SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Engineering Research and Development 
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com 
Volume 10, Issue 7 (July 2014), PP.69-75 
Performance Analysis of Fused Eye Vein and Finger Vein 
Multimodal Biometric System 
Ms.S.Brindha1, Dr.Ila.Vennila2, Ms.B.Nivedetha3 
1Department of Computer Networking, PSG Polytechnic College, Coimbatore, India. 
2Department of Electrical and Electronics Engg., PSG College of Technology, Coimbatore, India. 
3Department of Computer Networking, PSG Polytechnic College, Coimbatore, India. 
Abstract:- In recent years, biometric authentication has become one of the popular strategy for various 
applications like ATMs, online banking, e-commerce websites etc., New biometric modalities are currently 
being tested and implemented. In this paper, a relatively new paradigm using fusion of biometric images eye 
vein and finger vein is proposed. Though different multimodalities exist this combination is unique and gives 
promising results and hence can be considered in future as a positive biometric trait. The proposed approach is 
based on the fusion of the two traits by extracting independent feature pointsets from the two modalities and 
making them compatible for concatenation. The concatenated feature pointset has better discrimination power 
than the individual feature vectors. The proposed eye vein and finger vein fused template was evaluated using 
publicly available UBIRIS, IUPUI and SDUMLA-HMT multi wavelength database. The experimental results 
show that this technique is efficient and provides accurate identity verification than other biometric traits. 
Keywords:- Biometrics, Multimodal, Eye vein, Sclera, Fingervein, Authentication. 
I. INTRODUCTION 
User authentication is extremely important for computer and network system security. Currently, 
knowledge based methods and token based methods are the most popular approaches. However, these methods 
have a number of security flaws. For example, passwords can be easily shared, stolen, and forgotten. Similarly, 
smart cards can be shared, stolen, duplicated, or lost. To circumvent these issues, a number of login 
authentication methods, including textual, graphical passwords and biometric authentication have been utilized. 
Some of the commonly used hard biometrics is Face, Sclera, Fingerprint, Iris, Fingervein etc. Soft 
biometrics includes Keystroke, Voice, Cloth colour, facial colour etc. A unimodal technique [3] is not sufficient 
to authenticate a user because the system sometimes cannot observe the biometric information correctly. To 
address the limitations of single biometrics, using multimodal biometrics is a good solution. It is the 
combination of two or more biometric traits to raise systems security and reliability. 
Multimodal Biometrics[1] system is capable of using more than one physiological or behavioural 
characteristic for enrolment, verification or identification. For biometric identification to be ultra-secure and 
provide above average accuracy, more than one type must be used as only one form of it may not be accurate 
enough. One example of this inaccuracy is in the area of fingerprints where at least 10% of people have worn, 
cut or unrecognizable prints. Combining the results obtained by different biometric traits by an effective fusion 
scheme can significantly improve the overall accuracy of the biometric system. The proposed work includes eye 
vein and Fingervein as shown in Fig.1 with their Multimodal biometric traits for authentication of the user. The 
blood vessel structure of the sclera is unique to each person, and it can be remotely obtained in the visible 
wavelengths. 
Fig.1: Multimodal biometrics of Eye vein and Finger vein 
69
Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 
Finger vein authentication is a new biometric method utilizing the vein patterns inside one’s fingers for 
personal identity verification. Unlike some biometric systems, blood vessel patterns are almost impossible to 
counterfeit because they are located beneath the skin's surface. These unique aspects of finger vein pattern 
recognition set it apart from previous forms of biometrics. The most vulnerable part of the vein system is that 
there are some factors like body temperature, ambient temperature, humidity, camera calibration and focus that 
may affect the quality of the image, which in turn will affect the verification rate. The finger print and iris 
system also has considerable weaknesses - it is not that resistant to spoof attack, as they are physical entities. 
The proposed work uses multimodal biometrics of sclera blood vein pattern and fingervein. For login users can 
use the cryptographic key generated from the fused template of sclera blood veins and fingervein as they are 
unique to each individual and it is more accurate than any other biometric. The experimental results show that 
sclera recognition is a promising new biometrics for positive human ID. A new method for sclera segmentation 
which works for both colour and grayscale images is proposed and, we designed a Gabor wavelet-based sclera 
pattern enhancement method to emphasize and binarize the sclera vessel patterns. 
