1. The document proposes an intelligent multimodal identification system based on fusing local features from iris and finger vein biometrics.
2. It uses preprocessing, feature extraction using SIFT, and template matching to identify individuals from their iris and finger vein patterns with high accuracy of 98% and low false acceptance and rejection rates.
3. The multimodal system is able to overcome challenges from single biometric systems by combining two independent biological traits to improve security and identification performance.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
Protection has become one of the biggest fields of study for several years, however the demand for this is
growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from
any workstation to cloud, and though protection must be incredibly important all over. Throughout the past
two decades, sufficient focus has been given to substantiation along with validation in the technology
model. Identifying a legal person is increasingly become the difficult activity with the progression of time.
Some attempts are introduced in that same respect, in particular by utilizing human movements such as
fingerprints, facial recognition, palm scanning, retinal identification, DNA checking
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
The adoption of biometric-based authentication mechanism has been already initiated a decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all the different forms of biometrics, we see usage of fingerprint as the dominant attribute in contrast to different other attributes e.g. teeth image, palm, facial geometry, retina network, iris, etc. Multimodal biometrics is believed to offered better security compared to unimodal. Although, there are some of the technical advancement in evolving up with new multimodal methodologies, but still commercial usage of such is yet to be seen. Therefore, this manuscripts aims to explore the level of effectiveness in existing approaches of biometric-based authentication system in order to further investigate the unaddressed solution towards this problem. This paper reviews the approaches used for addressing different problems associated with biometrics and discusses about their technical methodologies as well as their limitations.
Role of fuzzy in multimodal biometrics systemKishor Singh
Person identification is possible through the biometrics using their physiological and behavioral characteristics such
as face, ear, thumb print, voice, signature and key stock. Unimodal biometric systems face a range of problems, including noisy
data, intra-class versions, small liberty, non-university, spoof assaults, and unsustainable error rates. Some of these drawbacks
can be overcome by multimodal biometric technologies, which incorporate data from various information sources. In this paper
we work on multimodal biometric using three modalities face, ear and foot to find the optimal results using fuzzy fusion
mechanism and produces final identification decision via a fuzzy rules that enhance the quality of multimodalities biometric
system.
Protection has become one of the biggest fields of study for several years, however the demand for this is
growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from
any workstation to cloud, and though protection must be incredibly important all over. Throughout the past
two decades, sufficient focus has been given to substantiation along with validation in the technology
model. Identifying a legal person is increasingly become the difficult activity with the progression of time.
Some attempts are introduced in that same respect, in particular by utilizing human movements such as
fingerprints, facial recognition, palm scanning, retinal identification, DNA checking
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
The adoption of biometric-based authentication mechanism has been already initiated a decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all the different forms of biometrics, we see usage of fingerprint as the dominant attribute in contrast to different other attributes e.g. teeth image, palm, facial geometry, retina network, iris, etc. Multimodal biometrics is believed to offered better security compared to unimodal. Although, there are some of the technical advancement in evolving up with new multimodal methodologies, but still commercial usage of such is yet to be seen. Therefore, this manuscripts aims to explore the level of effectiveness in existing approaches of biometric-based authentication system in order to further investigate the unaddressed solution towards this problem. This paper reviews the approaches used for addressing different problems associated with biometrics and discusses about their technical methodologies as well as their limitations.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
A novel approach to generate face biometric template using binary discriminat...sipij
In identity management system, commonly used biometric recognition system needs attention towards issue
of biometric template protection as far as more reliable solution is concerned. In view of this biometric
template protection algorithm should satisfy security, discriminability and cancelability. As no single
template protection method is capable of satisfying the basic requirements, a novel technique for face
biometric template generation and protection is proposed. The novel approach is proposed to provide
security and accuracy in new user enrolment as well as verification process. This novel technique takes
advantage of both the hybrid approach and the binary discriminant analysis algorithm. This algorithm is
designed on the basis of random projection, binary discriminant analysis and fuzzy commitment scheme.
Three publicly available benchmark face databases (FERET, FRGC, CMU-PIE) are used for evaluation.
The proposed novel technique enhances the discriminability and recognition accuracy in terms of matching
score of the face images and provides high security. This paper discusses the corresponding results.
The biometric is a study of human behavior and features. Face recognition is a technique of biometric. Various approaches are used for it. Face recognition is emerging branch of biometric for security as no faces can be defeated as a security approach. So, how we can recognize a face with the help of computers is given in this paper. The typical way that a FRS can be used for identification purposes. The effectiveness of the whole system is highly dependent on the quality and characteristics of the captured face image. The process begins with face detection and extraction from the larger image, which generally contains a background and often more complex patterns and even other faces. A survey for all these techniques is in this paper for analyzing various algorithms and methods. Sagar Deshmukh | Sanjay Rawat | Shubhangi Patil"Face Recognition Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14331.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/14331/face-recognition-technology/sagar-deshmukh
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
A review on fake biometric detection system for various applicationseSAT Journals
Abstract Now a days Security is a major concern for Scenario. So many securities are available but it should be reliable. A biometric system is a computer system which is related to the human characteristic. It is mainly used in identification and access control on their behavioral and physiological category. For example signature, voice, retina, key stroke, face, iris and fingerprint etc. This paper introduces a software base multi attack protection method which is based on various biometric modalities such as iris, face, signature and hand palm image.. This Hand palm technique is used for physical access. The real and fake images are identified by using image quality assessment (IQA) technique. Fake identities always have some different feature than original such as sharpness, different color, information quality etc. In this paper, liveness detection method is used. Which provide a very good performance and low degree of complexity. Also quality of Image is using two methods Full- Reference (FR) and No-Reference (NR). This image quality assessment (IQA) method is suitable for real time application which has been used for very low complexity. Keyword: Statistical Feature Extraction Biometric, Attack, Image Quality Assessment, Full-reference IQA, NO-Reference IQA,.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract Face recognition is one of the crucial and important methods for the security purposes. The accuracy of the facial recognition system degrades over time. Therefore the FRS system must be up-to-date. Sometimes the system will not be up-to-date because of unlabelled face images, or because of change in the facial expressions or because of any relevant changes in face of person. Therefore in such cases also the FRS must be self-trained to make the system up-to-date. In this paper a semi-supervised version, based on the self-training method, of the classical PCA-based face recognition algorithm is proposed to exploit unlabelled data for off-line updating of the Eigen space and the templates. Reported results show that the exploitation of unlabelled data by self-training can substantially improve the performances achieved with a small set of labelled training examples. Index Terms: Eigen faces, Face recognition, face classifier, occluded faces
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
Facial Image Classification And Searching - A SurveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, face recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face recognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a marginal summary for future research and enhancements in face detection.
