This document proposes fusing eye vein and finger vein biometrics for multimodal authentication. It extracts features from eye vein and finger vein images separately, then concatenates the feature vectors. Experimental results on public databases show this technique achieves more accurate identity verification than single biometrics, with lower false rejection and acceptance rates. The fused template provides better discrimination than individual features.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This report will give idea of key steps in developing an algorithm for \’Iris based Recognition system\’.Experimental observations as well are also shown.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
This paper presents an optimized palm vein authentication algorithm which will match the similar type of vascular pattern from the database given i.e. CASIA-Palmprint V1 dataset. . The palm vein authentication technology offers a high level of accuracy. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. If we compare with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. Also, we have also outlined opinions about the utility of Biometric authentication systems. We have processed the raw image from the dataset before implementing authentication algorithm. After getting the suitable image after pre- processing, we have used local binary pattern (LBP) for feature extraction purpose & then using a machine learning algorithm, with support vector machine (SVM), we tried to match the vascular vein pattern for authentication. Result of the matching algorithm is not only optimized as per the proposed approach but also quite efficient.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
Frauds attacking the automated teller machine have increased over the decade which has motivated us to use the biometrics for personal identification to procure high level of security and accuracy This paper describes a system that replaces the ATM cards and PINs by the physiological biometric face and iris authentication. In this system during enrolment the genuine users face and iris samples of are retained in the database. The process of transaction begins by getting and matching face and iris patterns. The system will automatically distinguish between real legitimate trait and fake samples. If a fake biometric is recognized a GSM module connected to the controller will message OTP by the system to the registered mobile number. After the valid OTP is entered the user can either withdraw or deposit cash or check his her balance. We have included another biometric called Palm Vien. By using Palm Vein we can access the ATM. Mr. T. Karthikeyan | Ms. Aarthi. S | Ms. Amirtha. P | Ms. Divya. R | Ms. Sowndarya. S ""Enhancing the Cash Point using Multimode Biometric System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21768.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/21768/enhancing-the-cash-point-using-multimode-biometric-system/mr-t-karthikeyan
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 7 (July 2014), PP.69-75
Performance Analysis of Fused Eye Vein and Finger Vein
Multimodal Biometric System
Ms.S.Brindha1, Dr.Ila.Vennila2, Ms.B.Nivedetha3
1Department of Computer Networking, PSG Polytechnic College, Coimbatore, India.
2Department of Electrical and Electronics Engg., PSG College of Technology, Coimbatore, India.
3Department of Computer Networking, PSG Polytechnic College, Coimbatore, India.
Abstract:- In recent years, biometric authentication has become one of the popular strategy for various
applications like ATMs, online banking, e-commerce websites etc., New biometric modalities are currently
being tested and implemented. In this paper, a relatively new paradigm using fusion of biometric images eye
vein and finger vein is proposed. Though different multimodalities exist this combination is unique and gives
promising results and hence can be considered in future as a positive biometric trait. The proposed approach is
based on the fusion of the two traits by extracting independent feature pointsets from the two modalities and
making them compatible for concatenation. The concatenated feature pointset has better discrimination power
than the individual feature vectors. The proposed eye vein and finger vein fused template was evaluated using
publicly available UBIRIS, IUPUI and SDUMLA-HMT multi wavelength database. The experimental results
show that this technique is efficient and provides accurate identity verification than other biometric traits.
Keywords:- Biometrics, Multimodal, Eye vein, Sclera, Fingervein, Authentication.
I. INTRODUCTION
User authentication is extremely important for computer and network system security. Currently,
knowledge based methods and token based methods are the most popular approaches. However, these methods
have a number of security flaws. For example, passwords can be easily shared, stolen, and forgotten. Similarly,
smart cards can be shared, stolen, duplicated, or lost. To circumvent these issues, a number of login
authentication methods, including textual, graphical passwords and biometric authentication have been utilized.