During verification the sclera [7] and fingervein images of the user are taken as input through 
respective sensors and compared with the information stored in the database to verify automatically the identity 
of its owner. In other words, this mechanism allows to verify quickly the claimed identity of the person holding 
the paper document (such as an admission ticket), without requiring human intervention, by just comparing 
locally the output of his/her biometric trait with the data stored in the document itself. There are few typical 
scenarios for this application. For example, there are several cases of money transaction through banks and 
cockpit in planes can be controlled through this authentication. This authentication can be used in the diplomatic 
passports for higher officials holding important positions as shown in Fig.2. 
In addition, the cryptographic key generated from biometric data can also be secured within the ATM 
cards which can be verified during their transaction. Latest mobile phones and laptops can be featured with high 
resolution cameras and finger vein reader to enable its users to authenticate easily. This type of authentication 
can be used for high security access like military, research centres, scientific organisations etc. 
Fig.2: Finger vein and Eye vein imaging systems 
II. EXTRACTION OF EYE VEIN 
Sclera is the white portion surrounding the eye as opaque outer protective covering of the eye as shown 
in Fig.3. Extraction of sclera vessel pattern is to identify and extract the vein portions of sclera from the original 
eye image for processing and identification. 
To segment the sclera from eye image the process involved are segment sclera, extract sclera features 
and enhance the vessel patterns, matching the features of sclera veins, and decision matching[8]. First we have 
to downsample the UBIRIS database image, this downsampling reduces the size of original image to required 
size. The image is converted from the RGB colorspace to HSV colorspace. Second, detect the eyelid boundary 
and segment iris region using active contour method. Gabor filter is used for extraction of vein pattern from the 
segmented sclera region and enhanced. The enhanced vein patterns are thresholded using an adaptive threshold 
method to emphasize and binarize the sclera vein pattern, and thinned to a pixel wide skeleton using 
morphological operations as shown in Fig.4. 
70
Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 
Fig.3: Human eye pattern 
Finally, line descriptor based feature extraction method is used to describe and store the extracted vein 
pattern for recognition, registration, and matching method that is scale, orientation, and deformation-invariant, 
and can mitigate the multi-layered deformation effects and tolerate segmentation error. The feature matching 
system uses an enrolment system to register the sclera vein templates [6] to achieve translation, rotation, and 
scaling-invariance. Then, cross-correlation distance measure is used to match the templates using their line 
descriptor sets. Finally, the matching score is determined from the weighted matching scores, and is used to 
determine if the two descriptors match. 
(a) (b) (c) (d) (e) (f) (g) (h) 
Fig.4: (a) Input eye image (b) Grayscale image (c) Eyelid detection (d) Iris boundary detection 
(e) Sclera mask (f) Segmented Sclera (g) Vessel pattern- after morphological operation 
(h) Extracted minutiae 
III. EXTRACTION OF FINGER VEIN 
Nearly all veins in a human body (such as retinal vein, facial vein, veins in hand) can be used for 
personal identification, but veins in hand are always preferred. To obtain the pattern for the database record, an 
individual inserts a finger into an attester terminal containing a near-infrared LED light as shown in Fig.5 or a 
monochrome CCD (charge-coupled device) camera. The haemoglobin in the blood absorbs near-infrared LED 
light, which makes the vein system appear as a dark pattern of lines. The camera records the image and the raw 
data is digitized, certified and sent to a database of registered images. For authentication purposes, the finger is 
scanned as before and the data is sent to the database of registered images for comparison. The authentication 
process takes less than two seconds. 
Fig.5: Fingervein system 
Biometric systems based on fingerprints can be fooled with a dummy finger fitted with a copied 
fingerprint; voice and facial characteristic-based systems can be fooled by recordings and high-resolution 
images. The finger vein ID system is much harder to fool because it can only authenticate the finger of a living 
person. The configurations of parallel ridges and valleys with well defined frequency and orientation in a 
Fingervein image provide useful information which helps in re-moving undesired noise. Therefore, a band pass 
filter is used to tune the corresponding frequency. Moreover, orientation can efficiently remove the undesired 
noise and preserve the true ridge and valley structures. Gabor filters have both frequency and orientation 
selective properties and have optimal joint resolution in both spatial and frequency domains. Therefore, it is 
appropriate to use Gabor filters as band pass filters to remove the noise and preserve true ridge/valley structures. 
The circular Gabor filter is an effective tool for texture analysis, and has the following general form: 
71
Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 
72 
Eqn 1 
G(x,y,θ,μ,σ) = exp - exp{2πi(ux cos θ + uy sin θ)} 
The next step in finger vein extraction is the image segmentation where the output of Gabor filter is 
used and vein pattern is extracted using the method as in [12]. The conditional thinning algorithm is used to thin 
the image, the region points are assumed to have value 1 and back-ground points to have value 0. The method 
consists of successive passes of two basic steps applied to the contour points of the given region, where a 
contour point is any pixel with value 1 and having at least one 8- neighbor valued 0. 