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
More Related Content
Similar to Intelligent multimodal identification system based on local feature fusion between iris and finger vein
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
A novel approach to generate face biometric template using binary discriminat...sipij
In identity management system, commonly used biometric recognition system needs attention towards issue
of biometric template protection as far as more reliable solution is concerned. In view of this biometric
template protection algorithm should satisfy security, discriminability and cancelability. As no single
template protection method is capable of satisfying the basic requirements, a novel technique for face
biometric template generation and protection is proposed. The novel approach is proposed to provide
security and accuracy in new user enrolment as well as verification process. This novel technique takes
advantage of both the hybrid approach and the binary discriminant analysis algorithm. This algorithm is
designed on the basis of random projection, binary discriminant analysis and fuzzy commitment scheme.
Three publicly available benchmark face databases (FERET, FRGC, CMU-PIE) are used for evaluation.
The proposed novel technique enhances the discriminability and recognition accuracy in terms of matching
score of the face images and provides high security. This paper discusses the corresponding results.
The biometric is a study of human behavior and features. Face recognition is a technique of biometric. Various approaches are used for it. Face recognition is emerging branch of biometric for security as no faces can be defeated as a security approach. So, how we can recognize a face with the help of computers is given in this paper. The typical way that a FRS can be used for identification purposes. The effectiveness of the whole system is highly dependent on the quality and characteristics of the captured face image. The process begins with face detection and extraction from the larger image, which generally contains a background and often more complex patterns and even other faces. A survey for all these techniques is in this paper for analyzing various algorithms and methods. Sagar Deshmukh | Sanjay Rawat | Shubhangi Patil"Face Recognition Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14331.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/14331/face-recognition-technology/sagar-deshmukh
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
A review on fake biometric detection system for various applicationseSAT Journals
Abstract Now a days Security is a major concern for Scenario. So many securities are available but it should be reliable. A biometric system is a computer system which is related to the human characteristic. It is mainly used in identification and access control on their behavioral and physiological category. For example signature, voice, retina, key stroke, face, iris and fingerprint etc. This paper introduces a software base multi attack protection method which is based on various biometric modalities such as iris, face, signature and hand palm image.. This Hand palm technique is used for physical access. The real and fake images are identified by using image quality assessment (IQA) technique. Fake identities always have some different feature than original such as sharpness, different color, information quality etc. In this paper, liveness detection method is used. Which provide a very good performance and low degree of complexity. Also quality of Image is using two methods Full- Reference (FR) and No-Reference (NR). This image quality assessment (IQA) method is suitable for real time application which has been used for very low complexity. Keyword: Statistical Feature Extraction Biometric, Attack, Image Quality Assessment, Full-reference IQA, NO-Reference IQA,.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract Face recognition is one of the crucial and important methods for the security purposes. The accuracy of the facial recognition system degrades over time. Therefore the FRS system must be up-to-date. Sometimes the system will not be up-to-date because of unlabelled face images, or because of change in the facial expressions or because of any relevant changes in face of person. Therefore in such cases also the FRS must be self-trained to make the system up-to-date. In this paper a semi-supervised version, based on the self-training method, of the classical PCA-based face recognition algorithm is proposed to exploit unlabelled data for off-line updating of the Eigen space and the templates. Reported results show that the exploitation of unlabelled data by self-training can substantially improve the performances achieved with a small set of labelled training examples. Index Terms: Eigen faces, Face recognition, face classifier, occluded faces
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
Facial Image Classification And Searching - A SurveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, face recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face recognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a marginal summary for future research and enhancements in face detection.
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Similar to Intelligent multimodal identification system based on local feature fusion between iris and finger vein (20)
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Smart monitoring system using NodeMCU for maintenance of production machinesnooriasukmaningtyas
Maintenance is an activity that helps to reduce risk, increase productivity, improve quality, and minimize production costs. The necessity for maintenance actions will increase efficiency and enhance the safety and quality of products and processes. On getting these conditions, it is necessary to implement a monitoring system used to observe machines' conditions from time to time, especially the machine parts that often experience problems. This paper presents a low-cost intelligent monitoring system using NodeMCU to continuously monitor machine conditions and provide warnings in the case of machine failure. Not only does it provide alerts, but this monitoring system also generates historical data on machine conditions to the Google Cloud (Google Sheet), includes which machines were down, downtime, issues occurred, repairs made, and technician handling. The results obtained are machine operators do not need to lose a relatively long time to call the technician. Likewise, the technicians assisted in carrying out machine maintenance activities and online reports so that errors that often occur due to human error do not happen again. The system succeeded in reducing the technician-calling time and maintenance workreporting time up to 50%. The availability of online and real-time maintenance historical data will support further maintenance strategy.
Design and simulation of a software defined networkingenabled smart switch, f...nooriasukmaningtyas
Using sustainable energy is the future of our planet earth, this became not only economically efficient but also a necessity for the preservation of life on earth. Because of such necessity, smart grids became a very important issue to be researched. Many literatures discussed this topic and with the development of internet of things (IoT) and smart sensors, smart grids are developed even further. On the other hand, software defined networking is a technology that separates the control plane from the data plan of the network. It centralizes the management and the orchestration of the network tasks by using a network controller. The network controller is the heart of the SDN-enabled network, and it can control other networking devices using software defined networking (SDN) protocols such as OpenFlow. A smart switching mechanism called (SDN-smgrid-sw) for the smart grid will be modeled and controlled using SDN. We modeled the environment that interact with the sensors, for the sun and the wind elements. The Algorithm is modeled and programmed for smart efficient power sharing that is managed centrally and monitored using SDN controller. Also, all if the smart grid elements (power sources) are connected to the IP network using IoT protocols.