Some of the commonly used hard biometrics is Face, Sclera, Fingerprint, Iris, Fingervein etc. Soft
biometrics includes Keystroke, Voice, Cloth colour, facial colour etc. A unimodal technique [3] is not sufficient
to authenticate a user because the system sometimes cannot observe the biometric information correctly. To
address the limitations of single biometrics, using multimodal biometrics is a good solution. It is the
combination of two or more biometric traits to raise systems security and reliability.
Multimodal Biometrics[1] system is capable of using more than one physiological or behavioural
characteristic for enrolment, verification or identification. For biometric identification to be ultra-secure and
provide above average accuracy, more than one type must be used as only one form of it may not be accurate
enough. One example of this inaccuracy is in the area of fingerprints where at least 10% of people have worn,
cut or unrecognizable prints. Combining the results obtained by different biometric traits by an effective fusion
scheme can significantly improve the overall accuracy of the biometric system. The proposed work includes eye
vein and Fingervein as shown in Fig.1 with their Multimodal biometric traits for authentication of the user. The
blood vessel structure of the sclera is unique to each person, and it can be remotely obtained in the visible
wavelengths.
Fig.1: Multimodal biometrics of Eye vein and Finger vein
69
2. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System
Finger vein authentication is a new biometric method utilizing the vein patterns inside one’s fingers for
personal identity verification. Unlike some biometric systems, blood vessel patterns are almost impossible to
counterfeit because they are located beneath the skin's surface. These unique aspects of finger vein pattern
recognition set it apart from previous forms of biometrics. The most vulnerable part of the vein system is that
there are some factors like body temperature, ambient temperature, humidity, camera calibration and focus that
may affect the quality of the image, which in turn will affect the verification rate. The finger print and iris
system also has considerable weaknesses - it is not that resistant to spoof attack, as they are physical entities.
The proposed work uses multimodal biometrics of sclera blood vein pattern and fingervein. For login users can
use the cryptographic key generated from the fused template of sclera blood veins and fingervein as they are
unique to each individual and it is more accurate than any other biometric. The experimental results show that
sclera recognition is a promising new biometrics for positive human ID. A new method for sclera segmentation
which works for both colour and grayscale images is proposed and, we designed a Gabor wavelet-based sclera
pattern enhancement method to emphasize and binarize the sclera vessel patterns.
During verification the sclera [7] and fingervein images of the user are taken as input through
respective sensors and compared with the information stored in the database to verify automatically the identity
of its owner. In other words, this mechanism allows to verify quickly the claimed identity of the person holding
the paper document (such as an admission ticket), without requiring human intervention, by just comparing
locally the output of his/her biometric trait with the data stored in the document itself. There are few typical
scenarios for this application. For example, there are several cases of money transaction through banks and
cockpit in planes can be controlled through this authentication. This authentication can be used in the diplomatic
passports for higher officials holding important positions as shown in Fig.2.
In addition, the cryptographic key generated from biometric data can also be secured within the ATM
cards which can be verified during their transaction. Latest mobile phones and laptops can be featured with high
resolution cameras and finger vein reader to enable its users to authenticate easily. This type of authentication
can be used for high security access like military, research centres, scientific organisations etc.
Fig.2: Finger vein and Eye vein imaging systems
II. EXTRACTION OF EYE VEIN
Sclera is the white portion surrounding the eye as opaque outer protective covering of the eye as shown
in Fig.3. Extraction of sclera vessel pattern is to identify and extract the vein portions of sclera from the original
eye image for processing and identification.
To segment the sclera from eye image the process involved are segment sclera, extract sclera features
and enhance the vessel patterns, matching the features of sclera veins, and decision matching[8]. First we have
to downsample the UBIRIS database image, this downsampling reduces the size of original image to required
size. The image is converted from the RGB colorspace to HSV colorspace. Second, detect the eyelid boundary
and segment iris region using active contour method. Gabor filter is used for extraction of vein pattern from the
segmented sclera region and enhanced. The enhanced vein patterns are thresholded using an adaptive threshold
method to emphasize and binarize the sclera vein pattern, and thinned to a pixel wide skeleton using
morphological operations as shown in Fig.4.
