This document proposes and evaluates methods for fusing 3D ear and face biometrics at the score level and feature level for personal authentication. Local 3D features are extracted from ear and face data and fused using root mean square distance matching at the feature level. At the score level, matching scores from ear and face modalities are fused using weighted sum rule techniques. Experiments on a database of 990 ear and face images from 60 individuals show that the multimodal biometrics systems using feature level or score level fusion techniques have lower equal error rates compared to unimodal ear or face systems alone, demonstrating improved performance from fusing the biometric modalities.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
Profile Identification through Face Recognitionijtsrd
This project is Profile identification through facial recognition system using machine learning, based on K neighbors algorithm. The K neighbours algorithm has high detection rate and fast processing time. Once the face is detected, feature extraction on the face is performed using histogram of oriented gradients which essentially stores the edges of the face as well as the directionality of those edges. Histogram of oriented gradients is an effective form of feature extraction due its high performance in normalizing local contrast. Lastly, training and classification of the facial databases is done where each unique face in the facial database is a class. We attempt to use this facial recognition system on two sets of databases and will analyse the results and then provide the profile of an individual which is written in the Data base created in Firebase. Mr. B. Ravinder Reddy | V. Akhil | G. Sai Preetham | P. Sai Poojitha ""Profile Identification through Face Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23439.pdf
Paper URL: https://www.ijtsrd.com/computer-science/other/23439/profile-identification-through-face-recognition/mr-b-ravinder-reddy
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
Profile Identification through Face Recognitionijtsrd
This project is Profile identification through facial recognition system using machine learning, based on K neighbors algorithm. The K neighbours algorithm has high detection rate and fast processing time. Once the face is detected, feature extraction on the face is performed using histogram of oriented gradients which essentially stores the edges of the face as well as the directionality of those edges. Histogram of oriented gradients is an effective form of feature extraction due its high performance in normalizing local contrast. Lastly, training and classification of the facial databases is done where each unique face in the facial database is a class. We attempt to use this facial recognition system on two sets of databases and will analyse the results and then provide the profile of an individual which is written in the Data base created in Firebase. Mr. B. Ravinder Reddy | V. Akhil | G. Sai Preetham | P. Sai Poojitha ""Profile Identification through Face Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23439.pdf
Paper URL: https://www.ijtsrd.com/computer-science/other/23439/profile-identification-through-face-recognition/mr-b-ravinder-reddy
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
Face recognition has been a rapidly creating, testing and fascinating area with
respect to consistent applications. The task of face acknowledgment has been viably
asked about lately. With data and information gathering in abundance, there is an
urgent necessity for high security. Face acknowledgment has been a rapidly creating,
testing and interesting area concerning persistent applications. This paper gives a
cutting edge review of critical human face acknowledgment investigate
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...ijceronline
Biometrics is broadly used in Forensic, highly secured control access and prison security. By making use of this system one can recognizes a person by determining the authentication by his or her biological and physiological features such as Fingerprint, retina-scan, iris scans and face recognition. The determination of the characteristic function of quality and match scores shows that a careful selection of complimentary sets of quality metrics can provide much more benefit to various benefits of biometric quality. Face recognition is a challenging approach to the image quality analysis and many more security applications. Biometric face recognition is the well known technology which is used by the government and civilian applications such Aadhar cards, Pan cards etc. Face recognition is a Behavioral and physiological feature of a human being. Nowadays the quality of an biometric image is the measure concern. There are many factors which are directly or indirectly affects on the image quality hence improvement in image quality has to be done by making the use of some biometric techniques for face recongnion.This paper presents some important techniques for fake biometric detection and improvement of facial image quality.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
Face recognition has been a rapidly creating, testing and fascinating area with
respect to consistent applications. The task of face acknowledgment has been viably
asked about lately. With data and information gathering in abundance, there is an
urgent necessity for high security. Face acknowledgment has been a rapidly creating,
testing and interesting area concerning persistent applications. This paper gives a
cutting edge review of critical human face acknowledgment investigate
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...ijceronline