(a) (b) (c) (d) (e) (f) (g) 
Fig.6: (a) Input finger vein image (b) Edge detected image (c) Gabor filtering 
(d) Image segmentation (e) Filtering (f) Thinning (g) Extracted minutiae points 
The minutiae points are obtained by marking branch and end points in the vein pattern skeleton image 
as shown in Fig. 6. To obtain the junction points from the skeleton of vein patterns, we use pixel-wise operation 
commonly known as the cross number concept. 
IV. FEATURE LEVEL FUSION 
Feature level fusion [4] means the fusion of feature vectors obtained from several feature sources. 
There are several feature sources: (i) feature vectors obtained from different sensors based on a single biometric, 
(ii) feature vectors obtained from different entities based on a single biometric, like iris feature vectors obtained 
from left and right eyes, (iii) feature vectors obtained from multiple biometric traits. Feature vectors which are 
compatible can be combined to form high-dimensional feature vectors when several feature vectors belong to 
different types. 
For example, Ross and Govindarajan [9] fused face features with hand geometry features, Kumar [10] 
proposed fusion of hand geometry features and palmprint features, X. Zhou and B. Bhanu [11] proposed feature 
fusion of face and gait. They trained the reconstructed faces with high resolution and gait energy images by 
PCA and MDA respectively in order to get feature vectors, then combined them to a fusing vector after 
normalization. But it is difficult to consolidate information at feature level because feature sets from different 
biometric modalities may neither be accessible nor compatible. The minutiae points obtained from sclera [5] and 
fingerprint are fused using the feature level fusion technique. A new template is generated after the fusion of the 
features as shown in Fig.7. 
(a) (b) (c) 
Fig.7: Minutiae points of (a) Sclera (b) Fingervein and (c) Fused template 
V. IMPLEMENTATION 
Experiments have been conducted to demonstrate the performance of the proposed method for object 
recognition. The finger vein database comprises of 50 trained distinct images, each image are subject to 
variations such as lighting. Fingervein images are taken against dark homogeneous background for both left and 
right hand. The images are 256 grey levels per pixel and normalized. These images are pre-processed by our 
method before matching experiment. 
The publicly available databases are used in the experiments. The image quality in this database varies 
due to illumination, sharpness and other factors. The images are 800*600 color images. The algorithm in this 
proposed method are implemented using MATLAB (version 2011a) on a PC with Intel Core2 CPU, 1.86GHz 
processor,1GB RAM. The proposed authentication system can be used for large population where users can
Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 
transfer huge amount in any form i.e., either through ATM or online banking as shown in Fig.7. If the matching 
is successful, the user will be authenticated. The flow process of multimodal biometric system is shown in Fig.8. 
Fig.8: Flowchart of proposed Multibiometric Authentication System 
VI. RESULTS 
The metrics used for evaluation are False Acceptance rate (FAR) and False Rejection Rate (FRR). The 
FRR is the frequency that an authorized person is rejected access. The evaluation of sclera recognition was 
carried out with 100 images taken from UBIRIS, IUPUI and SDUMLA-HMT database were grouped into ten 
users and the results are tabulated for FAR and FRR. Table I and Fig.9 shows the resulted (FRR) as obtained 
from Eqn 2 for the proposed sclera vein and existing iris technique. From the result, it can be observed that the 
proposed technique results in lesser False Rejection Rate when compared to the existing techniques. 
The FAR is the frequency that a non-authorized person is accepted as authorized. 
The Genuine Acceptance Rate(GAR) or True Accept Rate(TAR) is defined as the fraction of genuine scores that 
exceed the threshold η. 
GAR (η) = 1 – FRR (η) 
73 
Eqn 2 
Eqn 3 
Eqn 4
Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 
Table I: Table II: 
FRR (%) for various users FAR (%) for various users 
Table II and Fig. 10 shows the resulted False Acceptance Rate (FAR) for the proposed and existing 
technique which is obtained using Eqn 3. From the result, it can be observed that the proposed technique results 
in lesser False Acceptance Rate for all the persons, whereas the existing techniques results with higher 
percentage of False Acceptance Rate. From all the results obtained, it can be said that the proposed technique 
results in better security than the existing technique. 