Efficient wireless power transmission to remote the sensor in restenosis coro...nooriasukmaningtyas
In this study, the researchers have proposed an alternative technique for designing an asymmetric 4 coil-resonance coupling module based on the series-to-parallel topology at 27 MHz industrial scientific medical (ISM) band to avoid the tissue damage, for the constant monitoring of the in-stent restenosis coronary artery. This design consisted of 2 components, i.e., the external part that included 3 planar coils that were placed outside the body and an internal helical coil (stent) that was implanted into the coronary artery in the human tissue. This technique considered the output power and the transfer efficiency of the overall system, coil geometry like the number of coils per turn, and coil size. The results indicated that this design showed an 82% efficiency in the air if the transmission distance was maintained as 20 mm, which allowed the wireless power supply system to monitor the pressure within the coronary artery when the implanted load resistance was 400 Ω.
Grid reactive voltage regulation and cost optimization for electric vehicle p...nooriasukmaningtyas
Expecting large electric vehicle (EV) usage in the future due to environmental issues, state subsidies, and incentives, the impact of EV charging on the power grid is required to be closely analyzed and studied for power quality, stability, and planning of infrastructure. When a large number of energy storage batteries are connected to the grid as a capacitive load the power factor of the power grid is inevitably reduced, causing power losses and voltage instability. In this work large-scale 18K EV charging model is implemented on IEEE 33 network. Optimization methods are described to search for the location of nodes that are affected most due to EV charging in terms of power losses and voltage instability of the network. Followed by optimized reactive power injection magnitude and time duration of reactive power at the identified nodes. It is shown that power losses are reduced and voltage stability is improved in the grid, which also complements the reduction in EV charging cost. The result will be useful for EV charging stations infrastructure planning, grid stabilization, and reducing EV charging costs.
Topology network effects for double synchronized switch harvesting circuit on...nooriasukmaningtyas
Energy extraction takes place using several different technologies, depending on the type of energy and how it is used. The objective of this paper is to study topology influence for a smart network based on piezoelectric materials using the double synchronized switch harvesting (DSSH). In this work, has been presented network topology for circuit DSSH (DSSH Standard, Independent DSSH, DSSH in parallel, mono DSSH, and DSSH in series). Using simulation-based on a structure with embedded piezoelectric system harvesters, then compare different topology of circuit DSSH for knowledge is how to connect the circuit DSSH together and how to implement accurately this circuit strategy for maximizing the total output power. The network topology DSSH extracted power a technique allows again up to in terms of maximal power output compared with network topology standard extracted at the resonant frequency. The simulation results show that by using the same input parameters the maximum efficiency for topology DSSH in parallel produces 120% more energy than topology DSSH-series. In addition, the energy harvesting by mono-DSSH is more than DSSH-series by 650% and it has exceeded DSSHind by 240%.
Improving the design of super-lift Luo converter using hybrid switching capac...nooriasukmaningtyas
In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between continuous conduction mode (CCM) and discontinuous conduction mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.
Third harmonic current minimization using third harmonic blocking transformernooriasukmaningtyas
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where singlephase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases
Power quality improvement of distribution systems asymmetry caused by power d...nooriasukmaningtyas
With an increase of non-linear load in today’s electrical power systems, the rate of power quality drops and the voltage source and frequency deteriorate if not properly compensated with an appropriate device. Filters are most common techniques that employed to overcome this problem and improving power quality. In this paper an improved optimization technique of filter applies to the power system is based on a particle swarm optimization with using artificial neural network technique applied to the unified power flow quality conditioner (PSO-ANN UPQC). Design particle swarm optimization and artificial neural network together result in a very high performance of flexible AC transmission lines (FACTs) controller and it implements to the system to compensate all types of power quality disturbances. This technique is very powerful for minimization of total harmonic distortion of source voltages and currents as a limit permitted by IEEE-519. The work creates a power system model in MATLAB/Simulink program to investigate our proposed optimization technique for improving control circuit of filters. The work also has measured all power quality disturbances of the electrical arc furnace of steel factory and suggests this technique of filter to improve the power quality.
Studies enhancement of transient stability by single machine infinite bus sys...nooriasukmaningtyas
Maintaining network synchronization is important to customer service. Low fluctuations cause voltage instability, non-synchronization in the power system or the problems in the electrical system disturbances, harmonics current and voltages inflation and contraction voltage. Proper tunning of the parameters of stabilizer is prime for validation of stabilizer. To overcome instability issues and get reinforcement found a lot of the techniques are developed to overcome instability problems and improve performance of power system. Genetic algorithm was applied to optimize parameters and suppress oscillation. The simulation of the robust composite capacitance system of an infinite single-machine bus was studied using MATLAB was used for optimization purpose. The critical time is an indication of the maximum possible time during which the error can pass in the system to obtain stability through the simulation. The effectiveness improvement has been shown in the system
Renewable energy based dynamic tariff system for domestic load managementnooriasukmaningtyas
To deal with the present power-scenario, this paper proposes a model of an advanced energy management system, which tries to achieve peak clipping, peak to average ratio reduction and cost reduction based on effective utilization of distributed generations. This helps to manage conventional loads based on flexible tariff system. The main contribution of this work is the development of three-part dynamic tariff system on the basis of time of utilizing power, available renewable energy sources (RES) and consumers’ load profile. This incorporates consumers’ choice to suitably select for either consuming power from conventional energy sources and/or renewable energy sources during peak or off-peak hours. To validate the efficiency of the proposed model we have comparatively evaluated the model performance with existing optimization techniques using genetic algorithm and particle swarm optimization. A new optimization technique, hybrid greedy particle swarm optimization has been proposed which is based on the two aforementioned techniques. It is found that the proposed model is superior with the improved tariff scheme when subjected to load management and consumers’ financial benefit. This work leads to maintain a healthy relationship between the utility sectors and the consumers, thereby making the existing grid more reliable, robust, flexible yet cost effective.
