digital circuit designs including the digital signal processors (DSP) and microprocessor data unit path. As such as extensive research continues to be focused on improving the power, delay, improvement of the adder. The design and analysis of the parallel prefix adders (carry select adders) is to be implemented by using Verilog. In VLSI implementations, parallel prefix adders are very high speed performance. Binary adders are one of the most essential logic elements within a digital system. Therefore, binary addition is essential that any improvement in binary addition can result in a performance boost for any computing system and hence, help improve the performance of the entire system. Parallel-prefix adders (also known as carry-tree adders) are known to have the best performance in VLSI designs. This paper investigates (the Kogge-Stone, sparse Kogge-Stone, Ladner fischer adder, Brent-Kung adder) and compares them to the simple Ripple Carry Adder (RCA) for high number of binary bits.
Vehicle security system using ARM controllerIOSRJECE
Road accidents are a human tragedy. This involves high human suffering and pecuniary costs in terms of untimely sudden death, injuries and loss of inherent income. In this paper, a system is proposed where the main objective is to detect road signs from a moving vehicle and also enables intelligent detection of an accident at any place and reports about the accident on predefined numbers of dear one .The system will use one signal transmitter in each and every symbol or message board at road side and whenever any vehicle passes from that symbol the receiver situated inside the vehicle i.e. In-Car System will receive the signals and display proper message or the symbol details on display connected in car. Road Traffic Sign Detection is a technology by which a vehicle is able to recognize the traffic signs which are on the road e.g. ”speed limit” or ”school” or ”turn ahead”. This infrastructure is expected to deliver multiple road safety and driving assistance applications
This paper presents different techniques of one bit Full adder. In every technique the main requirements are power consumption, speed and power delay product. The proposed FIN-FET technique gives the bette.r power consumption, speed and power delay product than other techniques. The proposed Fin-FET technique is compared with some of the popular adders based on the power consumption, speed and power delay product. We designed each of these techniques by using Spice simulation soft wares.
A Plasma Tweeter is an audio device which uses a pair of electrodes as a source of sound. It has a clear reproduction and Omni directional radiation pattern. A plasma tweeter has a better frequency response than a conventional speaker and does not involve any moving part (diaphragm) and thus has less reverberation and no wear and tear. Plasma tweeters invented earlier were very expensive. This paper presents a plasma audio system which is making the regular audio system more efficient because of the use of the latest plasma tweeter. Here the objective is to create a low cost and more efficient version of the most speakers invented till now with the complete audio system.
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash AdcIOSRJECE
The present investigation proposed a low power encoding scheme of thermometer code to binary code converter for flash analog to digital conversion by the design of different circuits. In this paper, we have proposed three encoding techniques for the conversion of analog to digital signal using Multiplexer based encoder, heterogeneous encoder and encoding technique using dynamic logic circuits providing low power of operation and we compare the results obtained from each technique based on power consumption. The multiplexer based encoder was designed with the help of multiplexers which consumes less amount of power comparing with other designs.
Performance Analysis of Low Loss Gas Filled Hollow Core Photonic Crystal Fibe...IOSRJECE
A Kagome lattice hollow core photonic crystal fiber was filled by pumping pressurized inert gases (Argon, Krypton, Xenon) through the hollow core and wave guidance properties were observed for terahertz (THz) frequency. By using finite element method (FEM), effective material loss and confinement loss have been observed for different strut width, core diameter and different inert gases. Confinement of light has achieved through the hollow core for THz frequency. Lowest EML of 7.90x10-4 cm-1 is found for 5 µm strut width and 800 µm core diameter at 1 THz frequency for Xenon gas pumped at 1000 bar pressure. Observation and findings of this paper will contribute in the ongoing research trends on THz waveguide
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...IOSRJECE
: Encryption is important to keep the confidentiality of data. There are many of encryption algorithms to ensure the data, but should be the select the algorithm depended on the fast, strong and implementation. For that choose the advance encryption standard (AES) algorithm for encryption data because speed and easy implementation on small devices and some the feature for it. In this paper, implementation of encryption and decryption of AES algorithm is presented with a High Secured Low Power Multiplexer Look-Up-Table (MLUT) based Substitution-Box (S-Box) . The main feature in the proposed MLUT based S-Box is that, it is implemented based on 256-byte to 1-byte multiplexer with a 256-byte memory instead of the conventional implementation of employing multiplication inversion in GF(28 ) and affine transformation. Thus, the proposed S-Box is simpler in circuit implementation and lower in power dissipation.