Fig.9: Resulted False Rejection rate 
Fig.10: Resulted False Acceptance rate 
74 
No. of 
Users 
Existing 
Fingerprint 
+ Iris 
Proposed 
Eye vein + 
Fingervein 
1-10 88.5 83.6 
11-20 87.7 84.3 
21-30 89.3 84.7 
31-40 88.1 83.9 
41-50 88.3 85.2 
51-60 88.9 84.8 
61-70 88.4 85.3 
71-80 89.6 85.4 
81-90 88.7 84.8 
91-100 88.8 84.5 
No. of 
Users 
Existing 
Fingerprint 
+ Iris 
Proposed 
Eye vein + 
Fingervein 
1-10 0.32 0.16 
11-20 0.36 0.12 
21-30 0.35 0.14 
31-40 0.33 0.17 
41-50 0.34 0.09 
51-60 0.31 0.12 
61-70 0.38 0.15 
71-80 0.39 0.14 
81-90 0.37 0.11 
91-100 0.36 0.13
Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 
VII. CONCLUSION 
In this paper we have presented a secured multimodal biometric system by fusing eye vein and 
Fingervein images. In this system of fusion, we have considered the intersection of minutiae points of eye vein 
and finger vein as both are important factor for verification. There are a variety of factors taken into 
consideration in our biometric system, such as the number of intersections in the vein pattern, and the pattern 
around the intersection point. This intersection spot will be taken by the system itself, taking the intersecting 
point as the mid-point. We conclude that, fusion by means of this new method will ensure high level of security. 
The proposed model has improved the security of the system as verified using FAR and FRR curves. 
Automatic authentication is possible with state of art technologies like sclera recognition on the move and finger 
vein scanner on the steering of car. As future improvements the cryptographic key of multimodal biometrics like 
sclera and iris can be developed and issued for enhancing security. 
REFERENCES 
[1]. Arunkumar.V, Malathy.C “Multimodal Biometrics by Fusion of Fingervein and Fingerprint Images " 
Proceedings of the 4th National Conference; INDIACom-2010, Feb. 2010 
[2]. Ouda, O.; Tsumura, N.; Nakaguchi, T., "Tokenless Cancelable Biometrics Scheme for Protecting Iris 
Codes," Pattern Recognition (ICPR), 2010 20th International Conference on , vol., no., pp.882,885, 23- 
26 Aug. 2010 
[3]. Yan Sui et al., "Secure and privacy-preserving biometrics based active authentication," Systems, Man, 
and Cybernetics (SMC), 2012 IEEE International Conference on , vol., no., pp.1291,1296, 14-17 Oct. 
2012 
[4]. Yongming Yang, Kunming Lin, Fengling Han, Zulong Zhang “Dynamic Weighting for Effective 
Fusion of Fingerprint and Finger Vein”, Progress in “Intelligent Computing and Applications”, Vol 1, 
No1, Oct. 2012. 
[5]. Zhi Zhou, Eliza Y.Du, N.Luke Thomas, Edward J.Delp, “A comprehensive multimodal eye 
recognition”. “Springer”, DOI 10.1007/s11760-013-0468-8, published online on April 2013. 
[6]. Zhi Zhou, Eliza Y.Du, N.Luke Thomas, Edward J.Delp, “A new human identification method: sclera 
recognition”. “IEEE Transactions on systems, man and cybernetics” vol. 42, no. 3, pp. 571-583, May 
2012. 
[7]. Simona Crihalmeanu and Arun Ross, “Multispectral scleral patterns for ocular biometric recognition”, 
“Elsevier Pattern Recognition Letters” vol. 33, no.14, pp. 1860-1869, January 2012. 
[8]. S.Brindha, Ila.Vennila and B.Nivedetha, “Secure User Authentication using Sclera in Quick Response 
Codes”, “International Journal of Engineering and Technology” vol.5 No.5 , 4199 - 4205, October 
2013. 
[9]. A. Ross, R. Govindarajan. “Feature Level Fusion Using Hand and Face Biometrics”. In “Biometric 
technology for human identification”, pages 196-204, 2005. 
[10]. A. Kumar, D.C.M. Wong, H. Shen and A.K. Jain. “Personal verification using palmprint and hand 
geometry biometric”. In “Proceedings of AVBPA Guildford”, UK (June 2003), pages 668–675, 2003. 
[11]. X. Zhou and B. Bhanu. “Feature Fusion of Face and Gait for Human Recognition at a Distance in 
Video”. In “Pattern Recognition”, pages 529-532, 2006. 
[12]. Cheng-Bo Yu, Hua-Feng Qin, Lian Zhang, Yan-Zhe Cui “Finger-vein image recognition combining 
modified hausdorff distance with minutiae feature matching” in “Journal of Biomedical Science and 
Engineering”, vol. 2, pp. 261-272, 2009. 
