SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2621
Biometric Traits and applications of Fingerprint
Ganesh B. Dongre1, Shekhar M. Jagade2
1Research Scholar, CSMSS College of Polytechnic, Aurangabad
2Principal, S.T.B. College of Engineering, Tuljapur, Dist. Osmanabad. [MS], India
------------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract - Few decades ago, using fingerprints for
identification and verification was sign of illiterateness.
Now, it’s the technology and ultimatums with permanence
of fingerprints, which reversed this concept and the same
fingerprints are used by all persons including illiterate as
well as literate persons. Fingerprints are now
authentication, recognition, identity, attendance, key of
digital locks and so on, covering different areas like
industrial, commercial, civilian, security, financial services,
data analysis etc. fingerprint can be used for gender
identification which gives about 86% results.
Key Words: fingerprints, authentication, Biometric, Traits,
and Gender.
1. INTRODUCTION
Biometric is the measurement of human body
parts and/or behavioural characteristics (also called as
biometric traits) with different types of calculations.
Biometric traits roughly include face retina and iris [12],
fingerprint, palm prints hand texture, ear contour, gait,
signature, facial expression and voice. To use the
biometric system for identification and/or verification of
individuals needs to create database of user using
particular methods including different kind of sensors
modules, measurement and analysing methods. The
identification and verification of different methods used
for the various applications may have some problems. For
example say PIN or password, or say keys or Identity
cards, etc. These methods may have the problem of
duplicity, may get lost, may be stolen or it may be guessed
very easily. The behavioural biometric characteristics like
sign, voice, facial expressions, etc. have main problem of
duplicity. The mimicry persons are giving us the similar
voice as that of the famous personalities. There are many
cases of sign duplicity in various banks and other places.
But normally, the body parts of human being may remain
fix and unchanged. These likely to be unchanged parts of
human body are known as biometrics. The biometrical
recognition refers to the use of various behavioural and
anatomical characteristics which also known as identifiers
like Fingerprints, hand geometry, face, voice, iris, etc.
2. LITERATURE REVIEW
Anil K. Jain et. al. explained the intend and completion of a
sample automatic identity-authentication system that uses
fingerprints to authenticate the identity of an individual.
They have developed an improved minutiae-extraction
algorithm that is faster and more accurate than our earlier
algorithm. An alignment-based minutiae-matching
algorithm has been proposed. This algorithm is competent
of verdict the correspondences between input minutiae
and the stored pattern without resorting to
comprehensive investigate and has the capability to
recompense adaptively for the nonlinear deformations
and inexact transformations between an input and a
template the experimental results reveal that system can
achieve a good performance on these data bases. They also
have demonstrated that their system satisfies the
response-time requirement. A whole verification
procedure, on average, takes about 1.4 seconds on a Sun
ULTRA 1 workstation [1].
Lin Hing et. al. Developed a prototype biometric system
that integrates faces and fingerprints. The system
overcomes the limitations of face recognition as well as
fingerprint verification systems. The integrated prototype
system operates in the recognition mode with the
admissible response time. The identity established by the
system is very correct. Additionally decision combination
scheme enables presentation improvement by integrating
multiple cues with different confidence measures.
Experimental results shows that their system performs
well. It meets the response time and correct requirements.
Index Terms—Biometrics, fingerprint matching, minutiae,
face recognition [2].
Anil K. Jain et. al. Introduced little overview of the field of
biometrics and summed up some compensation,
drawback, strengths, limitations, and related privacy
concerns. A wide range of systems needs accurate
personal identification schemes to confirm or examine the
recognition of an individual requesting their services. The
aim of such schemes is to ensure, the rendered services
are accessed only by a legitimate user and no one other.
Examples of such applications involve secure access to
buildings, computer systems, laptops, cellular phones, and
ATMs. Biometric recognition, or simply biometrics refers
to the automatic identification of individuals based on
physiological and/or behavioral characteristics. It is
achievable to confirm an individual's identity based on
"who she is", rather than by "what she possesses" or "what
she remembers” with the help of biometrics [3].
Arun Gaikwad et. al. proposed image post processing
method. Automatic Fingerprint Identification System is
used for personal recognition due to outstanding
performance of fingerprints. Minutiae-based fingerprint
matching technique is used to match fingerprint.
Fingerprint matching results and accuracy rely on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2622