Energy harvesting maximization by integration of distributed generation based...nooriasukmaningtyas
The purpose of distributed generation systems (DGS) is to enhance the distribution system (DS) performance to be better known with its benefits in the power sector as installing distributed generation (DG) units into the DS can introduce economic, environmental and technical benefits. Those benefits can be obtained if the DG units' site and size is properly determined. The aim of this paper is studying and reviewing the effect of connecting DG units in the DS on transmission efficiency, reactive power loss and voltage deviation in addition to the economical point of view and considering the interest and inflation rate. Whale optimization algorithm (WOA) is introduced to find the best solution to the distributed generation penetration problem in the DS. The result of WOA is compared with the genetic algorithm (GA), particle swarm optimization (PSO), and grey wolf optimizer (GWO). The proposed solutions methodologies have been tested using MATLAB software on IEEE 33 standard bus system
Intelligent fault diagnosis for power distribution systemcomparative studiesnooriasukmaningtyas
Short circuit is one of the most popular types of permanent fault in power distribution system. Thus, fast and accuracy diagnosis of short circuit failure is very important so that the power system works more effectively. In this paper, a newly enhanced support vector machine (SVM) classifier has been investigated to identify ten short-circuit fault types, including single line-toground faults (XG, YG, ZG), line-to-line faults (XY, XZ, YZ), double lineto-ground faults (XYG, XZG, YZG) and three-line faults (XYZ). The performance of this enhanced SVM model has been improved by using three different versions of particle swarm optimization (PSO), namely: classical PSO (C-PSO), time varying acceleration coefficients PSO (T-PSO) and constriction factor PSO (K-PSO). Further, utilizing pseudo-random binary sequence (PRBS)-based time domain reflectometry (TDR) method allows to obtain a reliable dataset for SVM classifier. The experimental results performed on a two-branch distribution line show the most optimal variant of PSO for short fault diagnosis.
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
More than eighty-five to ninety percentage of the diabetic patients are affected with diabetic retinopathy (DR) which is an eye disorder that leads to blindness. The computational techniques can support to detect the DR by using the retinal images. However, it is hard to measure the DR with the raw retinal image. This paper proposes an effective method for identification of DR from the retinal images. In this research work, initially the Weiner filter is used for preprocessing the raw retinal image. Then the preprocessed image is segmented using fuzzy c-mean technique. Then from the segmented image, the features are extracted using grey level co-occurrence matrix (GLCM). After extracting the fundus image, the feature selection is performed stochastic gradient descent, and least absolute shrinkage and selection operator (LASSO) for accurate identification during the classification process. Then the inception v3-convolutional neural network (IV3-CNN) model is used in the classification process to classify the image as DR image or non-DR image. By applying the proposed method, the classification performance of IV3-CNN model in identifying DR is studied. Using the proposed method, the DR is identified with the accuracy of about 95%, and the processed retinal image is identified as mild DR.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Intelligent multimodal identification system based on local feature fusion between iris and finger vein
1. Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 1, January 2021, pp. 224~232
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp224-232 224
Journal homepage: http://ijeecs.iaescore.com
Intelligent multimodal identification system based on local
feature fusion between iris and finger vein
Enas Abbas Abed, Rana jassim mohammed, Dhafer Taha Shihab
Departmet of Computer Engineering, University of Diyala, Diyala, Iraq
Article Info ABSTRACT
Article history:
Received Apr 3, 2020
Revised Jul 8, 2020
Accepted Jul 30, 2020
Biometric identification systems, which use physical features to check a
person's identity, ensure much higher security than password and number
systems. Biometric features such as the face or a fingerprint can be stored on
a microchip in a credit card, for example. A single modal biometric
identification system fails to extract enough features for identification.
Another disadvantage of using only one feature is not always readable. In
this article, a smart multimodal biometric verification model for identifying
and verifying a person's identity is recommended based on artificial
intelligence methods. The proposed model is identified the iris and finger
vein unique patterns each individual to overcome many challenges such as
identity fraud, poor image quality, noise, and instability of the surrounding
environment. Several experiments were performed on a dataset containing 50
people by using many matching methods. The results of the proposed model
were provided a higher accuracy of 98%, with FAR and FRR of 0.0015%
and 0.025%, respectively.
Keywords:
Finger vein identification
system
Iris identification system
Multi-model biocentric system
Pattern recognition
SIFT
This is an open access article under the CC BY-SA license.
Corresponding Author:
Enas Abbas Abed
Departmet of Computer Engineering
University of Diyala
Diyala, Iraq
Email: enasabbas1111@gmail.com
1. INTRODUCTION
There are four general methods used to identify people through different systems and can be used
through single system or combined system. The first method is the traditional method in which a person
relies on his memory, such as a username and password, personal identification number, or answers to some
questions. In this way, there are many challenges and faults, such as being stolen or forgotten. The second
method, which depends on something the person owns, such as smart cards or keys, etc., but it also faces
many challenges and problems such as theft, damage or counterfeiting [1]. Now, there are modern methods
that depend on the biometric and vital measurements of a person that any person possesses and cannot be
easily counterfeited, stolen or forgotten. The contributions in this article are divided into four main categories
and can be summarized as follows:
a) Smart multi-modal identification system is proposed and tested in various environment settings
b) Effective preprocessing and segmentation techniques are used to overcome the noise and poor-quality
images.
c) Smart and fast extracting and selecting features algorithm (Fast-SIFT) is used to select distinct features
among samples.
d) Hamming distance as template matching algorithm and support vector machine (SVM) is used in final
process to accept or reject the user in identification process.
2. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Intelligent Multimodal Identification System based on Local Feature Fusion… (Enas Abbas Abed)
225
Now, there are modern methods that depend on the biometric and vital measurements of a person
that any person possesses and cannot be easily counterfeited, stolen or forgotten. There are many problems
and challenges in the traditional and modern identification types that we will overcome in this article. These
challenges are discussed as the following: Traditional identification models such as username and password
and can be easily counterfeited, stolen or forgotten. Modern single biometric identification model fails to
extract enough features for identification and verification. In single biometric models cannot individually
extract unique and distinctive patterns that characterize people. Also, it is not sufficiently accurate, as it can
increase the percentage of false rejection of a genuine person or false acceptance of an impostor person. Our
proposed model contains two main operations, namely the enrollment process and the identification process.
Firstly, the enrollment or registration operation is divided into four sub-processes. The first subprocess is
taking a sample from the person using some types of sensors and this sample is often an image of the
fingerprint or iris. The second sub-process is the preprocessing stage, in which the problems of sample
quality and noise treatment are overcome. The third sub-process is extracting and selecting the distinctive
patterns of the person via using the extraction and selecting algorithms such as scale invariant feature
transform (SIFT), speedup robust feature (SURF), fast SIFT [2], principal component analysis SIFT (PCA-
SIFT), canny edge detection, etc. The final sub-process is storing these selected features in the database.
Secondly, the identification process, which is a process that also contains sub-processes such as taking a
sample and matching it with the sample stored in the database. This operation is similar to the registration
process, but instead of storing the sample, it works to match it with the sample previously stored [3–5]. This
article is formed in the subsequent parts. A survey of the previous related works was in part II. The proposed
framework has been described in detail in part III. Test results and performance analysis were discussed in
part IV. Finally, the conclusions were presented in part V.
2. LITERATURE REVIEW
In any biological scheme, especially in biometrics, the individual biological characteristics of each
person are stored in a template and then the template presented in the identification process is compared to
the template stored before that. Therefore, not every biological measure is a biometric measure unless it
contains some important properties such as universality (UV), distinctiveness (UQ), permanence (PM), and
vulnerability. Universality factor (UV) means that this type of biometrics can be applied to all users.
Uniqueness factor (UQ) means that any two people cannot have or possess the same patterns for these
biometric measurements. Permanence factor (PM) means that this type of pattern or biometrics cannot
change over time. Hair color or body weight are examples of biological measures, but they change over time,
so we cannot consider them as biometrics measures approved. The compression between different types of
biometrics according to some important characteristics are conducted in Table 1. According to Table 1,
we found that Iris and Finger vein had very qualified characteristics to be integrated into a multimodal
system [3, 6–11].
Table 1. Compression between different types of biometrics according to usability factors
Factors Finger Print Face Iris Finger Vein Voice
Universality H H H M H
Distinctiveness or Uniqueness H H H H M
Permanence H L H H L
Performance or Accuracy L M H M L
Vulnerability (Spoofing) H M L L H
Security L M H H L
H – High L – Low M – Medium
2.1. Single-modal finger print identification systems
Hoyle et al. [12] suggested methodologies utilize minutiae triplet-based patterns in a hierarchical
order, where not only minutia circumstances are utilized, but ridge data is applied to maintain associations
between minutiae. Kumar et al. [13] introduced a novel strategy for individual identification by utilizing
finger back outside imaging. This article proposed pegfree imaging technique. Finger images are normalized
to reduce their scaling, rotation, and interpretation variations in knuckle images. Test results gained
encouraging outcomes, an error rate of 1.39%.
3. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 224 - 232
226
2.2. Single-modal face identification systems
Face identification has a lot of in-depth, high-quality study outcomes. Jiménez et al. [14] suggested
a feature spread design to distribute with the artificial distinction in face identification. Eigenvectors and pose
factors are used to integrate pose reconstructed images based on thin-plate splines-based warping. Apple
originated face identification (ID) in 2017, which provides a provocation to the business of facial
identification [15]. Face identification system utilizes machine learning to increase its identification accuracy
constantly. IPhone X has used the implemented version of this approach, and it is extremely trusted by users.
2.3. Single-modal iris identification systems
Pillai et al. [16] introduced a combined structure-based on stochastic projections and sparse
descriptions. Its method can deal with a basic deformity in an iris image acquisition. This approach can
produce high efficiency, over 96%. System running performance is not specified in this paper. Thavalengal et
al. [17] directed on significant circumstances for practice implementation, such as image quality, and iris
size. They presented system specifications for unconstrained acquisition in smart devices. They gave various
design plans. Two of these designs have achieved high efficiency, over 97%. Moreover, they have medium-
level usability and safety. Rigas et al. [18] utilized the distinction between the artificial iris and an actual eye
iris to introduce a procedure based on the detection of eye movement to deal with the fake iris threat. The
experiment results based on a dataset, involving 200 individuals, proved that the system could obtain a
typical classification rate of 96.5% with FAR equal 3.4% and FRR equal 3.5%. Bodade et al. [19] suggested
an approach to identify the internal side of iris-based on pupil size disparity. Since pupil size variations with
various light levels, its variety can be used to discover the aliveness of iris. Samples using 380 images of 64
individual subjects were used in laboratory tests. The efficiency of iris localization from eye samples was
98.48%.
2.4. Single-modal finger vein identification systems
K. R. Park et al. [20] have introduced a novel method for finger vein identification that possesses
three pros and participation compared to earlier works. Firstly, local information of the finger veins based on
local binary pattern (LBP) without segmenting was extracted. In the second step, the extracted pattern of the
finger veins based on the Wavelet transform method was obtained. In the third step, LBP score values were
fused by the SVM method. A robust feature extraction procedure for finger vein was implemented by N.
Miura et al. [21]. They have introduced a process of individual verification based on finger-vein patterns.
Vein sample is taken using infrared light technology includes occasional shading generated by the different
densities of the finger bones, tissues, and muscles. Jadhav et al. [22] demonstrated that a finger vein
biometric identification framework is more useful than other biometric schemes since it has a higher
performance and lower fabrication rate. They included an image processing method, and executed Field.
programmable gate array (FPGA) to deal with template matching. Test outcomes explained that its efficiency
can equal 96% with 4% FRR.