Biometrics is broadly used in Forensic, highly secured control access and prison security. By making use of this system one can recognizes a person by determining the authentication by his or her biological and physiological features such as Fingerprint, retina-scan, iris scans and face recognition. The determination of the characteristic function of quality and match scores shows that a careful selection of complimentary sets of quality metrics can provide much more benefit to various benefits of biometric quality. Face recognition is a challenging approach to the image quality analysis and many more security applications. Biometric face recognition is the well known technology which is used by the government and civilian applications such Aadhar cards, Pan cards etc. Face recognition is a Behavioral and physiological feature of a human being. Nowadays the quality of an biometric image is the measure concern. There are many factors which are directly or indirectly affects on the image quality hence improvement in image quality has to be done by making the use of some biometric techniques for face recongnion.This paper presents some important techniques for fake biometric detection and improvement of facial image quality.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
Person identification based on facial biometrics in different lighting condit...IJECEIAES
Technological development is an inherent feature of this time, that reliance on electronic applications in all daily transactions (business management, banking, financial transfers, health, and other important aspects of life). Identifying and confirming identity is one of the complex challenges. Therefore, relying on biological properties gives reliable results. People can be identified in pictures, films, or real-time using facial recognition technology. A face individual is a unique identifying biological characteristic to authenticate them and prevents permits another person to assume that individual’s identity without their knowledge or consent. This article proposes the identification model by facial individual characteristics, based on the deep neural network (DNN). The proposed method extracts the spatial information available in an image, analysis this information to extract the salient features, and makes the identifying decision based on these features. This model presents successful and promising results, the accuracy achieves by the proposed system reaches 99.5% (+/- 0.16%) and the values of the loss function reach 0.0308 over the Pins Face Recognition dataset to identify 105 subjects.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
HMM-Based Face Recognition System with SVD Parameterijtsrd
Today an increasing digital world, personal reliable authentication has become an important human Computer interface activity. It is very important to establish a persons identity. In today existing security mainly depends on passwords, swipe cards or token based approach and attitude to control access to physical and virtual spaces passport. Universal, such as methods, although very secure. Such as tokens, badges and access cards can be shared or stolen. Passwords and PIN numbers can be also stolen electronically. In addition, they cannot distinguish between authentic have access to or knowledge of the user and tokens. To make a system more secure and simple with the use of biometric authentication system such as face and hand gesture recognition for personal authentication. So in this paper, A Hidden Markov Model (HMM) based face recognition system using Singular Value Decomposition (SVD) is proposed. Neha Rana | Bhavna Pancholi"HMM-Based Face Recognition System with SVD Parameter" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12938.pdf http://www.ijtsrd.com/engineering/electrical-engineering/12938/hmm-based-face-recognition-system-with-svd-parameter/neha-rana
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
Campus Management System with ID Card using Face Recognition with LBPH Algorithmijait
The Face recognition system mentioned is a computer vision and image processing application designed to carry out two primary functions: identifying and verifying a person from an image or a video database. The objective of this research is to provide a more efficient and effective alternative to traditional manual management systems. It can be used in offices, schools, and organizations where security is critical. In the proposed system, initially, all students enrolled in the Academic Year whose information is stored in a database server and released a unique ID Card with their facial image to be a smart campus. The main objective of the proposed system is to automate the time-in, and time-out of students, teachers, staff, and anyone who enters and leaves the campus of the University of Computer Studies, Hinthada (UCSH). This system is implemented with the 405 students in the 2022-2023 Academic Year, 86 permanent staff including the principal whose ID card (Name, Year, Roll No, NRC, Father Name: for students, Name, Rank, Department, NRC, Address: for teachers and staffs). As soon as someone enters the campus of a university, the ID card is scanned, the images of the ID card are captured and the face onthe card will be matched with the faces in the trained dataset to detect by using the Haar cascade classifier, and recognize the face using Local Binary Pattern LBPH algorithm. The proposed system demonstrates strong performance, achieving an accuracy rate of over 90% for everyone entering the campus. It is both effective and efficient, providing a smart solution for identification.