75

More Related Content

What's hot

Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATIONislam_injamul
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
A Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsA Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsIOSR Journals
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 

What's hot (17)

Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATION
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Human Retina Identification
Human Retina IdentificationHuman Retina Identification
Human Retina Identification
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
A Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsA Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human Fingerprints
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
Iris ppt
Iris pptIris ppt
Iris ppt
 

Viewers also liked

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Uniforce Engineers - E-Brochure -
Uniforce Engineers - E-Brochure - Uniforce Engineers - E-Brochure -
Uniforce Engineers - E-Brochure - Annakumar R
 

Viewers also liked (16)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1085863
H1085863H1085863
H1085863
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
G1054048
G1054048G1054048
G1054048
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Uniforce Engineers - E-Brochure -
Uniforce Engineers - E-Brochure - Uniforce Engineers - E-Brochure -
Uniforce Engineers - E-Brochure -
 

Similar to International Journal of Engineering Research and Development

Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceIOSR Journals
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESvasim hasina
 
A comparative analysis of Iris data compression
A comparative analysis of Iris data compressionA comparative analysis of Iris data compression
A comparative analysis of Iris data compressionIJSRED
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 

Similar to International Journal of Engineering Research and Development (20)

Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
I017335457
I017335457I017335457
I017335457
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
E0543135
E0543135E0543135
E0543135
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
50120130406045
5012013040604550120130406045
50120130406045
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
1
11
1
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
A comparative analysis of Iris data compression
A comparative analysis of Iris data compressionA comparative analysis of Iris data compression
A comparative analysis of Iris data compression
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.69-75 Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System Ms.S.Brindha1, Dr.Ila.Vennila2, Ms.B.Nivedetha3 1Department of Computer Networking, PSG Polytechnic College, Coimbatore, India. 2Department of Electrical and Electronics Engg., PSG College of Technology, Coimbatore, India. 3Department of Computer Networking, PSG Polytechnic College, Coimbatore, India. Abstract:- In recent years, biometric authentication has become one of the popular strategy for various applications like ATMs, online banking, e-commerce websites etc., New biometric modalities are currently being tested and implemented. In this paper, a relatively new paradigm using fusion of biometric images eye vein and finger vein is proposed. Though different multimodalities exist this combination is unique and gives promising results and hence can be considered in future as a positive biometric trait. The proposed approach is based on the fusion of the two traits by extracting independent feature pointsets from the two modalities and making them compatible for concatenation. The concatenated feature pointset has better discrimination power than the individual feature vectors. The proposed eye vein and finger vein fused template was evaluated using publicly available UBIRIS, IUPUI and SDUMLA-HMT multi wavelength database. The experimental results show that this technique is efficient and provides accurate identity verification than other biometric traits. Keywords:- Biometrics, Multimodal, Eye vein, Sclera, Fingervein, Authentication. I. INTRODUCTION User authentication is extremely important for computer and network system security. Currently, knowledge based methods and token based methods are the most popular approaches. However, these methods have a number of security flaws. For example, passwords can be easily shared, stolen, and forgotten. Similarly, smart cards can be shared, stolen, duplicated, or lost. To circumvent these issues, a number of login authentication methods, including textual, graphical passwords and biometric authentication have been utilized. Some of the commonly used hard biometrics is Face, Sclera, Fingerprint, Iris, Fingervein etc. Soft biometrics includes Keystroke, Voice, Cloth colour, facial colour etc. A unimodal technique [3] is not sufficient to authenticate a user because the system sometimes cannot observe the biometric information correctly. To address the limitations of single biometrics, using multimodal biometrics is a good solution. It is the combination of two or more biometric traits to raise systems security and reliability. Multimodal Biometrics[1] system is capable of using more than one physiological or behavioural characteristic for enrolment, verification or identification. For biometric identification to be ultra-secure and provide above average accuracy, more than one type must be used as only one form of it may not be accurate enough. One example of this inaccuracy is in the area of fingerprints where at least 10% of people have worn, cut or unrecognizable prints. Combining the results obtained by different biometric traits by an effective fusion scheme can significantly improve the overall accuracy of the biometric system. The proposed work includes eye vein and Fingervein as shown in Fig.1 with their Multimodal biometric traits for authentication of the user. The blood vessel structure of the sclera is unique to each person, and it can be remotely obtained in the visible wavelengths. Fig.1: Multimodal biometrics of Eye vein and Finger vein 69