In digital logic and computing, a counter is a device which stores the number of times a particular event or process has occurred, often in relationship to a clock signal. CMOS devices are designed for high noise immunity and low static power consumption. CMOS accomplishes current reduction by complementing every nMOSFET with a pMOSFET and connecting both gates and both drains together. A high voltage on the gates will cause the nMOSFET to conduct and the pMOSFET to not conduct, while a low voltage on the gate causes the reverse. This arrangement greatly reduces power consumption and heat generation .Finally we proposed counter using SRAM model, provides the best resolution, high output current and good output-input current linearity.
Detection of Type-B Artifacts in VEPs using Median Deviation AlgorithmIOSRJECE
The primary goal of this research work is to introduce temporal artifact detection strategy to detect non responsive channels and trials in visual evoked potentials(VEPs) by tracing out the signals with very low energy and to remove artifacts in multichannel visual evoked potentials. The non responsive channels and trials are identified by calculating the energy of the average evoked potential of each channel, and the energy of the average evoked potential of each trial. Then channel wise and trial wise median test is conducted to detect and remove non-responsive channels and trials. An artifact is defined as any signal that may lead to inaccurate classifier parameter estimation. Temporal domain artifact detection tests include: a clipping (CL) test detect amplitude clipped EPs in each channel, a standard deviation (STD) test that can detect signals with little or abnormal variations in each channel, a kurtosis (KU) test to detect unusual signals that are not identified by STD and CL tests and median deviation test to detect signals containing large number of samples with very small deviation from their normal values. An attempt has been made to apply these techniques to 14-channel visual evoked potentials (VEPs) obtained from different subjects.
Design High Performance Combinational Circuits Using Output Prediction Logic-...IOSRJECE
With the continuously increasing demand for low power & high speed VLSI circuits the brain storming among the scientists, inventors & researchers to find the techniques required to design such high performance circuits is also increasing day by day. In the answer to this search several design techniques have been found. Output prediction logic-OPL technique is one of such newly introduced techniques. OPL is a technique that can be applied to conventional CMOS logic families in order to obtain considerable speedups. Speedups of two to three times over static CMOS logic are demonstrated for a variety of combinational circuits. When applied to static CMOS the OPL retains the restoring nature of underlying logic family. In case of OPL applied to the pseudo NMOS & domino logic, the problem of excessive power dissipation is solved & speedups more than static CMOS logic is obtained
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...IOSRJECE
This work investigated the optimum location of Erbium Doped Fiber Amplifier (EDFA) in an optical system based on analysis of BER analyzer metrics by simulation approach using Optisystem software. The simulation model will be studied based on many parameters as input power (dBm), gain of Amplifier (dBm), fiber cable length (km) and attenuation coefficient (dB/km), there are two different parameters will be analyzed at five different locations of EDFA which are Q-Factor and Bit Error Rate (BER) and also Eye Diagram, which Q-factor and BER are measurement parameters used to measure the quality of received signal at receiver.
VANET based Intelligent TransportationSystem using Li-Fi technologyIOSRJECE
VANET (Vehicular Ad-hoc Network) is a wireless network in vehicle for Intelligent Transportation System (ITS).In thispaper, we propose a mechanism toprevent accidents due to sleepiness and alcohol consumption of the driver. Vehicle to Vehicle (V2V) communication is the most effective solutionwe have used in order to prevent accidents using the Li-Fi technology.
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
Vehicular ad -hoc network (VANET) has a problem called high mobility and uneven distribution of vehicles which affect the performance of routing. The high mobility may changes arrangements of a network, and the uneven distribution of vehicles leads to node failures due to network partition; In an urban environment the high density of vehicle cause drastic wireless contentions. In this paper, we use the Even Data Distribution (EDD) protocol to make uneven distribution of data transmission in the vehicular ad-hoc network to even distribution. In which the high mobility of vehicles in urban areas causes loss of data due to uneven distribution in order to reduce the impact of uneven distribution we transform it into even distribution using EDD protocol.
Performance Investigation and Enhancement of Fiber Bragg Gratingfor Efficient...IOSRJECE
In this paper, the performance of various windowfunctions for Fiber Bragg Grating Sensor (FBGS)is investigated and evaluated in order to get optimized reflection spectrum with high reflectivity and an efficient side lobe suppression for efficient sensing measurement applications.For this purpose, a wide range of design parameters which include grating length and refractive index modulation amplitudehas been chosen to evaluate the sensor design. The performances of the different windowfunctions have been then compared in terms of reflectivity, full width half maximum bandwidth (FWHM), and sidelobe level(SLL) so as to get the most suitable design parametersto be used for sensing measurement.The simulation results presented in this paper show the effectiveness of the optimizedFBG sensor, which can be further implemented for high performance sensing applications.
