AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this paper, a new method called as BioHashing which follows the technique of cancellable biometrics in the fingerprint domain is proposed. This proposed method does not require the re-alignment of fingerprints as all the minutiae are translated into a pre-defined two dimensional space based on a reference minutia. After that, the proposed Biohashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed approach is very much resistant to minor translation error and rotation distortion. An Equal Error Rates (EER) of less than 1% is achieved in this approach and performance of the approach is also significant.
A Review on Robust identity verification using signature of a personEditor IJMTER
Signature is behavioural type biometrics characteristics of human. Signature has been a
distinguishing feature for person identification. In these days increasing number of transactions,
especially related to financial and business are being authorized via signatures. Two types of
verification methods are: Offline signature verification and online signature verification. In this paper
we review various components of offline signature reorganization and verification system, feature
extraction techniques and available techniques.
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this paper, a new method called as BioHashing which follows the technique of cancellable biometrics in the fingerprint domain is proposed. This proposed method does not require the re-alignment of fingerprints as all the minutiae are translated into a pre-defined two dimensional space based on a reference minutia. After that, the proposed Biohashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed approach is very much resistant to minor translation error and rotation distortion. An Equal Error Rates (EER) of less than 1% is achieved in this approach and performance of the approach is also significant.
A Review on Robust identity verification using signature of a personEditor IJMTER
Signature is behavioural type biometrics characteristics of human. Signature has been a
distinguishing feature for person identification. In these days increasing number of transactions,
especially related to financial and business are being authorized via signatures. Two types of
verification methods are: Offline signature verification and online signature verification. In this paper
we review various components of offline signature reorganization and verification system, feature
extraction techniques and available techniques.
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
This paper presents a signature verification system that used Freeman Chain Code (FCC) as directional feature and data representation. There are 47 features were extracted from the signature images from six global features. Before extracting the features, the raw images were undergoing pre-processing stages which were binarization, noise removal by using media filter, cropping and thinning to produce Thinned Binary Image (TBI). Euclidean distance is measured and matched between nearest neighbours to find the result. MCYT-SignatureOff-75 database was used. Based on our experiment, the lowest FRR achieved is 6.67% and lowest FAR is 12.44% with only 1.12 second computational time from nearest neighbour classifier. The results are compared with Artificial Neural Network (ANN) classifier.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
Offline handwritten signature identification using adaptive window positionin...sipij
The paper presents to address this challenge, we have proposed the use of Adaptive Window Positioning
technique which focuses on not just the meaning of the handwritten signature but also on the individuality
of the writer. This innovative technique divides the handwritten signature into 13 small windows of size nxn
(13x13). This size should be large enough to contain ample information about the style of the author and
small enough to ensure a good identification performance. The process was tested with a GPDS dataset
containing 4870 signature samples from 90 different writers by comparing the robust features of the test
signature with that of the user’s signature using an appropriate classifier. Experimental results reveal that
adaptive window positioning technique proved to be the efficient and reliable method for accurate
signature feature extraction for the identification of offline handwritten signatures .The contribution of this
technique can be used to detect signatures signed under emotional duress
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
In identity management system, commonly used biometric recognition system needs attention
towards issue of biometric template protection as far as more reliable solution is concerned. In
view of this biometric template protection algorithm should satisfy security, discriminability and
cancelability. As no single template protection method is capable of satisfying the basic
requirements, a novel technique for face template generation and protection is proposed. The
novel approach is proposed to provide security and accuracy in new user enrollment as well as
authentication process. This novel technique takes advantage of both the hybrid approach and
the binary discriminant analysis algorithm. This algorithm is designed on the basis of random
projection, binary discriminant analysis and fuzzy commitment scheme. Three publicly available
benchmark face databases are used for evaluation. The proposed novel technique enhances the
discriminability and recognition accuracy by 80% in terms of matching score of the face images
and provides high security.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
This paper presents a signature verification system that used Freeman Chain Code (FCC) as directional feature and data representation. There are 47 features were extracted from the signature images from six global features. Before extracting the features, the raw images were undergoing pre-processing stages which were binarization, noise removal by using media filter, cropping and thinning to produce Thinned Binary Image (TBI). Euclidean distance is measured and matched between nearest neighbours to find the result. MCYT-SignatureOff-75 database was used. Based on our experiment, the lowest FRR achieved is 6.67% and lowest FAR is 12.44% with only 1.12 second computational time from nearest neighbour classifier. The results are compared with Artificial Neural Network (ANN) classifier.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