  • 2. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System Finger vein authentication is a new biometric method utilizing the vein patterns inside one’s fingers for personal identity verification. Unlike some biometric systems, blood vessel patterns are almost impossible to counterfeit because they are located beneath the skin's surface. These unique aspects of finger vein pattern recognition set it apart from previous forms of biometrics. The most vulnerable part of the vein system is that there are some factors like body temperature, ambient temperature, humidity, camera calibration and focus that may affect the quality of the image, which in turn will affect the verification rate. The finger print and iris system also has considerable weaknesses - it is not that resistant to spoof attack, as they are physical entities. The proposed work uses multimodal biometrics of sclera blood vein pattern and fingervein. For login users can use the cryptographic key generated from the fused template of sclera blood veins and fingervein as they are unique to each individual and it is more accurate than any other biometric. The experimental results show that sclera recognition is a promising new biometrics for positive human ID. A new method for sclera segmentation which works for both colour and grayscale images is proposed and, we designed a Gabor wavelet-based sclera pattern enhancement method to emphasize and binarize the sclera vessel patterns. During verification the sclera [7] and fingervein images of the user are taken as input through respective sensors and compared with the information stored in the database to verify automatically the identity of its owner. In other words, this mechanism allows to verify quickly the claimed identity of the person holding the paper document (such as an admission ticket), without requiring human intervention, by just comparing locally the output of his/her biometric trait with the data stored in the document itself. There are few typical scenarios for this application. For example, there are several cases of money transaction through banks and cockpit in planes can be controlled through this authentication. This authentication can be used in the diplomatic passports for higher officials holding important positions as shown in Fig.2. In addition, the cryptographic key generated from biometric data can also be secured within the ATM cards which can be verified during their transaction. Latest mobile phones and laptops can be featured with high resolution cameras and finger vein reader to enable its users to authenticate easily. This type of authentication can be used for high security access like military, research centres, scientific organisations etc. Fig.2: Finger vein and Eye vein imaging systems II. EXTRACTION OF EYE VEIN Sclera is the white portion surrounding the eye as opaque outer protective covering of the eye as shown in Fig.3. Extraction of sclera vessel pattern is to identify and extract the vein portions of sclera from the original eye image for processing and identification. To segment the sclera from eye image the process involved are segment sclera, extract sclera features and enhance the vessel patterns, matching the features of sclera veins, and decision matching[8]. First we have to downsample the UBIRIS database image, this downsampling reduces the size of original image to required size. The image is converted from the RGB colorspace to HSV colorspace. Second, detect the eyelid boundary and segment iris region using active contour method. Gabor filter is used for extraction of vein pattern from the segmented sclera region and enhanced. The enhanced vein patterns are thresholded using an adaptive threshold method to emphasize and binarize the sclera vein pattern, and thinned to a pixel wide skeleton using morphological operations as shown in Fig.4. 70
  • 3. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System Fig.3: Human eye pattern Finally, line descriptor based feature extraction method is used to describe and store the extracted vein pattern for recognition, registration, and matching method that is scale, orientation, and deformation-invariant, and can mitigate the multi-layered deformation effects and tolerate segmentation error. The feature matching system uses an enrolment system to register the sclera vein templates [6] to achieve translation, rotation, and scaling-invariance. Then, cross-correlation distance measure is used to match the templates using their line descriptor sets. Finally, the matching score is determined from the weighted matching scores, and is used to determine if the two descriptors match. (a) (b) (c) (d) (e) (f) (g) (h) Fig.4: (a) Input eye image (b) Grayscale image (c) Eyelid detection (d) Iris boundary detection (e) Sclera mask (f) Segmented Sclera (g) Vessel pattern- after morphological operation (h) Extracted minutiae III. EXTRACTION OF FINGER VEIN Nearly all veins in a human body (such as