2.5. Multi-modal identification systems
Prabhakar et al. [23] presented the signal acquiring features of iris and fingerprint biometrics-two of
the most universally used biometric characteristics. Individual identification of people is needed to handle
many everyday and commercial exercises. Besides visual identification of associations, checking an
individual's government-issued photo ID is the most traditional method. Saevanee et al. [24] denoted out that
remarkably finger stress pressure provides more discriminative information than dynamic keystroke does.
There must be a press sensor in the tube to assemble the stress signals. The dynamic keystroke verification
normally uses a two-class classifier. Both positive samples and negative ones train the classifier.
2.6. Comparison between existing biometric identification system
In Table 2 we scoring the global famous biometric system according to essential factors such as
false acceptance rate (FAR): the probability of recognizing fake registration as an authorized registration.
False rejection rate (FRR): the probability of recognizing an authorized registration as an impersonator.
Equal error rate (EER): introduces the point when the FAR line intersects to the line of FRR. Different
usability factors such as UV, UQ, PM and EE. Security: Biometric identification systems are exposed to a list
of threats.
4. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Intelligent Multimodal Identification System based on Local Feature Fusion… (Enas Abbas Abed)
227
Table 2. Comparison Summaries between different types of biometric systems according to various
characteristics [5]
Ref. System Type-Applied Biometric
Accuracy (S) Usability (S) Suppo
securi
(S)
FAR
score
FRR
score
FER
score
UV
score
UQ
score
OM
score
EE
score
[12] Singel modal-Finger print 1 1 1 2 2 1 2 0
[13] Singel modal-Finger knuckle 3 3 3 2 3 3 3 0
[14] Singel modal-Face 1 1 1 3 1 1 3 1
[15] Singel modal-Face 2 2 2 3 1 1 3 3
[16] Singel modal-Iris 3 3 3 2 3 3 1 2
[17] Singel modal-Iris 3 3 3 2 3 3 1 2
[18] Singel modal-Iris 2 2 2 2 3 3 1 2
[19] Singel modal-Iris 3 3 3 2 3 3 1 2
[20] Singel modal-Finger vein 2 2 2 2 3 3 3 3
[21] Singel modal-Finger vein 3 1 2 3 2 2 2 2
[22] Singel modal-Finger vein 3 2 2 2 3 3 3 3
[23] Multimodal-Finger print and Iris 2 2 2 3 3 3 2 3
[24]
Multimodal-Keystroke and Finger
pressure
3 3 3 2 1 1 1 3
3. PROPOSED MULTIMODAL BIOMETRIC MODEL
The suggested system is a multimodal fusion biometric model between finger vein and iris, as
shown in Figure 1. The proposed system is divided into three distinct phases. The first phase is the iris
identification phase, which includes three stages such as preprocessing, feature extracting process, and
storing template in the database. The second phase is the finger vein identification phase, which also includes
the same stages of iris model system. The objective of the recommended model is to obtain higher accuracy
that may not be possible using a single modal of the biometric system. The third final phase is the fusion
phase at score -level. The suggested combined system provides anti-spoofing propositions by using multiple
biometric traits simultaneously. Scores generated from personal features are combined at a matching score
level using a weighted aggregate of score procedure.
Figure 1. Multimodal proposed identification system
5. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 224 - 232
228
4. METHODS
This phase contains four combined stages such as preprocessing, feature processing, storing
template in database, and matching template with the tested image. Process in iris identification system is
shown in Figure 2. The result of each process in finger vein identification system is shown in Figure 3.
(a) Original row sample (b) Localized iris image (c) Segmented iris image
Figure 2. Iris preprocessing results
(a) Original sample (b) Localized locus
position
(c) Repeat the vein tracking method using
max curvature method
Figure 3. Finger vein preprocessing results
4.1 Preprocessing stage
In this stage, iris identification model has two main processes such as localization and segmentation
processes. Also, finger vein identification mode has two main process to detect locus position. The result
of each process in iris identification system is shown in Figure 2. The result of each process in finger vein
identification system is shown in Figure 3.
4.2 Feature processing stage
In this stage, there are also two main processes such as feature extraction and selection processes.
The result of the normalized feature extraction and selection process of iris and vein is shown in Figure 4 and
Figure 5 respectively. The result of each process is shown in Figure 4 We use different feature extraction
algorithms such as SIFT, SURF, PCA, canny edge detection and fast SIFT [2] algorithm to extract and select
primary distinct features. This algorithm covers the most of the following noise challenges in sampling image
such as:
a) Scaling challenge: the registered or tested image are taken in different scale.
b) Orientation challenge: the registered or tested image are rotated with respect to each other.
c) Occlusion challenge: the registered or tested image are partially covered or interference with another
object.
Illumination challenge: the registered or tested image are taken in a failure environmental setting such as
taking a sample in high light, or darkness.
6. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Intelligent Multimodal Identification System based on Local Feature Fusion… (Enas Abbas Abed)
229
Figure 4. Iris feature normalization results Figure 5. Binarized normalized vein patterns
The Gaussian scale space L(x, y, σ) of an image is represented as the convolution method G(x, y, σ)
of varying widths ¾ with the input image I(x, y):
L(x, y, σ) = G(x, y, σ) ∗ I(x, y) (1)
D(x, y, σ) = L(x, y, kσ) − L(x, y, σ) (2)
Where k is a fixed multiplicative parameter in range space. The DoG are utilized for various purposes.