presence of valid minutiae. As per this research work good
methods for fingerprint image post-processing, which is
used to freeze out a large number of wrong extracted
minutiae from skeletonised fingerprint images. They
recommended a windowing post-processing method. The
neighbourhood of all minutia within the window and
check for minutia validation and invalidation. This work
presents whole pre-processing structure including new
segmentation method. It is required to remove region of
interest accurately from a fingerprint image. Experimental
results achieved by the proposed approach show efficient
reduction of false minutiae [4].
Jang-Hee Yoo et. al. explained an automated system that
categorized gender using human gait data. In this research
work methods of classification divided in to three stages:
a) detection and extraction of the moving human body and
its contour from image sequences; b) extraction of human
gait signature by the joint angles and body points; and c)
motion analysis and feature extraction for classifying
gender in the gait patterns. Set of 2D stick figure is used to
represent the gait signature that is basic data for the
article generation formed on motion parameters. SVM
classifier is utilize to classified gender in the gait patterns.
In this research, higher gender categorization presentation
is done [5].
D. Gnanna Rajesh et. al. proposed efficient algorithm to
recognize the gender. Gender classification is the
prominent task in the field of forensic anthropology that
reduces the list of doubtful search. The current systems
uses the parts of body like use the availability of bones,
teeth and other identifiable, having physical features that
allow gender and age estimation by conventional methods.
The various biometrics traits as face, gait, iris, speech and
fingerprints are used to recognize the gender and age.
Among them biometrics, fingerprint is most commonly
available in any crime scene. In the study, an efficient
algorithm to recognize the gender of a given fingerprint
into male or female is identified. Un-decimated Wavelet
Transform technique is employed to extract the features
from the fingerprints by applying ranking. Secondly,
Gaussian Mixture Models technique is used as classifier for
the process of gender classification [6].
3. COMPARISON OF BIOMETRIC TRAITS:
Any biometric system using biometric traits] can be used
to recognize the individuals provided that the traits must
satisfy some requirements mentioned below,
 Universality: Individuals using trait based
biometric system must possess particular trait
which is acceptable universally.
 Uniqueness: Traits used for biometric system
must be sufficiently different than other user and
must have unique characteristics.
 Permanence: Biometric trait supposed to be
fixed irrespective of time lapsed. It should remain
permanent irrespective of changes in time, or
related conditions.
 Collectability: Biometric traits must be
measurable in quantitative manner.
 Performance: Biometric traits must be robust,
accurate and fast recognizable consistently
 Acceptability: Must be acceptable by user of
biometric system for frequent use.
 Circumvention: Biometric traits must be easy to
use and must not got cheated by fraudulent
methods
As every biometric trait is considered to be
distinct in individuals and used as per requirement of
application or requirements, they have its own advantages
and disadvantages. The performance of any trait based
system depends on fulfilment of above requirement and if
any one of the said requirement is failed, it can be big
hurdle to the system and system may malfunction which is
not overall accepted.
Table 1 Methods and Techniques of Identification and
verification technologies with their Related Problems
Method Problems
PIN, Passwords, identity
cards, keys
Forgot, stolen, guessed
easily, lost, duplicate
Behavioural biometric
characteristics like sign,
voice, facial expression
Duplicate
Body parts biometrics Likely to be fixed
4. DIFFERENT TRAITS WHICH ARE USED FOR
BIOMETRICS RECOGNITION
Face: In face based biometric system features of face like
nose, facial structure, mouth and lip structure, jaw edges,
distance between eyes etc. are analysed and used for
confirmation of the same user. The images captured
through camera are used as input image and database of
system users are stored for matching. For gender
recognition, face recognition does not work upto the mark
because it can be cheated easily. The makeover and
makeup can change some dimensions and also the
operations like plastic
surgery can change the look.
Ratina: Touch less low
intensity light source and
optical coupler are used for
retinal scan which captures
the retinal features like
blood vessels of eyes but
user need to see with bear
eyes and cannot use glasses
or contact lenses. The
devises used for the retinal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2623
scan are rare and may not be available very easily.
Iris: More than 200 points of
coloured tissue around the pupil
are used in iris based biometric
systems in which user can enrol
his iris features using iris scan
device. Many times this method
works even if user wear spectacle
on eyes. Though this method is
good for user verification but can
be fooled by using fake eyes and therefore less suitable for
gender recognition.
Hand Geometry:
Measurement of user hand is
the key for hand geometry
technique in which special
hardware is needed to enrol
user hand shape and
measurements of fingers (in
some cases pressure also). This
system will be cheated by fake
hands as there is no any method to detect the liveliness of
hand and unlike fingerprint hand shapes or hand
geometries are not unique hence cannot be fairly used for
user authentication and to
predict the gender of user.
Hand Vein: On the
consideration that thickness
and location of vein is
unique in the humans, the
Patterns of vain of hand are
captured by using infrared
scan which creates image
and can be used for user
identification.
Signature: Signature is the
handwritten depiction of
individual and varies user
to user. Signature
verification systems can be
online or offline. It does not
contain information to
predict the gender hence it is not used for gender
identification.
Voice: Audio samples are
collected and features of
audio like tone, frequency
and pitch are analysed for
identification of user. As
this method suffers from
background noise and can
be fooled by mimicry this
method is not widely used
for recognition of user and gender recognition.
Fingerprint: In fingerprint
based biometric system,
fingerprint images are captured
by using reader or scanner
which captures the fingerprint
image and analyse the features.
At the stage of verification it
performs one to one
comparison and for recognition
it performs one to many for
comparison. As the fingerprints
are having high permanence, high uniqueness and high
performance, the fingerprint plays a very important role in
the identification of gender. Also the Circumvention,
collectability, universality and acceptability of fingerprint
is very good, therefore the fingerprint biometric is very
effective in gender classification applications.
5. APPLICATION AREA OF BIOMETRICS:
There are various applications of biometrics in various
fields in our day to day life. For the security and access of
ATM, Credit card, Laptops, Mobile phones, Banking
applications, etc.
Figure 1: Various applications of e- access
Personal: Personal Computer login access, Mobile unlocks
access, PDA, home security, digital wallets, etc.
Commercial: ATM, E-commerce, health record
management, electronic data security, attendance at
workplace, hostel attendance systems, service access, etc.
Government: Nations ID like AADHAR, driving license,
voter id, welfare disbursement, passport, railway, airways,
etc.
Forensic: person identification, Criminal investigation,
law enforcement applications etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2624
6. FINAL RESULTS BY MASTER ALGORITHM
Overall results for the proposed system by using
all the technique in a master algorithm are presented in
this section. The screen shot of the result shown by
proposed algorithm is given as in figure.
Fig. 2: Screenshot showing results
Fig. 3: Graphical representation of 5- fold results obtained
by master algorithm using all the above techniques.
7. CONCLUSION
The proposed algorithm of fingerprint based
gender identification using above 5 techniques from R1 to
R5 when used combine, gives the average 86 percent
results.
REFERENCES
[1] Anil K. Jain, et.al. “An Introduction to Biometric
Recognition”,IEEE-T,2004
[2] Arun Gaikwad, et. al. “Fingerprint Image
Enhancement: Pre and Post Processing”,
[3] Jang-Hee Yoo, et.al. , “Gender Classification in
Human Gait Using Support Vector
Machine”,Springer,2005
[4] D. Gnana Rajeshet.al. “An Efficient Fingerprint
Based Gender Classification System Using
Dominant Un-decimated Wavelet Cpefficients”
[5] Eyup Burak Ceyhan, “Seref Sagiroglu, Statistical
Gender Analysis Based on Fingerprint Ridge
Density”, IEEE,2013
[6] Marjory Cristiany et.al., “Enhancing Identity
Prediction Using a Novel Approach to Combining
Hard and Soft Biometric Information”,IEEE,2010
[7] Eran Eidinger, et.al., “Age and Gender Estimation of
Unfiltered Faces”,IEEE,2014
[8] Mr. Jen-Feng Wang et. al. “ Gender Determination
using Fingertip Features”, Internet Journal of
Medical Update, Vol. 3, No. 2, Jul-Dec 2008.
[9] Le Hoang Thai, et. al. “Fingerprint recognition using
standardized fingerprint model” IJCSI International
Journal of Computer Science Issues, Vol. 7, Issue 3,
No 7, May 2010.
[10] P. Gnanasivam et. al. , “Estimation of Age Through
Fingerprints Using Wavelet
Transform and Singular Value Decomposition”
,International Journal of Biometrics and
Bioinformatics (IJBB), Vol. (6) : Issue (2) : 2012.
[11] Ms. Ritu Kaur et. al. “ A Study on Various Methods
of Gender Identification Based on Fingerprints” ,
International Journal of Emerging Technology and
Advanced Engineering Website: www.ijetae.com
(ISSN 2250-2459, Vol. 2, Issue 4, April 2012).
[12] Ms.Poonam Mote et. al. “Finger And Face
Recognition Biometric System”International
Journal of Scientific & Engineering Research Vol. 3,
Issue 10, October-2012 1 ISSN 2229-5518.
[13] T.Arulkumaran et. al., “Fingerprint Based Age
Estimation Using 2D Discrete Wavelet Transforms
and Principal Component Analysis”, International
Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering Vol. 2,
Issue 3, March 2013.
[14] Merlyn Francis et. al., “Gender Specification Using
Touch less Fingerprint Recognition”, International
Journal of Computer Applications Technology and
Research, Vol. 2– Issue 6, p.p. 717 - 722, 2013