retinal vein, facial vein, veins in hand) can be used for personal identification, but veins in hand are always preferred. To obtain the pattern for the database record, an individual inserts a finger into an attester terminal containing a near-infrared LED light as shown in Fig.5 or a monochrome CCD (charge-coupled device) camera. The haemoglobin in the blood absorbs near-infrared LED light, which makes the vein system appear as a dark pattern of lines. The camera records the image and the raw data is digitized, certified and sent to a database of registered images. For authentication purposes, the finger is scanned as before and the data is sent to the database of registered images for comparison. The authentication process takes less than two seconds. Fig.5: Fingervein system Biometric systems based on fingerprints can be fooled with a dummy finger fitted with a copied fingerprint; voice and facial characteristic-based systems can be fooled by recordings and high-resolution images. The finger vein ID system is much harder to fool because it can only authenticate the finger of a living person. The configurations of parallel ridges and valleys with well defined frequency and orientation in a Fingervein image provide useful information which helps in re-moving undesired noise. Therefore, a band pass filter is used to tune the corresponding frequency. Moreover, orientation can efficiently remove the undesired noise and preserve the true ridge and valley structures. Gabor filters have both frequency and orientation selective properties and have optimal joint resolution in both spatial and frequency domains. Therefore, it is appropriate to use Gabor filters as band pass filters to remove the noise and preserve true ridge/valley structures. The circular Gabor filter is an effective tool for texture analysis, and has the following general form: 71
  • 4. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System 72 Eqn 1 G(x,y,θ,μ,σ) = exp - exp{2πi(ux cos θ + uy sin θ)} The next step in finger vein extraction is the image segmentation where the output of Gabor filter is used and vein pattern is extracted using the method as in [12]. The conditional thinning algorithm is used to thin the image, the region points are assumed to have value 1 and back-ground points to have value 0. The method consists of successive passes of two basic steps applied to the contour points of the given region, where a contour point is any pixel with value 1 and having at least one 8- neighbor valued 0. (a) (b) (c) (d) (e) (f) (g) Fig.6: (a) Input finger vein image (b) Edge detected image (c) Gabor filtering (d) Image segmentation (e) Filtering (f) Thinning (g) Extracted minutiae points The minutiae points are obtained by marking branch and end points in the vein pattern skeleton image as shown in Fig. 6. To obtain the junction points from the skeleton of vein patterns, we use pixel-wise operation commonly known as the cross number concept. IV. FEATURE LEVEL FUSION Feature level fusion [4] means the fusion of feature vectors obtained from several feature sources. There are several feature sources: (i) feature vectors obtained from different sensors based on a single biometric, (ii) feature vectors obtained from different entities based on a single biometric, like iris feature vectors obtained from left and right eyes, (iii) feature vectors obtained from multiple biometric traits. Feature vectors which are compatible can be combined to form high-dimensional feature vectors when several feature vectors belong to different types. For example, Ross and Govindarajan [9] fused face features with hand geometry features, Kumar [10] proposed fusion of hand geometry features and palmprint features, X. Zhou and B. Bhanu [11] proposed feature fusion of face and gait. They trained the reconstructed faces with high resolution and gait energy images by PCA and MDA respectively in order to get feature vectors, then combined them to a fusing vector after normalization. But it is difficult to consolidate information at feature level because feature sets from different biometric modalities may neither be accessible nor compatible. The minutiae points obtained from sclera [5] and fingerprint are fused using the feature level fusion technique. A new template is generated after the fusion of the features as shown in Fig.7. (a) (b) (c) Fig.7: Minutiae points of (a) Sclera (b) Fingervein and (c) Fused template V. IMPLEMENTATION Experiments have been conducted to demonstrate the performance of the proposed method for object recognition. The finger vein database comprises of 50 trained distinct images, each image are subject to variations such as lighting. Fingervein images are taken against dark homogeneous background for both left and right hand. The images are 256 grey levels per pixel and normalized. These images are pre-processed by our method before matching experiment. The publicly available databases are used in the experiments. The image quality in this database varies due to illumination, sharpness and other factors. The images are 800*600 color images. The algorithm in this proposed method are implemented using MATLAB (version 2011a) on a PC with Intel Core2 CPU, 1.86GHz processor,1GB RAM. The proposed authentication system can be used for large population where users can