Initially, it is an effective function that requires minimum calculation power to measure: The smoothed
images L(x, y, σ) require to be calculated for scale space pattern description and therefore, D can be
calculated by simple subtraction. Every image sample within a 16x16 window around each key point, the
gradient magnitude, m, and its orientation, 𝜃, are computed using pixel differences:
θ(x, y) = arctan
L(x,y+1)− L(x,y−1)
L(x+1,y)− L(x−1,y)
(3)
4.3 Matching phase
In the matching phase, 200 iris samples were picked from 50 persons; every individual has four
images in the training stage. While in the testing stage, fifty iris samples for 50 persons were used. These
samples are collected from the CASIA-v1 database. Hamming, cosine, and euclidean distance methods are
used and processed for performing the matching. The smallest distance should be investigated; if it is smaller
than the threshold condition, that indicates it is from the same classification class. We can also use the
proposed matching ranking algorithm introduced by El-Gayar [25]. Otherwise, if it is larger than the
threshold value, that shows it is from the other classification class. The applied distance methods are [26]:
a) Euclidean Distance method equation
𝑑(𝑥, 𝑦) = √∑ (𝑥𝑖 − 𝑦𝑖)2
𝑛
𝑖=1 (4)
b) Cosine Distance method equation
𝑑(𝑥, 𝑦) = 1 −
∑ (𝑥∗𝑦)
𝑛
𝑖=1
√∑ 𝑥2
𝑛
𝑖=1 ∗∑ 𝑦2
𝑛
𝑖=1
(5)
c) Hamming Distance method equation
𝑑(𝑥, 𝑦) = ∑ 𝛿(𝑥𝑖, 𝑦𝑖)
𝑛
𝑖=1 (6)
Example of iris matching process as shown in Figure 6.
Figure 6. Example of iris matching proces
7. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 224 - 232
230
5. RESULTS AND DISCUSSION
In this part, the testing of recommended system is required to prove its reliability, accuracy and
efficiency. We applied different feature processing and matching algorithms to conduct experiments.
Experiments are done out on windows 10, processor core i7 and 8 GB RAM to gain high accuracy and
performance. We use MATLAB and Apache server to conduct the experiments. MATLAB is a high-
performance language for technical computing. MATLAB is used to perform Iris and miura localization,
normalization, feature extraction and selection. Apache server is used to store template in database and
perform matching techniques. Iris CASIA-V1 and finger vein (MLA) datasets are used to estimate the
results. The dataset consists of fifty persons, and each person has five samples captured in two sessions. We
use four samples for each module for training and one sample for testing. All samples are stored in JPG
format with dimensions 320*280. Dataset and machine specification are presented in Table 3.
Table 3. Dataset and machine spesification
Platform Windows 10
Mircoprocessor Intel core-i7
Main memory 8BG
Dataset Casia-V1 for IRIS From Center of biometrics and security research MLA for Finger vein
Dimension 320*280
File format Image JPG
Data size 5 images for each person We have 5 persons
5.1. Evaluation metrics
FAR: the probability of recognizing fake registration as an authorized registration.
FAR =
Number of Falsely accepted images
Total number of imposter
∗ 100% (7)
FRR: the probability of recognizing an authorized registration as an impersonator.
FRR =
Number of Falsely reject images
Total number of genuine
∗ 100% (8)
EER: introduces the point when the FAR line intersects to the line of FRR.
5.2. Evaluation results
Serval experiments are conducted using different feature extraction algorithms such as canny edge
detection, SIFT, SURF, PCA and FSIFT. In each experiment, we used different distance matcher algorithms.
The evaluation results for each experiment are presented in Table 4. FAR and FRR charts for each distance
matcher algorithm are presented in Figure 7, 8 and 9 respectively. Time consuming chart for each experiment
are represented in Figure 10.
Table 4. Accuracy and security results when applying various feature extraction methods using different
matcher algorithms
Method Distance Measure FAR% FRR% Accuracy% Required Time (sec)
Cany edge detection
Eculidren 0.069 0.0813 91 180
Cosine 0.339 0.533 89 192
Hamming 0.039 0.132 92 176
SIFT
Eculidren 0.0039 0.036 96 228
Cosine 0.0244 0.434 94 280
Hamming 0.0019 0.031 97 216
SURF
Eculidren 0.0052 0.93 95 178
Cosine 0.0113 0.152 93 202
Hamming 0.0022 0.044 96 158
PCA
Eculidren 0.0071 0.081 94 188
Cosine 0.0250 0.362 90 212
Hamming 0.0058 0.088 92 195
Fast SIFT
Eculidren 0.0042 0.032 97 118
Cosine 0.0093 0.0073 95 130
Hamming 0.0015 0.025 98 103
8. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Intelligent Multimodal Identification System based on Local Feature Fusion… (Enas Abbas Abed)
231
Figure 7. FAR and FRR evaluation results
for each feature extraction algorithm based on
Euclidean distance matcher algorithm
Figure 8. FAR and FRR evaluation results
for each feature extraction algorithm based on
Cosine distance matcher algorithm
Figure 9. FAR and FRR evaluation results
for each feature extraction algorithm based on
Hamming distance matcher algorithm
Figure 10. Time consumption results for
each feature extraction algorithm
6. CONCLUSION
In this article, a smart multimodal pattern identification system for identifying a person's identity is
proposed based on different feature extraction and distance matcher algorithms. This system is identified the
iris and finger vein unique patterns and features for each individual to overcome many challenges such as
identity fraud, poor image quality, noise and instability of the surrounding environment. This system
provides an effective fusion scheme based on the incorporation of different features of each biometric system
and thus increase the efficiency that cannot be achieved in a single-modal identification system. Several
experiments were performed on a dataset containing 50 people and using the Hamming distance algorithm to
measure the similarity between a person and previously entered data. The results of the proposed system
were provided a higher accuracy of 98%, with false accept rate and false reject rate of 0.0015% and 0.025%,
respectively.
REFERENCES
[1] Stallings William, Brown Lawrie, Computer security: principles and practice / William Stallings, Lawrie Brown,
UNSW Canberra at the Australian Defence Force Academy, Fourth edi., New Jersey: Pearson Education, Inc
Hoboken, 2018.
[2] El-Gayar MM, Soliman H, Meky N., “A comparative study of image low level feature extraction algorithms,”
Egyptian Informatics Journal, vol. 14, no. 2, pp. 175–181, 2013.
[3] Delac K, Grgic M., “A survey of biometric recognition methods,” Proceedings. Elmar-2004. 46th International
Symposium on Electronics in Marine, Zadar, Croatia, 2004, pp. 184-193.
[4] Chauhan S, Arora AS, Kaul A., “A survey of emerging biometric modalities,” Procedia Comput Sci., vol. 2,
pp. 213–8, 2010.