70
3. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System
Fig.3: Human eye pattern
Finally, line descriptor based feature extraction method is used to describe and store the extracted vein
pattern for recognition, registration, and matching method that is scale, orientation, and deformation-invariant,
and can mitigate the multi-layered deformation effects and tolerate segmentation error. The feature matching
system uses an enrolment system to register the sclera vein templates [6] to achieve translation, rotation, and
scaling-invariance. Then, cross-correlation distance measure is used to match the templates using their line
descriptor sets. Finally, the matching score is determined from the weighted matching scores, and is used to
determine if the two descriptors match.
(a) (b) (c) (d) (e) (f) (g) (h)
Fig.4: (a) Input eye image (b) Grayscale image (c) Eyelid detection (d) Iris boundary detection
(e) Sclera mask (f) Segmented Sclera (g) Vessel pattern- after morphological operation
(h) Extracted minutiae
III. EXTRACTION OF FINGER VEIN
Nearly all veins in a human body (such as retinal vein, facial vein, veins in hand) can be used for
personal identification, but veins in hand are always preferred. To obtain the pattern for the database record, an
individual inserts a finger into an attester terminal containing a near-infrared LED light as shown in Fig.5 or a
monochrome CCD (charge-coupled device) camera. The haemoglobin in the blood absorbs near-infrared LED
light, which makes the vein system appear as a dark pattern of lines. The camera records the image and the raw
data is digitized, certified and sent to a database of registered images. For authentication purposes, the finger is
scanned as before and the data is sent to the database of registered images for comparison. The authentication
process takes less than two seconds.
Fig.5: Fingervein system
Biometric systems based on fingerprints can be fooled with a dummy finger fitted with a copied
fingerprint; voice and facial characteristic-based systems can be fooled by recordings and high-resolution
images. The finger vein ID system is much harder to fool because it can only authenticate the finger of a living
person. The configurations of parallel ridges and valleys with well defined frequency and orientation in a
Fingervein image provide useful information which helps in re-moving undesired noise. Therefore, a band pass
filter is used to tune the corresponding frequency. Moreover, orientation can efficiently remove the undesired
noise and preserve the true ridge and valley structures. Gabor filters have both frequency and orientation
selective properties and have optimal joint resolution in both spatial and frequency domains. Therefore, it is
appropriate to use Gabor filters as band pass filters to remove the noise and preserve true ridge/valley structures.
The circular Gabor filter is an effective tool for texture analysis, and has the following general form:
71
4. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System
72
Eqn 1
G(x,y,θ,μ,σ) = exp - exp{2πi(ux cos θ + uy sin θ)}
The next step in finger vein extraction is the image segmentation where the output of Gabor filter is
used and vein pattern is extracted using the method as in [12]. The conditional thinning algorithm is used to thin
the image, the region points are assumed to have value 1 and back-ground points to have value 0. The method
consists of successive passes of two basic steps applied to the contour points of the given region, where a
contour point is any pixel with value 1 and having at least one 8- neighbor valued 0.
(a) (b) (c) (d) (e) (f) (g)
Fig.6: (a) Input finger vein image (b) Edge detected image (c) Gabor filtering
(d) Image segmentation (e) Filtering (f) Thinning (g) Extracted minutiae points
The minutiae points are obtained by marking branch and end points in the vein pattern skeleton image
as shown in Fig. 6. To obtain the junction points from the skeleton of vein patterns, we use pixel-wise operation
commonly known as the cross number concept.
IV. FEATURE LEVEL FUSION
Feature level fusion [4] means the fusion of feature vectors obtained from several feature sources.
There are several feature sources: (i) feature vectors obtained from different sensors based on a single biometric,
(ii) feature vectors obtained from different entities based on a single biometric, like iris feature vectors obtained
from left and right eyes, (iii) feature vectors obtained from multiple biometric traits. Feature vectors which are
compatible can be combined to form high-dimensional feature vectors when several feature vectors belong to
different types.
