SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 83 – 86
_______________________________________________________________________________________________
83
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Review on Multimodal Biometric
Er. Munish Kumar, Er. Prabhjeet Singh*
,
M-Tech(Scholar)Global institute of Management and Emerging Technology
Assistant Professor, Global institute of Management and Emerging Technology
Abstract—A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the
automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with
other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality
and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like
for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and
research areas etc.
Keywords— Biometric, Unimodal, Multimodal, Security, Spoofing Attack
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Biometric identification system is one of the important auth
entication techniques to provide a proper validation. In Past
decades, knowledge based security like passwords, tokens and
id cards. These kinds of security considerations can be easily
breached.To overcome these issues ,the biometric
authentication system is more powerful tool .Containing
fingerprint and iris technology Fingerprint and iris technology
are unique for identify the person authentication . Its matching
accuracy is very high .Fingerprint is a graphical pattern of
ridges and valleys on the surface of human finger. Iris is one of
the biometric authentication system which are located between
cornea and lens of the human eye.
Characteristics of Biometric:-
Any physical and/or behaviour characteristics of a human can
be considered as a biometric if it exhibits following
characteristics[9].
 Scalability:Biometrics systems can be quite flexible and
easily scalable. You can use higher versions of sensors
and security systems based on your requirements.
 Versatality: There are different typesof biometrics
scanners available today and they can be used for various
applications. They can be used by companies at security
checkpoints including entrances, exits, doorways, and
more.
 Uniqueness: The given biometric trait should exhibits
distinct features acrossindividuals comprising
thepopulation.
 Accountability:Biometrics creates a clear, definable
audit trail of transactions or activities. This is especially
handy in case of security breaches because you know
exactly who is responsible for it. As a result you get true
and complete accountability, which cannot be duplicated.
 Easy and safe for use:Biometrics technology gives you
accurate results with minimal invasiveness as a simple
scan or a photograph is usually all that’s required.
Moreover the software and hardware can be easily used
and you can have them installed without the need for
excessive training..
 Performance: The biometric trait should the required
accuracy imposed by theapplication.
 Time Saving: Biometric identification is extremely
quick, which is another advantage it has over other
traditional security methods. A person can be identified
or rejected in a matter of seconds.
 Circumvention:This indicates how easily the chosen
biometric trait can fooled usingartifacts
.
Examples of biometric characteristics: (a) DNA, (b) ear, (c) face, (d)facial
thermo gram,(e) hand thermo gram(f)hand vein(g)fingerprint, (h)gait,(i) hand
geometry, (j)iris, (k)palm print(l) retina(m) signature (n) voice
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 83 – 86
_______________________________________________________________________________________________
84
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Need of Multimodal Biometrics :-
Most of the biometric systems deployed in real world
applications are unimodal which rely on the evidence of single
source of information for authentication (e.g. fingerprint, face,
voice etc.). These systems are vulnerable to variety of
problems such as noisy data, intra-class variations, inter-class
similarities, non-universality and spoofing. It leads to
considerably high false acceptance rate (FAR) and false
rejection rate (FRR), limited discrimination capability, upper
bound in performance and lack of permanence. Some of the
limitations imposed by Unimodal biometric systems can be
overcome by including multiple sources of information for
establishing identity. These systems allow the integration of
two or more types of biometric systems known as multimodal
biometric systems. These systems are more reliable due to the
presence of multiple, independent biometric.
Fig. 3 Diagram of Multimodal Biometrics
Fusion in Multimodal Biometric System:-
A Mechanism that can combine the classification results from
each biometric channel is called as biometric fusion[8].
INFORMATION FUSION:-
Pre-classificationfusion: Prior to classification /matching,
integration of information can take place either at the sensor
level or at the feature level.
Post-classification fusion: Schemes for integration of
information after the classification..
.Fig. 4 Approaches to information fusion
Level of fusion:-
A generic biometric system has 4 important modules:
1) Sensor module: It captures the trait in the form of
raw biometric data
2) Feature extraction module: It processes the data to
extract a feature set that is a compact representation of
the trait
3) Matching module: It employs a classifier to compare
the extracted feature set with thetemplates residing in
the database to generate matching scores
4) Decision module which uses the matching scores to
either determine an identity or validate a claimed
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 83 – 86
_______________________________________________________________________________________________
85
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig. 5 Levels of fusion in bimodal biometric system; FU:
Fusion Module, MM: Matching Module, DM: Decision
Module
Biometric AuthenticationTraits:In this paper, we have
discussed multimodal biometric authentication system by
integration of fingerprints and iris recognition for better
security consideration as much as possible. Biometric traits are
conffered as follows:
Fingerprint Recognition: Finger print is a graphical Pattern of
ridges and valleys on the surface of human finger.The finger
prints recognition is used for forensic department for criminal
identification.Most automate system for finger print