More Related Content

What's hot

Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496IJRAT
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
IOSRJECE
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
IRJET Journal
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
ijcsa
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
iosrjce
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
IRJET Journal
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
iosrjce
 
IRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image ProcessingIRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image Processing
IRJET Journal
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
IRJET Journal
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
Editor IJCATR
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
IJERA Editor
 
Overview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at PurdueOverview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at Purdue
International Center for Biometric Research
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
Zac Darcy
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441IJRAT
 

What's hot (18)

Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
1879 1885
1879 18851879 1885
1879 1885
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
IRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image ProcessingIRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image Processing
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
Overview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at PurdueOverview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at Purdue
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 

Similar to IRJET - Biometric Traits and Applications of Fingerprint

Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
nooriasukmaningtyas
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
A study of multimodal biometric system
A study of multimodal biometric systemA study of multimodal biometric system
A study of multimodal biometric system
eSAT Publishing House
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
ijiert bestjournal
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
IJTET Journal
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
IOSR Journals
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
IRJET Journal
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
CSCJournals
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
eSAT Journals
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
IRJET Journal
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)
IRJET Journal
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
rahulmonikasharma
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
Bhavi Bhatia
 

Similar to IRJET - Biometric Traits and Applications of Fingerprint (20)

Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
A study of multimodal biometric system
A study of multimodal biometric systemA study of multimodal biometric system
A study of multimodal biometric system
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
D56021216
D56021216D56021216
D56021216
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