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...ijtsrd
The use of mobile applications nowadays has been implemented in various fields. Especially in online transactions via smartphone devices, business people have decreased quite a lot because they provide benefits in transactions. Through the mobile application, businesses can process transactions anywhere and anytime. One security aspect regarding authentication is an important concern for consumer who use mobile devices. So far, most of the authentication is done by only using password security, but the level of security is still quite easy to bypass the security. A better level of authentication can be done by utilizing biometric technology into the application security system. Several studies that have been conducted still use unimodal biometric systems to provide good authentication guarantees. This investigation is carried out by research that can improve the authentication of the existing models by applying multimodal biometric authentication based on voice and face images. In voice biometric authentication, the method of MFCC Mel Frequency Cepstrum Coefficients and DTW Dynamic Time Warping will be used, while facial authentication will apply the PCA Principle Component Analysis method. The results obtained show that the user authentication success rate reaches 90 . Therefore, biometric multimodal security can begin to be used for security systems in electronic transactions via smartphone devices. Gusti Made Arya Sasmita | I Putu Arya Dharmaadi "Implementation of Multimodal Biometrics Systems in Handling Security of Mobile Application Based on Voice and Face Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49289.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49289/implementation-of-multimodal-biometrics-systems-in-handling-security-of-mobile-application-based-on-voice-and-face-biometrics/gusti-made-arya-sasmita
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
1. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
Score Level and Feature Level Fusion of Face and Ear
238
Biometrics for Personal Authentication
Gnanaraja.R1, Sagaya vivian.R2
PG Student of CSE1, Associate Professor of CSE2
Adithya Institute of Technology, Coimbatore
gnanaraja.2020@gmail.com1,sagayavivian_r @adithyatech.com2
Abstract- Thepresent networked culture needs more naturally and consistency in provided to access in high level
security and transaction management systems .so they move to the biometrics. We present to fusion the (L3DF)
Local 3D features for 3D ear and face data using the score level and fusion level technique. The score and
feature level techniques can used to fusion the face and ear data. For score-level fusion, to perform
normalization the ear and face local 3Dimentional features (L3DFs) are take-out and coordinated separately.
Matching scores from the two modalities traits are then fused rendering to a weighted sum rule technique. For
feature level fusion technique, after extracting Local 3DFeatures from the face and ear data, we concatenate the
face and ear data based on their local shape similarity (LSS). Formerly iterative closest point (ICP) used to fused
data, according to the fused feature distance. Both these approaches are fully accurate and were found to be
highly automatic and efficient.
Index term - score level, feature level fusion, L3DF, iterative closest point (ICP), weighted sum rule.
1. INTRODUCTION:
Thecurrent networked society are more naturally
and reliability is providing high level security to
access control and transaction management
systems. [4, 6] Most of the modernhuman identity
verification model i.e. based on token (ID card) an
d knowledge based (password)
can easily violation when the password is
revelation or the card is stolen, so the traditional
identification systems are not sufficiently reliable
to satisfy current security, who the user illegally
acquires the access privilege.
To overcome this problem, the concept of
biometrics can be introduced.Biometrics methods
easily deal with these problems since peoples are
recognized by who they are, not by something they
have to recall or convey with them. Science of
launching the identity of an individual based on the
bodily and behavioural attributes of the
person.[14]There are many methods of users
identification based on image examination. In
general, these biometrics technique can be divided
into physiological and behavioural regarding the
basis of data. The first method is based on it
identifies people by how they doing something and
based on the behavioural features data of human
actions.
In this work, we explore a method for fusing the
3D ear and face biometric data at the match score
level and fusion level technique. Many no of year
forensic science can be used in the human year for
major featureEar does not change highly during
face changes more meaningfully with age than any
other part of human bodyand human life. [9]First
we extract the face image using iterative closest
point algorithm (ICP).