comparison is based on minutiae matching.Minutiae matching
chractersitics represents the termination and burification of the
fingerprints. A good quality of finger prints image contains
about 40 to 100 minutiae. Each person has its own fingerprints
with the permanent uniqueness.Finger print is composed of
ridges and furrows which are parallel and have same width..
Iris Recognition:
Iris biometric authentification system which are located
Between cornea and lens of the human eye.The iris funct ion is
used to control the amount of light entering thro gh the pupil.it
consists no of layers, in the lowest layer it contains dense color
cells also it determine the color ofiris.In image processing
technique,it can be employed to convert iris pattern to unique
code which is stored in a database and allows comparison
between templates.
 Image Acquisition:Take photo of iris with good
resolution and quality.
 Segmentation:Process the acquiring image for
separation of iris from eye image.
 Normalization
 Features extraction and features encoding.
 Storing extracted code in database & comparing
Asquiring iris images with codes in database.
II. CHALLENGES AND RESEARCH AREAS:-
In the previous sections, followings are the challenges in
designing the multimodal systems. Successful pursuit of these
biometric challenges will generate significant advances to
improve safety and security in future missions. The sensors
used for acquiring the data should show consistency in
performance under variety of operational environment.
Fundamental understanding of biometric technologies,
operational requirements and privacy principles to enable
beneficial public debate on where and how biometrics systems
should be used, embed privacy functionality into every layer of
architecture, protective solutions that meet operational needs,
enhance public confidence in biometric technology and
safeguard personal information. Designing biometric sensors,
which automatically recognize the operating environment
(outdoor / indoor / lighting etc) and communicate with other
system components to automatically adjust settings to deliver
optimal data, is also the challenging area. The sensor should be
fast in collecting quality images from a distance and should
have low cost with no failures to enroll. The multimodal
biometric systems can be improved by enhancing matching
algorithms, integration of multiple sensors, analysis of the
scalability of biometric systems, followed by research on
scalability improvements and quality measures to assist
decision making in matching process. Open standards for
biometric data interchange formats, file formats, applications
interfaces, implementation agreements, testing methodology,
adoption of standards based solutions, guidelines for auditing
biometric systems and records and framework for integration of
privacy principles are the possible research areas in the
field[11].
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 83 – 86
_______________________________________________________________________________________________
86
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
IV. CONCLUSION
Biometrics systems are widely used to overcome the traditional
methods of authentication. But the unimodal biometric system
fails in case of lack of biometric data for particular trait. Thus
the individual traits (fingerprint, and iris) are combined to
develop a multimodal biometric system. The performanceof
multimodal system better as compared to unimodal biometrics
with accuracy .
References
[1] AlMahafzah, Harbi. , Imran, Mohammad. ,and Sheshadri,S,
H. , ―Multibiometric: Feature level fusion‖ Published in IJCSI
International Journal of Computer Science Issues, Vol. 9, Issue
4, No 3, 2012.
[2] Camlikaya, Eren. , Kholmatov,Alisher. ,
andYanikoglu,Berrin. , ―Multi-Biometric Templates Using
Fingerprints and Voice‖ Published in Biometric Technology
for Human Identification V, edited by B. V. K. Vijaya
Kumar, SalilPrabhakar, Arun A. Ross Proc. of SPIE Vol. 6944,
69440I, 2008.
[3] Gayathri, R. ,Ramamoorthy, P. , ― Feature level fusion of
palmprint and iris‖ Published in IJCSI International Journal of
Computer Science Issues, Vol. 9, Issue 4, No 1, 2012.
[4] Inoue, Nakamasa. , Saito, Tatsuhiko. , Shinoda, Koichi., and
Furui, Sadaoki. , ―High Level Feature Extraction Using SIFT
GMMs and Audio Models‖ Published in International
Conference on Pattern Recognition 2010.
[5] Jain, K, Anil. , Ross, Arun. , and Prabhakar,Salil. , ―An
Introduction to Biometric Recognition‖, Published in IEEE
Transactions on Circuits and Systems for Video Technology,
Special Issue on Image- and Video-Based Biometrics, Vol. 14,
No. 1, pp.1782-1793, 2004.
[6] Kaur, Mandeep. , Girdhar, Akshay. , and Kaur, Manvjeet. ,
Published in ―Multimodal Biometric System using Speech and
Signature Modalities‖ IJCA International Journal of Computer
Application,Volume 5- No. 12, 2010
[7] Kittler, J. , DUIN,W. , P., R. , "The combining classifier: to
train or not to train," Published in Proceedings of the
International Conference on Pattern Recognition, vol. 16, no. 2,
pp. 765–770, 2002.
[8] Ross, Arun. , and Jain, K, Anil. , "Information fusion in
biometrics," Published in Pattern Recognition Letters, vol. 24,
no. 13, pp. 2115-2125,2003.
[9] Ross, Arun. , and Jain, K, Anil., ―Multimodal Biometrics: An
Overview‖; Appeared in Proc. of 12th European Signal
Processing Conference (EUSIPCO), (Vienna, Austria), pp.
1221-1224, 2004.
[10] Sankar, Perumal, S. , N, C , Dinakardas. , ― Multimodal
biometric Authentication System Based on High level feature
fusion approach‖ Published in International Journal of
Computer Applications No. 1 , pp. 55-63,2012.
[11] Snehlata, Barde. , Sujata, Khobragade.,Rasmiprava,
Singh. ,―Authentication Progression through Multimodal
Biometric System‖ Published in IJEIT International Journal of
Engineering and Innovative Technology Issues, Volume 2,
2012.
[12] Soliman, Hassan., ―Feature Level Fusion of Palm Veins and
Signature Biometrics‖ Published in International Journal of
Video & Image Processing and Network Security Vol: 12 No:
01 ,2012.
[13] Zhang, Ligang. , Tjondronegoro, Dian. , and Chandran,
Vinod. , ―Discovering the Best Feature Extraction and
Selection Algorithms for Spontaneous Facial Expression
Recognition‖ Published in IEEE Conference on Multimedia
and Expo, IEEE, Melbourne, pp. 1027-1032, 2012.