  • 5. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System transfer huge amount in any form i.e., either through ATM or online banking as shown in Fig.7. If the matching is successful, the user will be authenticated. The flow process of multimodal biometric system is shown in Fig.8. Fig.8: Flowchart of proposed Multibiometric Authentication System VI. RESULTS The metrics used for evaluation are False Acceptance rate (FAR) and False Rejection Rate (FRR). The FRR is the frequency that an authorized person is rejected access. The evaluation of sclera recognition was carried out with 100 images taken from UBIRIS, IUPUI and SDUMLA-HMT database were grouped into ten users and the results are tabulated for FAR and FRR. Table I and Fig.9 shows the resulted (FRR) as obtained from Eqn 2 for the proposed sclera vein and existing iris technique. From the result, it can be observed that the proposed technique results in lesser False Rejection Rate when compared to the existing techniques. The FAR is the frequency that a non-authorized person is accepted as authorized. The Genuine Acceptance Rate(GAR) or True Accept Rate(TAR) is defined as the fraction of genuine scores that exceed the threshold η. GAR (η) = 1 – FRR (η) 73 Eqn 2 Eqn 3 Eqn 4
  • 6. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System Table I: Table II: FRR (%) for various users FAR (%) for various users Table II and Fig. 10 shows the resulted False Acceptance Rate (FAR) for the proposed and existing technique which is obtained using Eqn 3. From the result, it can be observed that the proposed technique results in lesser False Acceptance Rate for all the persons, whereas the existing techniques results with higher percentage of False Acceptance Rate. From all the results obtained, it can be said that the proposed technique results in better security than the existing technique. Fig.9: Resulted False Rejection rate Fig.10: Resulted False Acceptance rate 74 No. of Users Existing Fingerprint + Iris Proposed Eye vein + Fingervein 1-10 88.5 83.6 11-20 87.7 84.3 21-30 89.3 84.7 31-40 88.1 83.9 41-50 88.3 85.2 51-60 88.9 84.8 61-70 88.4 85.3 71-80 89.6 85.4 81-90 88.7 84.8 91-100 88.8 84.5 No. of Users Existing Fingerprint + Iris Proposed Eye vein + Fingervein 1-10 0.32 0.16 11-20 0.36 0.12 21-30 0.35 0.14 31-40 0.33 0.17 41-50 0.34 0.09 51-60 0.31 0.12 61-70 0.38 0.15 71-80 0.39 0.14 81-90 0.37 0.11 91-100 0.36 0.13
  • 7. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System VII. CONCLUSION In this paper we have presented a secured multimodal biometric system by fusing eye vein and Fingervein images. In this system of fusion, we have considered the intersection of minutiae points of eye vein and finger vein as both are important factor for verification. There are a variety of factors taken into consideration in our biometric system, such as the number of intersections in the vein pattern, and the pattern around the intersection point. This intersection spot will be taken by the system itself, taking the intersecting point as the mid-point. We conclude that, fusion by means of this new method will ensure high level of security. The proposed model has improved the security of the system as verified using FAR and FRR curves. Automatic authentication is possible with state of art technologies like sclera recognition on the move and finger vein scanner on the steering of car. As future improvements the cryptographic key of multimodal biometrics like sclera and iris can be developed and issued for enhancing security. REFERENCES [1]. Arunkumar.V, Malathy.C “Multimodal Biometrics by Fusion of Fingervein and Fingerprint Images " Proceedings of the 4th National Conference; INDIACom-2010, Feb. 2010 [2]. Ouda, O.; Tsumura, N.; Nakaguchi, T., "Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes," Pattern Recognition (ICPR), 2010 20th International Conference on , vol., no., pp.882,885, 23- 26 Aug. 2010 [3]. Yan Sui et al., "Secure and privacy-preserving biometrics based active authentication," Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on , vol., no., pp.1291,1296, 14-17 Oct. 2012 [4]. Yongming Yang, Kunming Lin, Fengling Han, Zulong Zhang “Dynamic Weighting for Effective Fusion of Fingerprint and Finger Vein”, Progress in “Intelligent Computing and Applications”, Vol 1, No1, Oct. 2012. [5]. Zhi Zhou, Eliza Y.Du, N.Luke Thomas, Edward J.Delp, “A comprehensive multimodal eye recognition”. “Springer”, DOI 10.1007/s11760-013-0468-8, published online on April 2013. [6]. Zhi Zhou, Eliza Y.Du, N.Luke Thomas, Edward J.Delp, “A new human identification method: sclera recognition”. “IEEE Transactions on systems, man and cybernetics” vol. 42, no. 3, pp. 571-583, May 2012. [7]. Simona Crihalmeanu and Arun Ross, “Multispectral scleral patterns for ocular biometric recognition”, “Elsevier Pattern Recognition Letters” vol. 33, no.14, pp. 1860-1869, January 2012. [8]. S.Brindha, Ila.Vennila and B.Nivedetha, “Secure User Authentication using Sclera in Quick Response Codes”, “International Journal of Engineering and Technology” vol.5 No.5 , 4199 - 4205, October 2013. [9]. A. Ross, R. Govindarajan. “Feature Level Fusion Using Hand and Face Biometrics”. In “Biometric technology for human identification”, pages 196-204, 2005. [10]. A. Kumar, D.C.M. Wong, H. Shen and A.K. Jain. “Personal verification using palmprint and hand geometry biometric”. In “Proceedings of AVBPA Guildford”, UK (June 2003), pages 668–675, 2003. [11]. X. Zhou and B. Bhanu. “Feature Fusion of Face and Gait for Human Recognition at a Distance in Video”. In “Pattern Recognition”, pages 529-532, 2006. [12]. Cheng-Bo Yu, Hua-Feng Qin, Lian Zhang, Yan-Zhe Cui “Finger-vein image recognition combining modified hausdorff distance with minutiae feature matching” in “Journal of Biomedical Science and Engineering”, vol. 2, pp. 261-272, 2009. 75