IRJET - Biometric Traits and Applications of Fingerprint

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2621 Biometric Traits and applications of Fingerprint Ganesh B. Dongre1, Shekhar M. Jagade2 1Research Scholar, CSMSS College of Polytechnic, Aurangabad 2Principal, S.T.B. College of Engineering, Tuljapur, Dist. Osmanabad. [MS], India ------------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract - Few decades ago, using fingerprints for identification and verification was sign of illiterateness. Now, it’s the technology and ultimatums with permanence of fingerprints, which reversed this concept and the same fingerprints are used by all persons including illiterate as well as literate persons. Fingerprints are now authentication, recognition, identity, attendance, key of digital locks and so on, covering different areas like industrial, commercial, civilian, security, financial services, data analysis etc. fingerprint can be used for gender identification which gives about 86% results. Key Words: fingerprints, authentication, Biometric, Traits, and Gender. 1. INTRODUCTION Biometric is the measurement of human body parts and/or behavioural characteristics (also called as biometric traits) with different types of calculations. Biometric traits roughly include face retina and iris [12], fingerprint, palm prints hand texture, ear contour, gait, signature, facial expression and voice. To use the biometric system for identification and/or verification of individuals needs to create database of user using particular methods including different kind of sensors modules, measurement and analysing methods. The identification and verification of different methods used for the various applications may have some problems. For example say PIN or password, or say keys or Identity cards, etc. These methods may have the problem of duplicity, may get lost, may be stolen or it may be guessed very easily. The behavioural biometric characteristics like sign, voice, facial expressions, etc. have main problem of duplicity. The mimicry persons are giving us the similar voice as that of the famous personalities. There are many cases of sign duplicity in various banks and other places. But normally, the body parts of human being may remain fix and unchanged. These likely to be unchanged parts of human body are known as biometrics. The biometrical recognition refers to the use of various behavioural and anatomical characteristics which also known as identifiers like Fingerprints, hand geometry, face, voice, iris, etc. 2. LITERATURE REVIEW Anil K. Jain et. al. explained the intend and completion of a sample automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. They have developed an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm. An alignment-based minutiae-matching algorithm has been proposed. This algorithm is competent of verdict the correspondences between input minutiae and the stored pattern without resorting to comprehensive investigate and has the capability to recompense adaptively for the nonlinear deformations and inexact transformations between an input and a template the experimental results reveal that system can achieve a good performance on these data bases. They also have demonstrated that their system satisfies the response-time requirement. A whole verification procedure, on average, takes about 1.4 seconds on a Sun ULTRA 1 workstation [1]. Lin Hing et. al. Developed a prototype biometric system that integrates faces and fingerprints. The system overcomes the limitations of face recognition as well as fingerprint verification systems. The integrated prototype system operates in the recognition mode with the admissible response time. The identity established by the system is very correct. Additionally decision combination scheme enables presentation improvement by integrating multiple cues with different confidence measures. Experimental results shows that their system performs well. It meets the response time and correct requirements. Index Terms—Biometrics, fingerprint matching, minutiae, face recognition [2]. Anil K. Jain et. al. Introduced little overview of the field of biometrics and summed up some compensation, drawback, strengths, limitations, and related privacy concerns. A wide range of systems needs accurate personal identification schemes to confirm or examine the recognition of an individual requesting their services. The aim of such schemes is to ensure, the rendered services are accessed only by a legitimate user and no one other. Examples of such applications involve secure access to buildings, computer systems, laptops, cellular phones, and ATMs. Biometric recognition, or simply biometrics refers to the automatic identification of individuals based on physiological and/or behavioral characteristics. It is achievable to confirm an individual's identity based on "who she is", rather than by "what she possesses" or "what she remembers” with the help of biometrics [3]. Arun Gaikwad et. al. proposed image post processing method. Automatic Fingerprint Identification System is used for personal recognition due to outstanding performance of fingerprints. Minutiae-based fingerprint matching technique is used to match fingerprint. Fingerprint matching results and accuracy rely on