[5] Rui Z, Yan AZ, Yan Z., “A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving
Identification,” IEEE Access, vol. 7, pp. 5994-6009, 2019.
[6] Bharadwaj S, Vatsa M, Singh R., “Biometric quality: a review of fingerprint, iris, and face,” Eurasip J. Image
Video Process., vol. 34, pp. 1–28, 2014.
[7] Nixon MS., Handbook of Biometric Anti-Spoofing, Springer, 2019.
[8] Masyn S, Vuchelen A, Santermans E, Rasschaert F, Bangura A, Parys W, et al., “Overcoming the challenges of iris
scanning to identify minors (1-4 years) in the real-world setting,” BMC research notes, vol. 12, pp. 1–6, 2019.
[9] Hoyle K. “Minutiae triplet-based features with extended ridge information for determining sufficiency in
fingerprints,” Master dissertation, Virginia Tech, 2011.
[10] Kumar A, Ravikanth C., “Personal authentication using finger knuckle surface,” IEEE Trans Inf Forensics Secur.,
vol. 4, no. 1, pp. 98–110, 2009.
[11] Gonzalez-Jimenez D, Alba-Castro JL., “Toward Pose-Invariant 2-D Face Recognition Through Point Distribution
Models and Facial Symmetry,” IEEE Trans Inf Forensics Secur., vol. 2, no. 3, pp. 413–429, 2007.
9. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 224 - 232
232
[12] Bud A., “Facing the future: the impact of Apple FaceID. Biometric Technol Today,” Biometric Technology Today,
vol. 2018, no. 1, pp. 5–7, 2018.
[13] Pillai JK, Patel VM, Chellappa R, Ratha NK, “Secure and robust Iris recognition using random projections and
sparse representations,” IEEE Trans Pattern Anal Mach Intell., vol. 33, no. 9, pp. 1877–1893, 2011.
[14] Thavalengal S, et al., “Proof-of-concept and evaluation of a dual function visible/NIR camera for iris authentication
in smartphones,” IEEE Trans Consum Electron, vol. 61, no. 2, pp. 137–143, 2015.
[15] Rigas I, Komogortsev O V., “Eye movement-driven defense against iris print-attacks” Pattern Recognit Lett.,
vol. 68, pp. 316–326, 2015.
[16] Bodade R, Talbar S., “Dynamic iris localisation: A novel approach suitable for fake iris detection,” International
Journal of Computer Information Systems and Industrial Management Applications, vol. 2. pp.163-173,2010.
[17] Lee HC, Kang BJ, Lee EC, Park KR., “Finger vein recognition using weighted local binary pattern code based on a
support vector machine,” J Zhejiang Univ Sci C., vol. 11, no. 7, pp. 514–524, 2010.
[18] Miura N, Nagasaka A, Miyatake T., “Feature extraction of finger-vein patterns based on repeated line tracking and
its application to personal identification,” Machine Vision and Applications, vol. 15, pp. 194–203, 2004.
[19] Jadhav M, Nerkar PM., “Implementation of an embedded hardware of FVRS on FPGA,” 2015 International
Conference on Information Processing (ICIP), Pune, 2015, pp. 48-53.
[20] Prabhakar S, Ivanisov A, Jain A., “Biometric recognition: Sensor characteristics and image quality,” IEEE
Instrumentation & Measurement Magazine, vol. 14, no. 3, pp. 10–16, 2011.
[21] Saevanee H, Bhattarakosol P., “Authenticating user using keystroke dynamics and finger pressure,” 2009 6th IEEE
Consumer Communications and Networking Conference, Las Vegas, NV, 2009, pp. 1-2.
[22] El-Gayar MM, Mekky NE, Atwan A, Soliman H., “Enhanced search engine using proposed framework and ranking
algorithm based on semantic relations,” IEEE Access, vol. 7, pp. 139337-139349, 2019.
[23] Al-Taie I, Azeez N, Basbrain A, Clark A., “The effect of distance similarity measures on the performance of face,
ear and palm biometric systems,” 2017 International Conference on Digital Image Computing: Techniques and
Applications (DICTA), Sydney, NSW, 2017, pp. 1-7.
[24] S. Arora and M. P. S. Bhatia, "A computer vision system for Iris recognition based on deep learning," 2018 IEEE
8th International Advance Computing Conference (IACC), Greater Noida, India, 2018, pp. 157-161.
[25] N. Jagadeesh and C. M. Patil, "Development of a new methodology for iris algorithm in biometric authentication
using hamming distance concepts," 2017 International Conference on Energy, Communication, Data Analytics and
Soft Computing (ICECDS), Chennai, 2017, pp. 3362-3365.
[26] Q. Zhang, H. Li, Z. Sun and T. Tan, "Deep feature fusion for Iris and periocular biometrics on mobile devices,"
IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2897-2912, 2018.
BIOGRAPHIES OF AUTHORS
Enas Abbas Abed Msc. University of Diyala, enasabbas1111@gmail.com. Enas A. Abed
received his B.E. degree in Computer Engineering from the University of Diyala in 2005, his
M.Sc. degree in Information System from Egypt/Banha University in 2018. She is currently
a lecturer in Diyala University, Iraq. His current research interests Information Retrieval, image
processing, and Artificial intelligence. Email: enasabbas1111@gmail.com.
Rana Jassim Mohammed Msc. University of Diyala. Rana J. Mohammed received his B.E.
degree in computer science from the University of Diyala in 2006, his M.Sc. degree in computer
science from the University of Diyala in 2019. She is currently a lecturer in Diyala University,
College of science, Department of computer science, Diyala, Iraq. His current research interests
cover image pre-processing, security, and authentication in mobile. Email:
ad.ranamohammed@uodiyala.edu.iq.
Msc. Dhafer Taha Shihab. University of Diyala/college of engineering, Dhafer T. Shihab, got a
bachelor's degree in computer engineering from the University of technology, Iraq in 2006 and
got a master's degree in Computer Engineering and information from Bulgord State Technical
University, Russia in 2014. Currently teaching as Assistant Lecture at the Faculty of
Engineering/Diyal. Email: dhafershihab@gmail.com.