Fig 1: SYSTEM ARCHITECTURE
This method first acquire the image then pre-processed
and find the neighbour pair then extract
the face image and we extract ear image using our
previous developed method AdaBoost technique. In
this technique first classify the given ear data and
classification the data then eliminate the noisy data
and extract the clustered ear data. The feature level
fusionis used to normalization and matching the 3D
ear and face data using root mean square (RMS)
distance technique and score level fusion is used to
2. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
239
concatenate or integrate the extracted data using
weighted sum rule. Both these techniques are fully
automatic and highly accurate and efficient. [20]
2. LITERATURE REVIEW
[1]Dapinder Kaur, Gaganpreet Kaur was describe
the advantages of multimodal biometrics fusion
have appeared in the literature.Biometrics refers to
an automatic identification of a person based on his
physiological and behavioural characteristics. The
single modal biometric recognition systems have a
variety of problems and limited applications are
used in singe or unimodel biometric system. Four
important modules are used in the multimodal
biometric system. The first sensor module
acquiring the biometric data from a authentication
person; second the data extraction module
processes the acquired biometric data and extracts a
data set to represent it [10]; third the matching
modulecompares the extracted feature set with the
database using a classifier or matching technique
algorithm in order to generatematching scores;
finally the decision level module the matching
scores are used either to identify an enrolled user or
verify a user’s identity
[2]Xiaobo Zhang, Zhenan Sun, and Tieniu
Tandescribe about the fusion of Face and Iris in
order to improve the quality of the image. The
Hierarchical fusion scheme process in the low
Quality image under uncontrolled situation. The
(CCA)Canonical correlation Analysis, is accepted
to build a numerical mapping in Face and Iris in
pixel level. The pixel level and Score level fusion
are processed for the evaluation of the Fusion of
Face and Iris. The construction of the regression
model between two data sets is done by considering
its canonical correlation analysis (CCA) from its
efficient and effective results align to form
mapping between two multidimensional variables.
[5] The Score level fusion identification process is
done, by Representing the Face and Iris traits and
Fusion of those components results in the similarity
measure between the problem sample and the
gallery model can be explained by the residual
between the original testing models.
[3]AtifBinMansoor, Salah-ud-din GhulamMohi-ud-
Din, HassanMasood, MustafaMumtazdescribe the
use of multi-instance feature level fusionThe
modern network are not sufficiently dependable to
satisfy the recent security supplies as they lack the
ability to stop the fraud user who illegally acquires
to access the data. To solve this problem move to
the biometrics. In the biometrics the single model
system suffers various problem like similar data
occur, unacceptable error. These problems are
effectively handled by multimodal biometrics
system. [7, 6, 9] In this paper to fusion the palm
print and finger-print by feature level and score
level (Sum and Product rule).
[4]Nageshkumar.M, Mahesh.PK and M.N.
ShanmukhaSwamy proposed an authentication
system based on face and palm-print. The
biometrics based personal identification is to regard
an effective method for automatically identifying
user data, with a high sureness a person’s identity.
[11, 13, 10] A multimodal biometric
modalityjoined the evidence presented by multiple
biometric sources data and typically improved
recognition performance relate to system based on
a unibiometric modality system. This paper is
proposed todesign for application where the
exercise data contains a palm-print and
face.Integrating the palm-print and face data
features improving robustness of the person
authentication. The final choice is made by fusion
at matching score level technique architecture in
which features data are created unconventionally
for query measures and are then compared to the
enrolment pattern, which are stored during database
preparation.
[5] Michal Choras describe the concept about
human ear recognition. TheBiometrics
authentication methods proved to be more natural,
very efficient, and easy for users than standard
methods of user identification. Actually, only
biometrics methods truly identify humans. Because
we can’t remember any password and ID cards. In
this biometrics very simple to acquisition the data
easily and requires human data only camera, sensor
or scanner. The physical biometrics methods to
have many advantages over technique based on
user behaviour. This article introduces to ear
biometrics based recognition and presents its merits
over face biometrics in inert user Identification
method. The ear data is unique to extract the
features. [8, 12] Because it’s constant when
changing the face expression.so easy to extract the
data from ears. In the process of acquisition, ear
images cannot be disturbed by glasses in contrast to
face identification systems, stubble and make-up.