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2622 presence of valid minutiae. As per this research work good methods for fingerprint image post-processing, which is used to freeze out a large number of wrong extracted minutiae from skeletonised fingerprint images. They recommended a windowing post-processing method. The neighbourhood of all minutia within the window and check for minutia validation and invalidation. This work presents whole pre-processing structure including new segmentation method. It is required to remove region of interest accurately from a fingerprint image. Experimental results achieved by the proposed approach show efficient reduction of false minutiae [4]. Jang-Hee Yoo et. al. explained an automated system that categorized gender using human gait data. In this research work methods of classification divided in to three stages: a) detection and extraction of the moving human body and its contour from image sequences; b) extraction of human gait signature by the joint angles and body points; and c) motion analysis and feature extraction for classifying gender in the gait patterns. Set of 2D stick figure is used to represent the gait signature that is basic data for the article generation formed on motion parameters. SVM classifier is utilize to classified gender in the gait patterns. In this research, higher gender categorization presentation is done [5]. D. Gnanna Rajesh et. al. proposed efficient algorithm to recognize the gender. Gender classification is the prominent task in the field of forensic anthropology that reduces the list of doubtful search. The current systems uses the parts of body like use the availability of bones, teeth and other identifiable, having physical features that allow gender and age estimation by conventional methods. The various biometrics traits as face, gait, iris, speech and fingerprints are used to recognize the gender and age. Among them biometrics, fingerprint is most commonly available in any crime scene. In the study, an efficient algorithm to recognize the gender of a given fingerprint into male or female is identified. Un-decimated Wavelet Transform technique is employed to extract the features from the fingerprints by applying ranking. Secondly, Gaussian Mixture Models technique is used as classifier for the process of gender classification [6]. 3. COMPARISON OF BIOMETRIC TRAITS: Any biometric system using biometric traits] can be used to recognize the individuals provided that the traits must satisfy some requirements mentioned below,  Universality: Individuals using trait based biometric system must possess particular trait which is acceptable universally.  Uniqueness: Traits used for biometric system must be sufficiently different than other user and must have unique characteristics.  Permanence: Biometric trait supposed to be fixed irrespective of time lapsed. It should remain permanent irrespective of changes in time, or related conditions.  Collectability: Biometric traits must be measurable in quantitative manner.  Performance: Biometric traits must be robust, accurate and fast recognizable consistently  Acceptability: Must be acceptable by user of biometric system for frequent use.  Circumvention: Biometric traits must be easy to use and must not got cheated by fraudulent methods As every biometric trait is considered to be distinct in individuals and used as per requirement of application or requirements, they have its own advantages and disadvantages. The performance of any trait based system depends on fulfilment of above requirement and if any one of the said requirement is failed, it can be big hurdle to the system and system may malfunction which is not overall accepted. Table 1 Methods and Techniques of Identification and verification technologies with their Related Problems Method Problems PIN, Passwords, identity cards, keys Forgot, stolen, guessed easily, lost, duplicate Behavioural biometric characteristics like sign, voice, facial expression Duplicate Body parts biometrics Likely to be fixed 4. DIFFERENT TRAITS WHICH ARE USED FOR BIOMETRICS RECOGNITION Face: In face based biometric system features of face like nose, facial structure, mouth and lip structure, jaw edges, distance between eyes etc. are analysed and used for confirmation of the same user. The images captured through camera are used as input image and database of system users are stored for matching. For gender recognition, face recognition does not work upto the mark because it can be cheated easily. The makeover and makeup can change some dimensions and also the operations like plastic surgery can change the look. Ratina: Touch less low intensity light source and optical coupler are used for retinal scan which captures the retinal features like blood vessels of eyes but user need to see with bear eyes and cannot use glasses or contact lenses. The devises used for the retinal