For example, Ross and Govindarajan [9] fused face features with hand geometry features, Kumar [10]
proposed fusion of hand geometry features and palmprint features, X. Zhou and B. Bhanu [11] proposed feature
fusion of face and gait. They trained the reconstructed faces with high resolution and gait energy images by
PCA and MDA respectively in order to get feature vectors, then combined them to a fusing vector after
normalization. But it is difficult to consolidate information at feature level because feature sets from different
biometric modalities may neither be accessible nor compatible. The minutiae points obtained from sclera [5] and
fingerprint are fused using the feature level fusion technique. A new template is generated after the fusion of the
features as shown in Fig.7.
(a) (b) (c)
Fig.7: Minutiae points of (a) Sclera (b) Fingervein and (c) Fused template
V. IMPLEMENTATION
Experiments have been conducted to demonstrate the performance of the proposed method for object
recognition. The finger vein database comprises of 50 trained distinct images, each image are subject to
variations such as lighting. Fingervein images are taken against dark homogeneous background for both left and
right hand. The images are 256 grey levels per pixel and normalized. These images are pre-processed by our
method before matching experiment.
The publicly available databases are used in the experiments. The image quality in this database varies
due to illumination, sharpness and other factors. The images are 800*600 color images. The algorithm in this
proposed method are implemented using MATLAB (version 2011a) on a PC with Intel Core2 CPU, 1.86GHz
processor,1GB RAM. The proposed authentication system can be used for large population where users can
5. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System
transfer huge amount in any form i.e., either through ATM or online banking as shown in Fig.7. If the matching
is successful, the user will be authenticated. The flow process of multimodal biometric system is shown in Fig.8.
Fig.8: Flowchart of proposed Multibiometric Authentication System
VI. RESULTS
The metrics used for evaluation are False Acceptance rate (FAR) and False Rejection Rate (FRR). The
FRR is the frequency that an authorized person is rejected access. The evaluation of sclera recognition was
carried out with 100 images taken from UBIRIS, IUPUI and SDUMLA-HMT database were grouped into ten
users and the results are tabulated for FAR and FRR. Table I and Fig.9 shows the resulted (FRR) as obtained
from Eqn 2 for the proposed sclera vein and existing iris technique. From the result, it can be observed that the
proposed technique results in lesser False Rejection Rate when compared to the existing techniques.
The FAR is the frequency that a non-authorized person is accepted as authorized.
The Genuine Acceptance Rate(GAR) or True Accept Rate(TAR) is defined as the fraction of genuine scores that
exceed the threshold η.
GAR (η) = 1 – FRR (η)
73
Eqn 2
Eqn 3
Eqn 4
6. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System
Table I: Table II:
FRR (%) for various users FAR (%) for various users
Table II and Fig. 10 shows the resulted False Acceptance Rate (FAR) for the proposed and existing
technique which is obtained using Eqn 3. From the result, it can be observed that the proposed technique results
in lesser False Acceptance Rate for all the persons, whereas the existing techniques results with higher
percentage of False Acceptance Rate. From all the results obtained, it can be said that the proposed technique
results in better security than the existing technique.
Fig.9: Resulted False Rejection rate
Fig.10: Resulted False Acceptance rate
74
No. of
Users
Existing
Fingerprint
+ Iris
Proposed
Eye vein +
Fingervein
1-10 88.5 83.6
11-20 87.7 84.3
21-30 89.3 84.7
31-40 88.1 83.9
41-50 88.3 85.2
51-60 88.9 84.8
61-70 88.4 85.3
71-80 89.6 85.4
81-90 88.7 84.8
91-100 88.8 84.5
No. of
Users
Existing
Fingerprint
+ Iris
Proposed
Eye vein +
Fingervein
1-10 0.32 0.16
11-20 0.36 0.12
21-30 0.35 0.14
31-40 0.33 0.17
41-50 0.34 0.09
51-60 0.31 0.12
61-70 0.38 0.15
71-80 0.39 0.14
81-90 0.37 0.11
91-100 0.36 0.13
7. Performance Analysis of Fused Eye Vein and Finger Vein Multimodal Biometric System
VII. CONCLUSION
In this paper we have presented a secured multimodal biometric system by fusing eye vein and
Fingervein images. In this system of fusion, we have considered the intersection of minutiae points of eye vein
and finger vein as both are important factor for verification. There are a variety of factors taken into
consideration in our biometric system, such as the number of intersections in the vein pattern, and the pattern
around the intersection point. This intersection spot will be taken by the system itself, taking the intersecting
point as the mid-point. We conclude that, fusion by means of this new method will ensure high level of security.