Surface Plasmon Modes of Dielectric-Metal-Dielectric Waveguides and ApplicationsIOSRJECE
The dielectric-metal-dielectric plasmonic waveguide structures find applications in integrated optics and fiber polarizers and sensors. Surface plasmon waves guided by thin metal film have been intensively studied over the last two decades. However, most studies have been confined to relatively low index dielectrics. With growing interest in silicon photonics and other semiconductors dielectric of relatively higher dielectric constant we carried out a detailed study of the modes supported by a metal filmbetween dielectrics of relatively higher dielectric constant. The study clearly shows that both modes, the“antisymmetric” (푎푏 ) short range and “symmetric” (푠푏 ) long range bound modes can exist only when the contrast between the indices is low. For high contrast the symmetric mode transforms into a leaky mode.For completeness we also includethe antisymmetric leaky (푎푙 ) mode and symmetric leaky (푠푙 ) mode in our study, although they are not important for guided wave structures. We have also included “leaky modes” in the bound mode domain as solution of the boundary value problem as reported in some early studies. We have also considered some applications of the DMD waveguides with an emphasis on identifying the participating mode in each application
Performance Analysis of Optical Amplifiers (EDFA and SOA)IOSRJECE
In the optical transmission systems attenuation causes signal power to drop through an optical fiber link, so need to use amplifiers to increase signal power with low noise. Semiconductor Optical Amplifier (SOA) and Erbium-Doped Fiber Amplifier (EDFA) are two of the main types of optical amplifiers, and they were used in this simulation model to analyze their performance, with a data rate of 622 Mb/s (STM-4 level) and 170 km optical fiber length for each simulation model. This was simulated by using OptiSystem simulator, including the main parameters of the optical transmission system as input power (dBm), optical fiber cable length (km) and attenuation per length of optical fiber cable (dB/km), also there are three parameters will be considered which they are output power (dBm), Q-Factor and Bit Error Rate (BER) at receiver, and also Eye Diagram.
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...IOSRJECE
This work investigated the optimum location of Erbium Doped Fiber Amplifier (EDFA) in an optical system based on analysis of BER analyzer metrics by simulation approach using Optisystem software. The simulation model will be studied based on many parameters as input power (dBm), gain of Amplifier (dBm), fiber cable length (km) and attenuation coefficient (dB/km), there are two different parameters will be analyzed at five different locations of EDFA which are Q-Factor and Bit Error Rate (BER) and also Eye Diagram, which Q-factor and BER are measurement parameters used to measure the quality of received signal at receiver.
Study of RF-MEMS Capacitive Shunt Switch for Microwave Backhaul Applications IOSRJECE
In this research paper, we have proposed a new type of capacitive shunt RF-MEMS switch. MicroElectro-Mechanical System (MEMS) is a combination of mechanical and electromagnetics properties at micro level unit. This MEMS switch can be used for switching purpose at RF and microwave frequencies, called RFMEMS switch. The RF-MEMS switch has a potential characteristics and superior performances at radio frequency. The MEMS switch has excellent advantages such as zero power consumption, high power handling capacity, high performance, and low inter-modulation distortion. In this proposed design, a new type of capacitive shunt switch is designed and analyzed for RF applications. The switch is designed both in UP and DOWN-states. The proposed switch design consists of substrate, co-planar waveguide (CPW), dielectric material and suspended metallic bridge. The proposed MEMS switch has dimension of 508 µm × 620 µm with a height of 500 µm and implemented on GaAs as a substrate material with relative permittivity of 12.9. The geometry and results of the proposed switch is designed using Ansoft HFSS electromagnetic simulator based on finite element method (FEM). The electrostatic and electromagnetic result showed better performances such as return loss, insertion loss and isolation. The switch has also excellent isolation property of -48 dB at 26 GHz.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Integrating Fusion levels for Biometric Authentication System
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 1, Ver. I (Jan.-Feb. 2017), PP 65-72
www.iosrjournals.org
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 65 | Page
Integrating Fusion levels for Biometric Authentication System
Darshan R. Kale1
, Sujata Kulkarni2
1
ME Scholar, Department of Electronics and Telecommunication Engineering, Mumbai, India
2
Associate Professor, Department of Electronics and Telecommunication Engineering, Mumbai, India
Abstract: — Recently a lot of works are presented in the literature for the multimodal biometric authentication.
And such biometric systems have been widely accepted with increasing accuracy rates and population coverage,
reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system
that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems
in order to take advantage of both fusion techniques. The experimental results shows the performance of the
multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition
behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is
better compared to the individual fusion techniques.