Based on this method to recognize the data. But
can’t recognize when the image is low quality.
3. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
241
3. RELADED WORK:
The modern organizations like financial service
area, telecommunication,e-commerce, government,
traffic, health care the security concerns are more
and more main. It is main to verify that people are
allowed to pass some points or use some properties.
The security issues are risen quickly after some
basicmisuses. For these reason, organizations are
interested in taking automated identity
identification systems, which will improve the
customers satisfaction and operating productivity.
Basically there are three different methods for
verifying identity: (i)knowledge, like userid,
password, Personal authentication Number (PIN);
(ii)possessions, like cards, badges, keys; (iii)
biometrics similar fingerprint, face, and ear data.
Biometrics is the verifying the identity of a person
or science of finding based on behavioural or
physiological characteristics.
The ear and face has been proposed as a biometric.
In this we recognize face and ear in a single sensor.
And extracting the feature using Iterative Closest
Point (ICP) and AdaBoost algorithm. Then the
extracted features are stored into the database. In
the face and ear data are fused using score and
feature level technique, so it will improving
performance and robustness.
Active shape model is a statistical approach for
facial feature extraction. In the original ASM the
local structure of a feature point is modelled by
assuming that the normalized first derivative of the
pixel intensity values along a profile line satisfy
multivariate Gaussian distribution. Gaussian model,
respectively.
= (1)
The ear shape model is used to describe a
shape and its typical appearances.The local
appearance models describe the local gray features
around each landmark. To be assumed that local
gray models are distributed as a Gaussian
multivariate. For the landmark, we can derive
the mean profile and the sample covariance
matrix from the profile example straight. The
quality of the suitable a feature vector at teat
image location s to the technique is given by
calculating the MahalanobisGaussiandistance from
the feature vector to the model mean.
(2)
The score level and feature level fusion
technique is used to fused the weighted sum rule
technique. Thus, the new set of values covers more
amount of data as compared to the individual single
model systems, hence, giving more data to identify
a person. Finally, the conclusion of input statement
is established on the basis of present threshold by
the classifier.
=
(3)
Where, active shape model for face
recognition and is ear shape model. R is a
vector value for score level fusion. Finally, is
the fusion of face and ear value.
4. PROPOSED SYSTEM:
In the proposed system to collected and created the
multimodal biometric datasets for evaluate the
performance of fusion methods. In order to create
the multimodal datasets, ear and face features are
extracted from the frontal andprofile face images
individually. The ear area is identified from 2D
profile image based on Cascaded AdaBoost
algorithm
technique
Fig 2: METHODOLOGY ARCHITECTURE
Similarly, in case of single modal identifiers, the
extracted features data are co-ordinated with
respective database using a Euclidian classifier in
matching component, followed by the decision on
the foundation of selected edge in the decision
module method.
4. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
242
So, it is very perfect, fast and entirely automatic
approach. During data collection, both the 2D
surfaced colour image and 3D scanned object are
captured simultaneously and available to the users
in communication. Therefore, after the ear region is
detected from the 2D shape image, the parallel 3D
data are then extracted from the co-registered 3D
profile feature data. The position of the nose point
is then identified in the matching district of range
image from which a sphere of radius of 80 mm is
take out. Then eliminate spikes from the extracted
3D face feature data, resample it.
For feature-level fusion method of ear and face,
feature vectors of face and ear are concatenated
collected to make shared feature vector technique.
The objective is to syndicate these two feature sets
after standardisation in order to produce a joint
feature vector (JFV). joint feature vector are
produced and stored in order to make multimodal
database which is consequently used for
verification and identification purpose on a
uniform grid of 160 mm by 160 mm, eliminate
holes using cubic interpolation method.(Fig 2
describe) Local 3D features data are extracted from
3D face and ear data. A number of characteristic
3D feature point positions (key facts) are
automatically selected on the 3D face and 3D ear
region based on the irregular variations in depth
around them. The Root Mean Square (RMS)
distance technique is used to matching the Local
3D feature (L3DF) data.