More Related Content

What's hot

Smart Cities and NICT
Smart Cities and NICTSmart Cities and NICT
Smart Cities and NICT
rahulmonikasharma
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
eSAT Journals
 
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEMREVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Internet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for HealthcareInternet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for Healthcare
Istabraq M. Al-Joboury
 
Machine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic ReviewMachine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic Review
Associate Professor in VSB Coimbatore
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
IJERA Editor
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
eSAT Publishing House
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
 
A Self-organized Framework for Insurance Based on Internet of Things and Bloc...
A Self-organized Framework for Insurance Based on Internet of Things and Bloc...A Self-organized Framework for Insurance Based on Internet of Things and Bloc...
A Self-organized Framework for Insurance Based on Internet of Things and Bloc...
Kamran Gholizadeh HamlAbadi
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devices
ijtsrd
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET Journal
 
H1803044651
H1803044651H1803044651
H1803044651
IOSR Journals
 
G1803044045
G1803044045G1803044045
G1803044045
IOSR Journals
 
Data Management for Internet of things : A Survey and Discussion
Data Management for Internet of things : A Survey and DiscussionData Management for Internet of things : A Survey and Discussion
Data Management for Internet of things : A Survey and Discussion
IRJET Journal
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
International Journal of Science and Research (IJSR)
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
eSAT Publishing House
 
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using  Raspberry PiIOT based Industrial Automation using  Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
IJTRET-International Journal of Trendy Research in Engineering and Technology
 

What's hot (19)

Smart Cities and NICT
Smart Cities and NICTSmart Cities and NICT
Smart Cities and NICT
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEMREVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
 
Internet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for HealthcareInternet of Things Architecture Based Cloud for Healthcare
Internet of Things Architecture Based Cloud for Healthcare
 
Machine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic ReviewMachine Learning Algorithms Applied to System Security: A Systematic Review
Machine Learning Algorithms Applied to System Security: A Systematic Review
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
A Self-organized Framework for Insurance Based on Internet of Things and Bloc...
A Self-organized Framework for Insurance Based on Internet of Things and Bloc...A Self-organized Framework for Insurance Based on Internet of Things and Bloc...
A Self-organized Framework for Insurance Based on Internet of Things and Bloc...
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devices
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
H1803044651
H1803044651H1803044651
H1803044651
 
G1803044045
G1803044045G1803044045
G1803044045
 
Data Management for Internet of things : A Survey and Discussion
Data Management for Internet of things : A Survey and DiscussionData Management for Internet of things : A Survey and Discussion
Data Management for Internet of things : A Survey and Discussion
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using  Raspberry PiIOT based Industrial Automation using  Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
 