Keywords: Face, iris, identification, unimodal biometric system, multimodal biometric system, feature
extraction level, score level.
I. Introduction
Finding out the identity of a person has become vital in recent past. A valid/true individual must be able to login to
his bank account, ATM, office, computer or any of his own personal accounts. The traditional methods for authentication are
password, PIN and token ID or key based. But these methods are insecure as a password can be forgotten or hacked and ID
card may be lost or stolen. Biometric system provides sufficient security for the various above stated applications. The word
„Biometrics‟ refers to the application of statistical analysis of physiological or behavioural characteristics of a person to
authenticate his/her identity. In the developing age of nations, the concerns about security and rapid advancement in
Networking has been increasing, the demand for a reliable user authentication technique has increased [1].
At present, biometric systems include face characteristics, retina images, finger prints, hand geometry, palm prints,
signature, voice etc. Biometrics cannot be forgotten, borrowed, stolen and also forging is impractical. Biometric systems
deployed in real world applications are unimodal which rely on the verification of single source of information for
authentication. But these systems endure from some of the serious problems like noisy data, intra-class variations, inter-class
similarities, non-universality and spoofing. This leads to noticeably high FAR and FRR, limited discrimination capability,
upper bound in performance and lack of permanence. To evaluate a biometric system's accuracy, the most commonly
adopted metrics are FRR and FAR. FRR is the percentage of authorized individuals rejected by the system and FAR is the
percentage of unauthorized persons accepted by the system. The point where FRR and FAR have the same value is called
ERR [2]. The limitations of unimodal biometric systems motivated the inclusion of multiple sources of information for
establishing identity. A biometric system that fuses the information from multiple traits is known as multimodal biometric
system. These systems are more reliable due to the presence of multiple, independent biometrics [2]. Remarkable
improvement of the biometric system accuracy can also be further achieved by integrating the fusion level techniques taking
the advantage of both the fusion techniques. The proposed biometric system will achieve more accuracy and efficiency than
the individual fusion technique.
II. Literature Survey
The idea of developing an Integrated Fusion levels for Biometric Authentication System is inspired from the
various standard technical papers mentioned below.These papers along with certain research work over the internet has
enlighten the various methods and techniques which can be used towards the proposed approach presented in this paper.
A. Related works
The main idea of combining the fusion levels came from the David et. al [3] combined Feature Extraction Level
and Score Level Fusion in which fingerprint and iris are used as traits where advantages of both the fusion techniques are
taken. The fusion can be achieved in two different ways. These combined fusion technique performance was better achieved
than that of individual fusion techniques. The first is the fusion prior to matching and the second is the fusion after matching.
The prior works of research in multimodal biometric systems are reviewed. Fusion at the match score, rank, feature and
decision levels has been extensively studied in the literature. D Vaidhya et. al [4] used two modalities: palmprint and palm
vein where feature level fusion is used based on the Entropy technique. The system performance is 99% with FAR
0.02929%, FRR of 1.00 % and accuracy of 99%. Rattani et. al [5] fused face and fingerprints where feature level fusion is
performed to enhance the performance of the face and fingerprint modalities alone by 5.05% and 0.82 % respectively. The
feature level fusion outperforms the score level fusion by 0.67%. The system performance i.e. FRR of 1.98 %, FAR of 3.18
% and the system accuracy is 98 %. Bahgat et. al [6] proposed a multimodal biometric system by fusing palm vein and face
biometric, where feature level fusion is performed. The overall accuracy of the system is more than 95%, FAR of 0.5%, FRR
of 1.0% and accuracy of 98.3%. Feifei et. al [7] fused the fingerprint and finger vein where score level fusion is performed.
2. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 66 | Page
The overall accuracy of the system before fusion fingerprint accuracy is 95.3%, finger vein is 93.72% and after fusion the
accuracy of the system is 98.74% with FAR of 1.2%, FRR of 0.75%. Nazmeen et. al [8] fused face and ear images in which
images are passed to a quality module in order to reduce false rejection rate. Improvement in recognition result is obtained
when ear biometric is fused with face biometric. The fusion is done at decision level, achieving a recognition rate of 96%
showing an improvement in accuracy with FAR of 0% and FRR of 4%. Nageshkumar et. al [9] fused the palm print and face
image in which score level fusion were used and the results are found to be very encouraging and promoting for the research
in the field. The overall accuracy of the system is more than 97%, FAR 2.4%, FRR 0.8%. Krzyszof et. al [10] combined the
face and speech in which decision level fusion is performed. The system performance is FAR of 3.0%, FRR of 1.1% and the
accuracy of 87%. Mohamad et. al [11] performed multimodal biometrics by fusing the fingerprint and iris in which decision
level fusion is used. A fuzzy logic method is used for fusion which is given better performance and accuracy of 98% with
FAR of 2%, FRR of 2% and accuracy of 98%. Jagadeesan et. al [12] combined the fusion of fingerprint and iris in which
feature level fusion is used and the images are pre-processed. The system performance is 91% with FAR of 10% and FRR of
5.3%. Saad Abuguba et. al [13] combined the fusion of iris and face in which feature level fusion is used and cryptographic
key is generated. The system performance is FRR of 12.56% with 256th cryptographic key bit normalization range.