5. EXPERIMENTS AND RESULTS:
Face and ear images were collected using
Digitalized scanner or cameras. A database
consisting of face and ear images of 60 individuals
has been built. Sixteen prints are composed from
lone individual with 10 records per biometric
modalities. Thus, multimodal database consists of
990 proceedings, consisting of 440 face and 440
ear records. The database is recognised in two
meetings with an average interval of two months to
motivation on performance of multimodal system.
In our experimentations data, the developed
database is divided into two non-overlapping sets:
training and validation sets of 440 images each ear
and face based multimodal system is applied in
Matlab on a 1.0GB RAM, 2.5GHz Intel Core Duo
processor for PC. Exercise set is first used to train
the threshold determination and the system.
Verification data set is then used to evaluate the
performance of trained system model.
Table 1Comparison of equal error rates (EER)
of multimodal and single modal systems
Biometric System EER (%)
Face 2.823
Ear 2.554
Face and Ear (Feature
0.540
level fusion)
Face and Ear (Score level
fusion (Sum rule))
0.6145
Face and Ear (Score level
fusion (Product rule))
0.5483
Table 1 gives the evaluation of Equal Error Rates
(EER) of Multimodal systems with the single
modal systems. Equal Error Rate, EER of feature-level
fused method is 0.5400%, while that of score-level
fusion with product and sum rules are 0.6145
and 0.5483%, respectively. The multimodal
systems is far less than EER values of separate face
(2.8234%) and ear (2.5543%) identifiers.
Table 2 score-level fusion results on the
proprietary dataset using ICP.
The
results of
the
Ear
Face
Fusion
Facial
Expression
Id.rate (%)
Var.rate
(%)
Id.rate (%)
Var.rate
(%)
Id.rate (%)
Var.rate
(%)
Neutr
al
92.8
6
91.0
7
98.2
1
98.21 100 100
Neutr
al
96.4
3
96.4
3
98.2
1
98.21 100 100
Angr
y
92.8
6
91.0
7
98.2
1
96.43 100 100
Angr
y
96.4
3
96.4
3
98.2
1
96.43 100 100
Smili
ng
92.8
6
91.0
7
92.8
6
91.07 98.21 96.4
3
smili
ng
96.4
3
96.4
3
92.8
6
91.07 98.21 98.2
1
It is obviousfrom the table that although single
modal ear recognition results change when
earphones are damaged, the fusion results remain at
100%. In the case of the face modality model,
angry terminologies do not decrease the recognition
rates much likened to smiling expression.
5. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
243
6.PERFORMANCE ANALYSIS:
The recognition presentation of our
proposed score level fusion approach is estimated
as follows.
Fig 3.Identification results on the test dataset for
score level and feature level fusion technique.
6.1. Results using L3DF-based measures only
The results calculated without including the ICP
data scores. Only seeing the L3DF based scores are
as follows. It will obtain rank one authentications
rates of 90.1% and 96.89% unconnectedly for the
face and ear data respectively on the dataset with
animpartial facial expression. The score level
fusion of two modalities, progresses the overall
presentation to 99.9% accuracy for rank one
authentication.
6.2. Identification results:
The feature level fusion of face and ear data on the
examination data set with non-aligned facial
expression, to obtain a rankone proof of identity
rate of 98.9%. On the similar data set with non-neutralterminologies.
6.3. Verification results:
For the data with impartial facial
expression on the examination dataset, to obtain a
verification rate 99.9% at an FAR of 0.01. In case
of non-neutral expressions, the accuracy decreases
to 96.9%.
The fig 4 can be well-known that although results
of aseparable modality increase with the use
ofIterative Closest Point for neutral expression, the
fusion result reduced slightly.
Fig 4. The Performance Measure for Rank one
identification rate and verification rate.