Offline handwritten signature identification using adaptive window positionin...sipij
The paper presents to address this challenge, we have proposed the use of Adaptive Window Positioning
technique which focuses on not just the meaning of the handwritten signature but also on the individuality
of the writer. This innovative technique divides the handwritten signature into 13 small windows of size nxn
(13x13). This size should be large enough to contain ample information about the style of the author and
small enough to ensure a good identification performance. The process was tested with a GPDS dataset
containing 4870 signature samples from 90 different writers by comparing the robust features of the test
signature with that of the user’s signature using an appropriate classifier. Experimental results reveal that
adaptive window positioning technique proved to be the efficient and reliable method for accurate
signature feature extraction for the identification of offline handwritten signatures .The contribution of this
technique can be used to detect signatures signed under emotional duress
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
In identity management system, commonly used biometric recognition system needs attention
towards issue of biometric template protection as far as more reliable solution is concerned. In
view of this biometric template protection algorithm should satisfy security, discriminability and
cancelability. As no single template protection method is capable of satisfying the basic
requirements, a novel technique for face template generation and protection is proposed. The
novel approach is proposed to provide security and accuracy in new user enrollment as well as
authentication process. This novel technique takes advantage of both the hybrid approach and
the binary discriminant analysis algorithm. This algorithm is designed on the basis of random
projection, binary discriminant analysis and fuzzy commitment scheme. Three publicly available
benchmark face databases are used for evaluation. The proposed novel technique enhances the
discriminability and recognition accuracy by 80% in terms of matching score of the face images
and provides high security.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
In this article, a main perspective of developing and implementing fingerprint extraction and matching
algorithms as a part of fingerprint recognition system is focused. First, developing a simple algorithm to
extract fingerprint features and test this algorithm on PC. The second thing is implementing this algorithm
into FPGA devices. The major research topics on which the proposed approach is developing and
modifying fingerprint extraction feature algorithm. This development and modification are using crossing
number method on pixel representation value ’0’. In this new proposed algorithm, it is no need a process
concerning ROI segmentation and no trigonometry calculation. And specially in obtaining their parameters
using Angle Calculation Block avoiding floating points calculation. As this method is local feature that
usually involve with 60-100 minutiae points, makes the template is small in size. Providing FAR, FRR and
EER, performs the performance evaluation of proposed algorithm. The result is an adaptable fingerprint
minutiae extraction algorithm into hardware implementation with 14.05 % of EER, better than reference
algorithm, which is 20.39 % .The computational time is 18 seconds less than a similar method, which takes
60-90 seconds just for pre-processing step. The first step of algorithm implementation in hardware
environment (embedded) using FPGA Device by developing IP Core without using any soft processor is
presented.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
Abstract The signature forgery can be restricted by either online or offline signature verification techniques. It verifies the signature by
performing a match with the pre-processed signature dynamically by detecting the motion of stylus during signature while on
other hand, offline verifies by performing a match using the two dimensional scanned image of the signature. This paper studies
about the various techniques available in offline signature verification along with their shadows.
Keywords: Signature Verification, Weighted Distance, High Pressure Factor, Normalization, Threshold Value
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
Many industries have made widespread use of the handwittern signature verification system, including banking, education, legal proceedings, and criminal investigation, in which verification and identification are absolutely necessary. In this research, we have developed an accurate offline signature verification model that can be used in a writer-independent scenario. First, the handwitten signature images went through four preprocessing stages in order to be suitable for finding the unique features. Then, three different types of features namely principal component analysis (PCA) as appearance-based features, gray-level co-occurrence matrix (GLCM) as texture-features, and fast Fourier transform (FFT) as frequency-features are extracted from signature images in order to build a hybrid feature vector for each image. Finally, to classify signature features, we have designed a proposed fast hyper deep neural network (FHDNN) architecture. Two different datasets are used to evaluate our model these are SigComp2011, and CEDAR datasets. The results collected demonstrate that the suggested model can operate with accuracy equal to 100%, outperforming several of its predecessors. In the terms of (precision, recall, and F-score) it gives a very good results for both datasets and exceeds (1.00, 0.487, and 0.655 respectively) on Sigcomp2011 dataset and (1.00, 0.507, and 0.672 respectively) on CEDAR dataset.
Our day-to-day lives are filled with situations
where we need to prove who we are; may it be for personal
reasons or as part of your profession. Locks are to be opened,
e-mail accounts are to be accessed and purchases are to be
made – but only by the person correctly authorized to do so.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.