B. Summary
In the above content, various image fusion techniques are studied and their performances are evaluated on three
criteria: Score, Decision and feature fusion. For fusing multiple images feature fusion technique [5, 6, 12, 13] are better
choice when compared to score [7, 9] and decision [8, 10, 11] techniques. For proposed work, the feature fusion technique
provides a better solution for fusing multiple images and feature sets contains richer information. And also the score level
fusion gives the best recognition accuracy results As a result, the combination of feature fusion technique and Score level
fusion provides more accuracy and security for fusing multiple images in multimodal biometrics where advantage of both
the techniques can be taken [3].
III. Methodology
This Paper proposes a similar type of integrated biometric system i.e. face and iris will give higher performance
achievement by integrating two fusion techniques i.e. Feature level technique and Score level technique in order to take
advantage of both the fusion techniques. The proposed system explains the comparison of feature level & score level fusion.
Such multimodal biometric system will overcome the limitations of Unimodal biometric system and will give better
recognition accuracy as compared to the individual traits.
C. Tools to be used
The very reason why Iris is selected as the biometric trait is due to its accuracy and easy collectability over
networks. But the Face has less performance accuracy as compared to Fingerprint, then-to it has been used by improving its
accuracy performance by various algorithms and techniques. To test the proposed system, Experiments will be performed
using iris images provided by CASIA Iris Database Version 4.0 collected by the Chinese Academy of Sciences‟ Institute of
Automation which consist of 54601 iris images [15] and face images provided by CASIA-FaceV5 Database of Faces
collected by the Chinese Academy of Sciences‟ Institute of Automation [14]. The proposed Methodology will be carried on
MATLAB 2013a software (or any version of MATLAB higher than 2012). The use of Version higher than 2012 is because
of the toolbox named Computer-Vision Toolbox is used, which plays an important role in such proposed Biometric
Authentication Systems.
D. Design Methodology
Figure 1. Shows the flowchart of the proposed project. The input images of face and iris are taken from the
databases. These images are pre-processed. Pre-processing of face images will be done as Cropping, resizing, normalization
and filtering, whereas median filtering for removal of specular reflections, Iris segmentation, etc. will be for Iris Images.
Fig. 1 Block Diagram of Proposed Fusion Biometric System
3. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 67 | Page
Then feature of the face will be extracted with the help of standard and wavelet domain algorithm.
After both the feature extraction of images, they are fused at two different fusion level techniques i.e. feature
level and Score level fusion. The output of both the fusion technique is then fused i.e. total scores will be
calculated through both the techniques. After implementation, the performance can be evaluated and analysed
by the parameters like FAR and FRR (or TAR and TRR) with ROC curve. FAR (false rate of acceptance) and
FRR (false rate of rejection) are illustrated in [16], [17]. ROC (receiver operating characteristic) [18] curves are
methods designed to summarize the performance obtained by biometric detection systems. An ROC curve is a
function which indicates, on the x-axis the accepted rate of the impostor attempts and, on the y-axis, the
accepted rate of genuine attempts using a decision threshold.
First of all, preprocessing of the input images have been done where the term preprocessing term
include image resizing, image cropping, image enhancement etc. Then, as the two fusion techniques are been
implemented, so the feature extraction techniques used in this proposed project are different so as to get better
accuracy and feasibility with respective individual fusion techniques used. Owing towards the Score Level
Fusion, Principal component analysis (PCA) for face recognition is based on the information theory approach: it
extracts relevant information and encodes it as efficiently as possible. PCA approach reveals the most effective
low dimensional structure of facial patterns, removes information that is not useful and specifically decomposes
the structure of face into uncorrelated components named Eigen faces [19]. Each image of face may be stored in
a 1D array which is the representation of the weighted sum (feature vector) of the Eigen faces. The same is
repeated for iris images too. Whereas for Feature level Fusion, The feature extraction technique used for face is
by performing LBP operator on images and then applying Gabor filtering on it [20]. For iris images, features are
extracted through Circular Hough Transform where circle boundary of iris and pupil are detected through canny
edge detector [13], [21] which is a specialization of Hough Transform. And hence the feature vectors are
calculated, as concatenation of the vectors has been done which is described below.