Similar to Review on Multimodal Biometric

Designing of Pick and Place Robotic Arm
Designing of Pick and Place Robotic ArmDesigning of Pick and Place Robotic Arm
Designing of Pick and Place Robotic Arm
rahulmonikasharma
 
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access RestrictionsSafeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
rahulmonikasharma
 
Smart Manufacturing using IOT
Smart Manufacturing using IOTSmart Manufacturing using IOT
Smart Manufacturing using IOT
rahulmonikasharma
 
A Survey on the Use of Pattern Recognition Techniques
A Survey on the Use of Pattern Recognition TechniquesA Survey on the Use of Pattern Recognition Techniques
A Survey on the Use of Pattern Recognition Techniques
rahulmonikasharma
 
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...Impact of Expert System as Tools for Efficient Teaching and Learning Process ...
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...
rahulmonikasharma
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
rahulmonikasharma
 
Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...
rahulmonikasharma
 
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max NetworksNew Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
rahulmonikasharma
 
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
rahulmonikasharma
 
1464426255 28 05-2016
1464426255 28 05-20161464426255 28 05-2016
1464426255 28 05-2016
Noura Gomaa
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
rahulmonikasharma
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
eSAT Journals
 
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big DataAuthentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
rahulmonikasharma
 
A New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image ProcessingA New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image Processing
rahulmonikasharma
 
Level-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor NetworksLevel-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor Networks
rahulmonikasharma
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
rahulmonikasharma
 
Smart Frame - A Location Sensing Picture Frame using IOT
Smart Frame - A Location Sensing Picture Frame using IOTSmart Frame - A Location Sensing Picture Frame using IOT
Smart Frame - A Location Sensing Picture Frame using IOT
rahulmonikasharma
 
Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
rahulmonikasharma
 

Similar to Review on Multimodal Biometric (20)

Designing of Pick and Place Robotic Arm
Designing of Pick and Place Robotic ArmDesigning of Pick and Place Robotic Arm
Designing of Pick and Place Robotic Arm
 
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access RestrictionsSafeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
 
Smart Manufacturing using IOT
Smart Manufacturing using IOTSmart Manufacturing using IOT
Smart Manufacturing using IOT
 
A Survey on the Use of Pattern Recognition Techniques
A Survey on the Use of Pattern Recognition TechniquesA Survey on the Use of Pattern Recognition Techniques
A Survey on the Use of Pattern Recognition Techniques
 
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...Impact of Expert System as Tools for Efficient Teaching and Learning Process ...
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...
 
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max NetworksNew Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
 
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
 
1464426255 28 05-2016
1464426255 28 05-20161464426255 28 05-2016
1464426255 28 05-2016
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big DataAuthentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
 
A New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image ProcessingA New Born Child Authentication System using Image Processing
A New Born Child Authentication System using Image Processing
 
Level-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor NetworksLevel-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor Networks
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
 
Smart Frame - A Location Sensing Picture Frame using IOT
Smart Frame - A Location Sensing Picture Frame using IOTSmart Frame - A Location Sensing Picture Frame using IOT
Smart Frame - A Location Sensing Picture Frame using IOT
 
Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 

Review on Multimodal Biometric

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 83 – 86 _______________________________________________________________________________________________ 83 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Review on Multimodal Biometric Er. Munish Kumar, Er. Prabhjeet Singh* , M-Tech(Scholar)Global institute of Management and Emerging Technology Assistant Professor, Global institute of Management and Emerging Technology Abstract—A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc. Keywords— Biometric, Unimodal, Multimodal, Security, Spoofing Attack __________________________________________________*****_________________________________________________ I. INTRODUCTION Biometric identification system is one of the important auth entication techniques to provide a proper validation. In Past decades, knowledge based security like passwords, tokens and id cards. These kinds of security considerations can be easily breached.To overcome these issues ,the biometric authentication system is more powerful tool .Containing fingerprint and iris technology Fingerprint and iris technology are unique for identify the person authentication . Its matching accuracy is very high .Fingerprint is a graphical pattern of ridges and valleys on the surface of human finger. Iris is one of the biometric authentication system which are located between cornea and lens of the human eye. Characteristics of Biometric:- Any physical and/or behaviour characteristics of a human can be considered as a biometric if it exhibits following characteristics[9].  Scalability:Biometrics systems can be quite flexible and easily scalable. You can use higher versions of sensors and security systems based on your requirements.  Versatality: There are different typesof biometrics scanners available today and they can be used for various applications. They can be used by companies at security checkpoints including entrances, exits, doorways, and more.  Uniqueness: The given biometric trait should exhibits distinct features acrossindividuals comprising thepopulation.  Accountability:Biometrics creates a clear, definable audit trail of transactions or activities. This is especially handy in case of security breaches because you know exactly who is responsible for it. As a result you get true and complete accountability, which cannot be duplicated.  Easy and safe for use:Biometrics technology gives you accurate results with minimal invasiveness as a simple scan or a photograph is usually all that’s required. Moreover the software and hardware can be easily used and you can have them installed without the need for excessive training..  Performance: The biometric trait should the required accuracy imposed by theapplication.  Time Saving: Biometric identification is extremely quick, which is another advantage it has over other traditional security methods. A person can be identified or rejected in a matter of seconds.  Circumvention:This indicates how easily the chosen biometric trait can fooled usingartifacts . Examples of biometric characteristics: (a) DNA, (b) ear, (c) face, (d)facial thermo gram,(e) hand thermo gram(f)hand vein(g)fingerprint, (h)gait,(i) hand geometry, (j)iris, (k)palm print(l) retina(m) signature (n) voice
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 83 – 86 _______________________________________________________________________________________________ 84 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Need of Multimodal Biometrics :- Most of the biometric systems deployed in real world applications are unimodal which rely on the evidence of single source of information for authentication (e.g. fingerprint, face, voice etc.). These systems are vulnerable to variety of problems such as noisy data, intra-class variations, inter-class similarities, non-universality and spoofing. It leads to considerably high false acceptance rate (FAR) and false rejection rate (FRR), limited discrimination capability, upper bound in performance and lack of permanence. Some of the limitations imposed by Unimodal biometric systems can be overcome by including multiple sources of information for establishing identity. These systems allow the integration of two or more types of biometric systems known as multimodal biometric systems. These systems are more reliable due to the presence of multiple, independent biometric. Fig. 3 Diagram of Multimodal Biometrics Fusion in Multimodal Biometric System:- A Mechanism that can combine the classification results from each biometric channel is called as biometric fusion[8]. INFORMATION FUSION:- Pre-classificationfusion: Prior to classification /matching, integration of information can take place either at the sensor level or at the feature level. Post-classification fusion: Schemes for integration of information after the classification.. .Fig. 4 Approaches to information fusion Level of fusion:- A generic biometric system has 4 important modules: 1) Sensor module: It captures the trait in the form of raw biometric data 2) Feature extraction module: It processes the data to extract a feature set that is a compact representation of the trait 3) Matching module: It employs a classifier to compare the extracted feature set with thetemplates residing in the database to generate matching scores 4) Decision module which uses the matching scores to either determine an identity or validate a claimed