7. CONCLUSION:
In this paper, two multimodal ear face biometric
recognition approaches are proposed, one with
fusion at the feature level and another at the score
level. These methods are based on local 3D
features (L3DF) which are very fast to
calculateocclusions due to hair and earrings and
robust to pose and scale differences. Then fusion
with ear feature data meaningfully improves the
face recognition results below non-neutral
expressions. The feature and score level fusion
techniques can used to fusion the ear and face data.
For score level fusion, to perform standardisation
the ear and face (L3DFs) are take-out and matched
independently. Similar scores from the two
modalities are then fused rendering to a weighted
sum rule (WSR). For feature level fusion, next
extracting Local 3D Features L3DFs from the face
and ear data, in this to concatenate them based on
their local shape similarity (LSS). It will combine
the benefits of the different levels of fusion
methods.
REFERENCES
[1]Kaur, Gaganpreet. "Feature Level Fusion of
Multimodal Biometrics for Personal
Authentication: A Review."
INTERNATIONAL JOURNAL OF
COMPUTERS & TECHNOLOGY 4, no. 2a
(2013): 199-204.
[2]Gao, Yongsheng, and Michael Maggs. "Feature-level
fusion in personal identification." In
Computer Vision and Pattern Recognition,
2005. CVPR 2005. IEEE Computer Society
Conference on, vol. 1, pp. 468-473. IEEE, 2005.
[3]Zhang, Xiaobo, Zhenan Sun, and Tieniu Tan.
"Hierarchical Fusion of Face and Iris for
Personal Identification." In ICPR, pp. 217-220.
2010.
6. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
244
[4]Mansoor, Atif Bin, Hassan Masood, and
Mustafa Mumtaz. "Personal identification using
feature and score level fusion of palm-and
fingerprints." Signal, Image and Video
Processing 5, no. 4 (2011): 477-483.
[5]Kisku, DakshinaRanjan, Phalguni Gupta,
HunnyMehrotra, and JamunaKanta Sing.
"Multimodal Belief Fusion for Face and Ear
Biometrics." Intelligent Information
Management 1, no. 3 (2009).
[6]Mahoor, Mohammad Hossein, and Mohamed
Abdel-Mottaleb. "A multimodal approach for
face modeling and recognition." Information
Forensics and Security, IEEE Transactions on 3,
no. 3 (2008): 431-440.
[7]Akrouf, Samir, BelayadiYahia, and
MostefaiMessaoud. "A Multi-Modal
Recognition System Using Face and Speech."
International Journal of Computer Science
Issues (IJCSI) 8, no. 3 (2011).
[8]Nageshkumar, M., P. K. Mahesh, and M. N.
Swamy. "An Efficient Secure Multimodal
Biometric Fusion Using Palmprint and Face
Image." International Journal of Computer
Science Issues (IJCSI) 7, no. 4 (2010).
[9]Lu, Xiaoguang, and Anil K. Jain. "Deformation
modeling for robust 3D face matching." Pattern
Analysis and Machine Intelligence, IEEE
Transactions on 30, no. 8 (2008): 1346-1357.
[10]Choras, Michal. "Ear biometrics based on
geometrical feature extraction." Electronic
letters on computer vision and image analysis 5,
no. 3 (2005): 84-95.
[11]Lu, Lu, Zhang Xiaoxun, Zhao Youdong, and
JiaYunde. "Ear recognition based on statistical
shape model." In Innovative Computing,
Information and Control, 2006. ICICIC'06. First
International Conference on, vol. 3, pp. 353-
356. IEEE, 2006.
[12]Jain, A. K., Lin Hong, and Yatin Kulkarni. "A
multimodal biometric system using fingerprint,
face and speech." In Proceedings of 2nd Int'l
Conference on Audio-and Video-based
Biometric Person Authentication, Washington
DC, pp. 182-187. 1999.
[13]Zhou, Xiaoli, and BirBhanu. "Integrating face
and gait for human recognition at a distance in
video." Systems, Man, and Cybernetics, Part B:
Cybernetics, IEEE Transactions on 37, no. 5
(2007): 1119-1137.