E. Feature Level Fusion Scheme
This first type of fusion (figure 2) is obtained by concatenating the features vectors derived from face and iris
images. Compared to individual vectors, the obtained concatenated vector of features has an increased power of
discrimination. There are many types of algorithms used for extraction process. For face, LBP operator: Local
binary patterns were introduced by Ojala et al. [20], [25] as a fine scale texture descriptor. In its simplest form,
an LBP description of a pixel is created by thresholding the values of the 3x3 neighbourhood of the pixel against
the central pixel and interpreting the result as a binary number. Then Gabor filtering has been applied to get unit
magnitude of a feature vector with a down-sampling filter bank. For iris, the iris and pupil boundary edge map
has been detected by canny edge detection technique [13, 21] and the Hough circle of an eye has been extracted
through it. The mean, Entropy and Variance of the extracted feature has been calculated and concatenated with
respect to users. And hence the final vector has been formed by concatenation. In order to create this
concatenated vector we used the process of fusing biometric data. There, concatenation of the iris “I(t)” feature
vector and face “F(t)” feature vector is obtained i.e. a new vector “V(t)” (1), using the formula:
………. (1)
Fig. 2 Feature level fusion
After that for person authentication, measurement of the Euclidean distance between the current vector
"V(t)", and all the vectors “V(t)” from our registered users, existing in the database is done. In order to
distinguish between an enrolled used and an impostor used in the decision process, a certain threshold (t) is
used.
4. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 68 | Page
F. Score Level Fusion Scheme
This second type of fusion (figure 4) is often used, as scores derived by each unimodal biometric
system, usually contain enough biometric information to make a difference between a registered user and an
intruder. For each biometric trait a match score is provided and at the end of the fusing process the scores are
combined. Finally the acceptance or the rejection decision is taken. The way information is combined makes
this kind of biometric systems both feasible and practical [11].
Fig. 3 Score Level Fusion
Here Eigen Face Based Approach have been used. Principal component analysis (PCA) is used to
extract Eigen faces [26]. Initially Eigen vectors are computed using covariance matrix derived from set of
training images. Probe image is then projected in to the face space and the distance between mean Eigen face
and probe image is computed using spatial differential operators such as Euclidian distance. For the recognition
of face biometrics, face images are normally projected into the feature space which best encodes the variation of
the image. This feature space is also known as the Eigen-face, which is the eigenvector of the set of faces.
Suppose we have Eq. below:
………… (2)
where represents the input signal of the face images and i = 1 ….. n. During empirical mean
detection and calculation phase, the face images are being mean centred by subtracting the mean image from
each image vector. The mean, v, will represent the mean image as Eq. below:
………………… (3)
where the mean centred image is - v. Next, the eigenvectors and eigenvalues calculation process being
executed. Eigenvectors of the covariance matrix, Y (m x n) give the Eigen faces, where Y = are generated,
and these eigenvectors are sorted from high to low following the eigenvalues calculated from the covariance
matrix. The highest eigenvalues give the largest variance in the image. The training sets of face images were
acquired and the Eigen faces were calculated using Principal Component Analysis (PCA) projections. A 2-D
facial image was represented as a 1-D vector. Each of the Eigen faces can be viewed as a feature and is
expressed by Eigen face coefficients (weight).
Then the matching of face and iris images was done by retrieving the enrolled image from the dataset and
calculated using the Weighted Euclidean Distance, Eq. below with the image of the tester subjects.
………... (4)
where A and B represents the enrolled and testing biometric images. The above procedure is repeated for the iris
images too. The fusing score can be computed as in Eq.
……..(5)
5. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 69 | Page
Where and are the normalized scores of the biometric matchers face and iris respectively.
Depending on the weight of the face and iris biometrics, if both of them were equal, Eq.(5) can be derived or
simplified into Eq.
....…….(6)
Through the steps described in the following section, the unified fusing score , was evaluated based on
the pre-specified threshold value, . The value is defined based on the average value obtained for the overall
results. We declared the user to be genuine when , otherwise the user was an impostor [27].
IV. Proposed Final Combined System
Here we propose a fusion technique which combines the first and the second type of fusion Scores
which are described in section E and F.
As described in equation (6), the scores are fused and the decision is taken. Finally the acceptance or the
rejection decision is taken. Here AND rule is used for the decision. The way information is combined makes this
kind of biometric systems both feasible and practical. Since traits are not from the same person, aim is to design
the prototype of multimodal system. Using the proposed system we take advantage of both features level fusion
techniques and score level fusion techniques, and hence we achieve a stronger biometric system which is more
accurate and efficient.