The proposed model has improved the security of the system as verified using FAR and FRR curves.
Automatic authentication is possible with state of art technologies like sclera recognition on the move and finger
vein scanner on the steering of car. As future improvements the cryptographic key of multimodal biometrics like
sclera and iris can be developed and issued for enhancing security.
REFERENCES
[1]. Arunkumar.V, Malathy.C “Multimodal Biometrics by Fusion of Fingervein and Fingerprint Images "
Proceedings of the 4th National Conference; INDIACom-2010, Feb. 2010
[2]. Ouda, O.; Tsumura, N.; Nakaguchi, T., "Tokenless Cancelable Biometrics Scheme for Protecting Iris
Codes," Pattern Recognition (ICPR), 2010 20th International Conference on , vol., no., pp.882,885, 23-
26 Aug. 2010
[3]. Yan Sui et al., "Secure and privacy-preserving biometrics based active authentication," Systems, Man,
and Cybernetics (SMC), 2012 IEEE International Conference on , vol., no., pp.1291,1296, 14-17 Oct.
2012
[4]. Yongming Yang, Kunming Lin, Fengling Han, Zulong Zhang “Dynamic Weighting for Effective
Fusion of Fingerprint and Finger Vein”, Progress in “Intelligent Computing and Applications”, Vol 1,
No1, Oct. 2012.
[5]. Zhi Zhou, Eliza Y.Du, N.Luke Thomas, Edward J.Delp, “A comprehensive multimodal eye
recognition”. “Springer”, DOI 10.1007/s11760-013-0468-8, published online on April 2013.
[6]. Zhi Zhou, Eliza Y.Du, N.Luke Thomas, Edward J.Delp, “A new human identification method: sclera
recognition”. “IEEE Transactions on systems, man and cybernetics” vol. 42, no. 3, pp. 571-583, May
2012.
[7]. Simona Crihalmeanu and Arun Ross, “Multispectral scleral patterns for ocular biometric recognition”,
“Elsevier Pattern Recognition Letters” vol. 33, no.14, pp. 1860-1869, January 2012.
[8]. S.Brindha, Ila.Vennila and B.Nivedetha, “Secure User Authentication using Sclera in Quick Response
Codes”, “International Journal of Engineering and Technology” vol.5 No.5 , 4199 - 4205, October
2013.
[9]. A. Ross, R. Govindarajan. “Feature Level Fusion Using Hand and Face Biometrics”. In “Biometric
technology for human identification”, pages 196-204, 2005.
[10]. A. Kumar, D.C.M. Wong, H. Shen and A.K. Jain. “Personal verification using palmprint and hand
geometry biometric”. In “Proceedings of AVBPA Guildford”, UK (June 2003), pages 668–675, 2003.
[11]. X. Zhou and B. Bhanu. “Feature Fusion of Face and Gait for Human Recognition at a Distance in
Video”. In “Pattern Recognition”, pages 529-532, 2006.
[12]. Cheng-Bo Yu, Hua-Feng Qin, Lian Zhang, Yan-Zhe Cui “Finger-vein image recognition combining
modified hausdorff distance with minutiae feature matching” in “Journal of Biomedical Science and
Engineering”, vol. 2, pp. 261-272, 2009.
75