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 83 – 86 _______________________________________________________________________________________________ 85 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig. 5 Levels of fusion in bimodal biometric system; FU: Fusion Module, MM: Matching Module, DM: Decision Module Biometric AuthenticationTraits:In this paper, we have discussed multimodal biometric authentication system by integration of fingerprints and iris recognition for better security consideration as much as possible. Biometric traits are conffered as follows: Fingerprint Recognition: Finger print is a graphical Pattern of ridges and valleys on the surface of human finger.The finger prints recognition is used for forensic department for criminal identification.Most automate system for finger print comparison is based on minutiae matching.Minutiae matching chractersitics represents the termination and burification of the fingerprints. A good quality of finger prints image contains about 40 to 100 minutiae. Each person has its own fingerprints with the permanent uniqueness.Finger print is composed of ridges and furrows which are parallel and have same width.. Iris Recognition: Iris biometric authentification system which are located Between cornea and lens of the human eye.The iris funct ion is used to control the amount of light entering thro gh the pupil.it consists no of layers, in the lowest layer it contains dense color cells also it determine the color ofiris.In image processing technique,it can be employed to convert iris pattern to unique code which is stored in a database and allows comparison between templates.  Image Acquisition:Take photo of iris with good resolution and quality.  Segmentation:Process the acquiring image for separation of iris from eye image.  Normalization  Features extraction and features encoding.  Storing extracted code in database & comparing Asquiring iris images with codes in database. II. CHALLENGES AND RESEARCH AREAS:- In the previous sections, followings are the challenges in designing the multimodal systems. Successful pursuit of these biometric challenges will generate significant advances to improve safety and security in future missions. The sensors used for acquiring the data should show consistency in performance under variety of operational environment. Fundamental understanding of biometric technologies, operational requirements and privacy principles to enable beneficial public debate on where and how biometrics systems should be used, embed privacy functionality into every layer of architecture, protective solutions that meet operational needs, enhance public confidence in biometric technology and safeguard personal information. Designing biometric sensors, which automatically recognize the operating environment (outdoor / indoor / lighting etc) and communicate with other system components to automatically adjust settings to deliver optimal data, is also the challenging area. The sensor should be fast in collecting quality images from a distance and should have low cost with no failures to enroll. The multimodal biometric systems can be improved by enhancing matching algorithms, integration of multiple sensors, analysis of the scalability of biometric systems, followed by research on scalability improvements and quality measures to assist decision making in matching process. Open standards for biometric data interchange formats, file formats, applications interfaces, implementation agreements, testing methodology, adoption of standards based solutions, guidelines for auditing biometric systems and records and framework for integration of privacy principles are the possible research areas in the field[11].
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 83 – 86 _______________________________________________________________________________________________ 86 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ IV. CONCLUSION Biometrics systems are widely used to overcome the traditional methods of authentication. But the unimodal biometric system fails in case of lack of biometric data for particular trait. Thus the individual traits (fingerprint, and iris) are combined to develop a multimodal biometric system. The performanceof multimodal system better as compared to unimodal biometrics with accuracy . References [1] AlMahafzah, Harbi. , Imran, Mohammad. ,and Sheshadri,S, H. , ―Multibiometric: Feature level fusion‖ Published in IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, 2012. [2] Camlikaya, Eren. , Kholmatov,Alisher. , andYanikoglu,Berrin. , ―Multi-Biometric Templates Using Fingerprints and Voice‖ Published in Biometric Technology for Human Identification V, edited by B. V. K. Vijaya Kumar, SalilPrabhakar, Arun A. Ross Proc. of SPIE Vol. 6944, 69440I, 2008. [3] Gayathri, R. ,Ramamoorthy, P. , ― Feature level fusion of palmprint and iris‖ Published in IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 1, 2012. [4] Inoue, Nakamasa. , Saito, Tatsuhiko. , Shinoda, Koichi., and Furui, Sadaoki. , ―High Level Feature Extraction Using SIFT GMMs and Audio Models‖ Published in International Conference on Pattern Recognition 2010. [5] Jain, K, Anil. , Ross, Arun. , and Prabhakar,Salil. , ―An Introduction to Biometric Recognition‖, Published in IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, pp.1782-1793, 2004. [6] Kaur, Mandeep. , Girdhar, Akshay. , and Kaur, Manvjeet. , Published in ―Multimodal Biometric System using Speech and Signature Modalities‖ IJCA International Journal of Computer Application,Volume 5- No. 12, 2010 [7] Kittler, J. , DUIN,W. , P., R. , "The combining classifier: to train or not to train," Published in Proceedings of the International Conference on Pattern Recognition, vol. 16, no. 2, pp. 765–770, 2002. [8] Ross, Arun. , and Jain, K, Anil. , "Information fusion in biometrics," Published in Pattern Recognition Letters, vol. 24, no. 13, pp. 2115-2125,2003. [9] Ross, Arun. , and Jain, K, Anil., ―Multimodal Biometrics: An Overview‖; Appeared in Proc. of 12th European Signal Processing Conference (EUSIPCO), (Vienna, Austria), pp. 1221-1224, 2004. [10] Sankar, Perumal, S. , N, C , Dinakardas. , ― Multimodal biometric Authentication System Based on High level feature fusion approach‖ Published in International Journal of Computer Applications No. 1 , pp. 55-63,2012. [11] Snehlata, Barde. , Sujata, Khobragade.,Rasmiprava, Singh. ,―Authentication Progression through Multimodal Biometric System‖ Published in IJEIT International Journal of Engineering and Innovative Technology Issues, Volume 2, 2012. [12] Soliman, Hassan., ―Feature Level Fusion of Palm Veins and Signature Biometrics‖ Published in International Journal of Video & Image Processing and Network Security Vol: 12 No: 01 ,2012. [13] Zhang, Ligang. , Tjondronegoro, Dian. , and Chandran, Vinod. , ―Discovering the Best Feature Extraction and Selection Algorithms for Spontaneous Facial Expression Recognition‖ Published in IEEE Conference on Multimedia and Expo, IEEE, Melbourne, pp. 1027-1032, 2012.