V. Experimental Results
The following are the results obtained which includes few GUI of the proposed system with time
complexity of the each step performed in the system.
Fig. 4 GUI of proposed system
The Figures 5-9 illustrates the working of the proposed system and their time complexity respectively. Firstly
the database creation in the feature level fusion and secondly the matching of the input data with the data created
in the database.
Fig. 5 Feature level database creation of face with time complexity
6. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 70 | Page
Fig. 6 Database creation of Iris with time complexity.
Fig. 7 Fusion of face and iris with time complexity
Fig. 8 Verification phase (testing)
Fig. 9 Verification of user as 1 from database created earlier with time complexity
Hence, the above GUI figures show the working of proposed methodology with its time complexity,
where the person is verified as a registered user in the database. And so the biometric authentication system
gains the stronger security in terms of integrating fusion levels which is the proposed methodology.The result
showing ROC curves are shown below which describes the total objective of the proposed system.
7. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 71 | Page
Fig. 10 Recognition Accuracy using Feature level fusion=94%
Fig. 11 Recognition accuracy using Score level fusion= 91.35%
Fig. 12 Recognition accuracy of final fusion = 97%
Fig. 13 ROC Curve - GAR (%) V/s FAR (%)
Hence the above presented result is obtained for multimodal biometric fusion at first level (Feature level) with
94%, second level (Score level) with 91.35% and the proposed method with 97% recognition accuracy. These results proves
that the proposed biometric system overcomes the performance given by the individual fusion techniques respectively with a
significantly increasing recognition accuracy. Here the True Rejection Rate i.e. TRR of the proposed method has been
achieved better as compared to the two individual fusion techniques used.
The time complexity as shown in the above various results have been tabulated below with respect to the two different fusion
techniques i.e. Feature level and Score level:
Table 1 Time complexity of the proposed system
Time taken (s) Feature level fusion Score level fusion
Training
Feature extraction for face 60.15 0.57
Feature extraction for iris 4106.75 0.46
Fusion 3.95 NA
Testing
Feature extraction for face 5.30 0.051
Feature extraction for iris 43.35 0.044
8. Integrating Fusion levels for Biometric Authentication System
DOI: 10.9790/2834-1201016572 www.iosrjournals.org 72 | Page
Fusion 0.38 0.005
Matching 6.73 Face-0.07
Iris-0.07
VI. Conclusion And Future Scope
The Recognition accuracy of the proposed system is 97% which is more than the individual fusion techniques i.e. 94% of Feature level
and 91.35% of Score level, which shows that the proposed fusion technique has better performance than the individual fusion techniques. As
the scope of using multimodal biometric system has become widen due to its performance which overcomes the performance of the
unimodal system. The proposed method combines the two fusion techniques and the experimental results obtained shows that the proposed
system gives stronger security than the individual fusion techniques. The system achieves a stronger security stopping the intruder from any
attack.
Here, the merits of final integrated fusion technique has been highlighted. The future scope can be more evolved by using different
traits and by different fusion techniques.
VII. Acknowledgement
The Authors highly appreciate the Contribution of CASIA (Chinese Academy of Sciences‟ Institute of Automation) as the portion of the
research in this paper uses the CASIA-IrisV4 and CASIA-FaceV5 as well.
References
[1] K. Jain, A. Ross, S. Prabhakar, “An introduction to biometric recognition”, IEEE Transactions on Circuits and Systems for Video
Technology, vol. 14, pp. 4–20, 2004.
[2] Sudhamani M J, M K Venkatesha, K R Radhika, “Revisiting Feature level and Score level Fusion Techniques in Multimodal
Biometrics System”, International Conference on Multimedia Computing and Systems (ICMCS), Tangier, May 2012.
[3] David Marius Daniel, Cîşlariu Mihaela, Terebeş Romulus, “Combining Feature Extraction Level and Score Level Fusion in a
Multimodal Biometric System”11th ISETC-International Symposium on Electronics and Telecommunications, pp. 1-4, 2014.
[4] D Vaidhya, S pawar, “Feature level fusion of palmprint and palm vein for personal authentication based on Entrophy technique”,
International Journal on Electronics and communication Technology, Vol.5, Issue spl-1, 2014.
[5] A.Rattani, D.R.Kishu, M.Bicego,” Feature level fusion of face and fingerprint Biometrics”, Biometrics: Theory, applications and
systems, First IEEE International conference, 2007
[6] S.F.Bahgat, S.Ghoniemy, M.Alotabi,” Proposed Multimodal palm-veins- face biometric Authentication”, International journal of
advanced computer science and applications, vol-4, No.6, 2013.