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2623 scan are rare and may not be available very easily. Iris: More than 200 points of coloured tissue around the pupil are used in iris based biometric systems in which user can enrol his iris features using iris scan device. Many times this method works even if user wear spectacle on eyes. Though this method is good for user verification but can be fooled by using fake eyes and therefore less suitable for gender recognition. Hand Geometry: Measurement of user hand is the key for hand geometry technique in which special hardware is needed to enrol user hand shape and measurements of fingers (in some cases pressure also). This system will be cheated by fake hands as there is no any method to detect the liveliness of hand and unlike fingerprint hand shapes or hand geometries are not unique hence cannot be fairly used for user authentication and to predict the gender of user. Hand Vein: On the consideration that thickness and location of vein is unique in the humans, the Patterns of vain of hand are captured by using infrared scan which creates image and can be used for user identification. Signature: Signature is the handwritten depiction of individual and varies user to user. Signature verification systems can be online or offline. It does not contain information to predict the gender hence it is not used for gender identification. Voice: Audio samples are collected and features of audio like tone, frequency and pitch are analysed for identification of user. As this method suffers from background noise and can be fooled by mimicry this method is not widely used for recognition of user and gender recognition. Fingerprint: In fingerprint based biometric system, fingerprint images are captured by using reader or scanner which captures the fingerprint image and analyse the features. At the stage of verification it performs one to one comparison and for recognition it performs one to many for comparison. As the fingerprints are having high permanence, high uniqueness and high performance, the fingerprint plays a very important role in the identification of gender. Also the Circumvention, collectability, universality and acceptability of fingerprint is very good, therefore the fingerprint biometric is very effective in gender classification applications. 5. APPLICATION AREA OF BIOMETRICS: There are various applications of biometrics in various fields in our day to day life. For the security and access of ATM, Credit card, Laptops, Mobile phones, Banking applications, etc. Figure 1: Various applications of e- access Personal: Personal Computer login access, Mobile unlocks access, PDA, home security, digital wallets, etc. Commercial: ATM, E-commerce, health record management, electronic data security, attendance at workplace, hostel attendance systems, service access, etc. Government: Nations ID like AADHAR, driving license, voter id, welfare disbursement, passport, railway, airways, etc. Forensic: person identification, Criminal investigation, law enforcement applications etc.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2624 6. FINAL RESULTS BY MASTER ALGORITHM Overall results for the proposed system by using all the technique in a master algorithm are presented in this section. The screen shot of the result shown by proposed algorithm is given as in figure. Fig. 2: Screenshot showing results Fig. 3: Graphical representation of 5- fold results obtained by master algorithm using all the above techniques. 7. CONCLUSION The proposed algorithm of fingerprint based gender identification using above 5 techniques from R1 to R5 when used combine, gives the average 86 percent results. REFERENCES [1] Anil K. Jain, et.al. “An Introduction to Biometric Recognition”,IEEE-T,2004 [2] Arun Gaikwad, et. al. “Fingerprint Image Enhancement: Pre and Post Processing”, [3] Jang-Hee Yoo, et.al. , “Gender Classification in Human Gait Using Support Vector Machine”,Springer,2005 [4] D. Gnana Rajeshet.al. “An Efficient Fingerprint Based Gender Classification System Using Dominant Un-decimated Wavelet Cpefficients” [5] Eyup Burak Ceyhan, “Seref Sagiroglu, Statistical Gender Analysis Based on Fingerprint Ridge Density”, IEEE,2013 [6] Marjory Cristiany et.al., “Enhancing Identity Prediction Using a Novel Approach to Combining Hard and Soft Biometric Information”,IEEE,2010 [7] Eran Eidinger, et.al., “Age and Gender Estimation of Unfiltered Faces”,IEEE,2014 [8] Mr. Jen-Feng Wang et. al. “ Gender Determination using Fingertip Features”, Internet Journal of Medical Update, Vol. 3, No. 2, Jul-Dec 2008. [9] Le Hoang Thai, et. al. “Fingerprint recognition using standardized fingerprint model” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 7, May 2010. [10] P. Gnanasivam et. al. , “Estimation of Age Through Fingerprints Using Wavelet Transform and Singular Value Decomposition” ,International Journal of Biometrics and Bioinformatics (IJBB), Vol. (6) : Issue (2) : 2012. [11] Ms. Ritu Kaur et. al. “ A Study on Various Methods of Gender Identification Based on Fingerprints” , International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Vol. 2, Issue 4, April 2012). [12] Ms.Poonam Mote et. al. “Finger And Face Recognition Biometric System”International Journal of Scientific & Engineering Research Vol. 3, Issue 10, October-2012 1 ISSN 2229-5518. [13] T.Arulkumaran et. al., “Fingerprint Based Age Estimation Using 2D Discrete Wavelet Transforms and Principal Component Analysis”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 3, March 2013. [14] Merlyn Francis et. al., “Gender Specification Using Touch less Fingerprint Recognition”, International Journal of Computer Applications Technology and Research, Vol. 2– Issue 6, p.p. 717 - 722, 2013