[7] Feifei cui, Gongping yang, “Score level fusion of fingerprint and finger vein Recognition”, Journal of Computer Information’s
systems: 16, pp. 5723-5731, 2011.
[8] Nazmeen bibi boodoo, R.K.Subramanian, “Robust multi-biometric recognition using face and ear images”, IJCSIS-International
journal of computer science and information security, Vol.6, No.2, 2009.
[9] Nageshkumar, Mahesh.PK, Shanmuka swami M.N, “A Efficient Multimodal biometric fusion using palmprint and a face image”,
International Journal of computer science, Vol.2, Issue 3, 2009.
[10] Krzyszof, Jonas Richard, Plamen Prodanov, Andrzejn Drygajlo, “Reliability- Based decision fusion in multimodal biometric
verification systems”, EURASIP-European Journal on advances in signal processing, Article ID 86572, 9 Pages, 2007.
[11] Mohamad Abdolahi, Majid Mohamadi, Mehdi Jafari, “Multimodal biometric system fusion using fingerprint and iris with fuzzy
logic”, International Journal of soft computing and engineering, vol.2, Issue-6, 2013.
[12] A.Jagadessan, Dr.K.Duraisamy, “Secured Cryptographic Key Generation from multimodal biometrics: Feature level fusion of
fingerprint and Iris”, International Journal of computer science and information security, Vol.7, No.2, 2010.
[13] Saad Abuguba, Milan M. Milosavljević, Nemanja Maček, “An Efficient Approach to Generating Cryptographic Keys from Face
and Iris Biometrics Fused at the Feature Level”, IJCSNS International Journal of Computer Science and Network Security, vol.15
No.6, June 2015.
[14] Chinese academy of sciences, CASIA Face image database Version 5.0, http://biometrics.idealtest.org
[15] Chinese academy of sciences, CASIA Iris image database Version 4.0, http://biometrics.idealtest.org
[16] Sahoo, Soyuj Kumar, Mahadeva Prasanna, SR, Choubisa, Tarun, "Multimodal Biometric Person Authentication: A Review", IETE
Technical, Page 54, 2012.
[17] Ravi Das, “An introduction to biometrics”, Keesing Journal of Documents & Identity, Issue 17, Page 5, 2006.
[18] A. J. Mansfield, J. L. Wayman, “Best Practices in Testing and Reporting Performance of Biometric Devices”, Centre for
Mathematics and Scientific Computing National Physical Laboratory Queens Road Teddington, Page 7, 2002.
[19] M. A. Turk and A. P. Pentland, “Face recognition using eigenfaces”, In Proc. IEEE Computer Society Conf. Computer Vision and
Pattern Recognition, Maui, Hawaii, pp.586-591, 1991.
[20] D Sharma and Dr. A. Kumar, “An Empirical Analysis Over the Four Different Feature-Based Face and Iris Biometric Recognition
Techniques”, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 3, No. 10, 2012.
[21] G. Amoli, N. Thapliyal and N Sethi, “Iris Preprocessing”, (IJARCSSE) International Journal of Advanced Research in Computer
Science and Software Engineering, vol. 2,issue 6,2012.
[22] P. D. Garje and S. S. Agrawal, “Multibiometric Identification System Based On Score Level Fusion” IOSR Journal of Electronics
and Communication Engineering (IOSRJECE), Volume 2, Pages 07-11, Issue 6, 2012.
[23] G.L. Marcialis, F. Roli, “Score-level fusion of fingerprint and face matchers for personal verification under stress conditions”, the
14th
International Conference on Image Analysis and Processing, , Pages 259–264, 2007.
[24] Ross and A.K. Jain, “Information fusion in biometrics-Pattern Recognition Letters”, Pages 2115–2125, 2003.
[25] T. Ojala, M. Pietikainen and D. Harwood, “A comparative study of texture measures with classification based on feature
distributions”,Pattern Recognition, vol.29, no.1,pp. 51-59, 1996.
[26] Tanaya MandaI and Q. M. Jonathan Wu, "Face Recognition using Curvelet Based PCA," 19th International Conference on Pattern
Recognition,8-11 December 2009, vol. 89, pp. 2345-2353.
[27] H. M. Sim,H. Asmuni, R. Hassan, R. M. Osman, “Multimodal biometrics: Weighted score level fusion based on non-ideal iris and
face images”,Elseiver-Expert systems with applications 41(2014),pp. 5390-5404.