BIOMETRIC TECHNOLOGY: A REVIEW
|
|
- Ralph McKinney
- 6 years ago
- Views:
Transcription
1 International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer Science, Singhania University, Rajasthan, India kashoo @yahoo.co.in ABSTRACT Biometrics is a field of science which deals with the positive identification of unique individuals based on their physiological or behavioural characteristics. Biometrics has lately been receiving attention in technologies. In today s world the need for large-scale identity management system, whose functionality relies on the accuracy of identifying individuals influenced the development of biometrics in modern world. This paper discusses about Biometriccharacteristics in detail. The demerits of unimodel biometric and the characteristic of Multimodel Biometrics are also described. And finally, the biometric security issue is touched and the various levels at which a particular biometric system can be attacked is presented. 1. INTRODUCTION TO BIOMETRICS Biometrics are automated methods of recognizing an individual based on their physiological (e.g., fingerprints, retina, face, iris) or behavioral characteristics (e.g., gait, signature)[1]. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. A number of biometric identifiers are in use in various applications. Each biometric has its strengths and weaknesses and the choice typically depends on the application[2]. No single biometric is expected to effectively meet the requirements of all the applications. The similarity between a biometric and an application is determined depending upon the characteristics of the application and the properties of the biometric. 2. BIOMETRIC CHARACTERISTICS Any human physiological or behavioural characteristic will be a biometrics if it satisfies the following[3]: a. Universality: The biometric trait must be universal. Means every person should posses that biometric trait. b. Permanence: The biometric trait of an individual should not be variable with time with respect to the matching algorithm. A trait which that changes over time can not be used as biometric. c. Uniqueness: The biometric trait should be unique for individuals. In other words the trait should differ sufficiently in case of every two person so that each person can be identified individually. d. Measurability: It should be possible to acquire and digitize the biometric trait using suitable devices. Furthermore, the acquired raw data should be valid to processing in order to extract representative feature sets. e. Performance: The recognition accuracy and the resources required to achieve that accuracy should meet the constraints imposed by the application. f. Acceptability: Individuals in the target population that will utilize the application should be willing to present their biometric trait to the system. g. Circumvention: This refers to the ease with which the trait of an indi vidual can be imitated using artifacts (e.g., fake fingers), in the case of physical traits, and mimicry, in the case of behavioral traits. 3. BIOMETRIC SYSTEMS A biometric system is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature set from the acquired data, and comparing this feature set against the template set in the database. Depending on the application context, a biometric system may operate either in verification mode or identification mode. a. Verification: In the verification mode, the system approve a person, if the biometric data given by the person matches her own biometric template(s) which is stored in the system database. An user who desires to be recognized claims his/her identity, usually via a PIN, a smart card, etc., and the system performs a one-to one matching with the corresponding template to determine whether the claim is true or not. Identity verification is typically used for positive recognition, where the aim is to prevent multiple people from using the same identity[4]. b. Identification: In the identification mode, the user dose not need to provide any PIN or smart card to
2 288 International Journal of Computer Science and Communication (IJCSC) claim his/her identity, the user just provide the biometric data and the system compares the given biometric data with all the biometric templates stored in the system and if there is a match the system approves the person. Therefore, the system conducts a one-to-many comparison to establish an individual s identity. In negative recognition applications where identification is a critical component the system establishes whether the person is who he/ she (implicitly or explicitly) denies to be. The purpose of negative recognition is to prevent a single person from using multiple identities[5]. 3.1 Biometric System Design Modules A biometric system is designed using the following four main modules[6]: a. Sensor module: In this module the biometric data of the individuals is been captured. An example is a fingerprint sensor that captures and images the ridge and valley structure of a user s finger. b. Feature extraction module: this module processed the captured biometric data to extract a set of salient or discriminatory features. c. Matcher module: In this module the extracted features are compared against the stored templates to generate matching scores. The matcher module also encapsulates a decision making module, in which a user s claimed identity is confirmed (verification) or a user s identity is established (identification) based on the matching score. d. System database module: This module is used to store the biometric templates of the enrolled users. During the enrollment phase, the biometric characteristic of an individual is first scanned by a biometric reader to produce a digital representation (feature values) of the characteristic. In order to facilitate matching, the input digital representation is further processed by a feature extractor to generate a compact but expressive representation, called a template. Figure 1: Enrollment, Verification and Identification Using Four Main Modules 4. ERROR RATES AND THEIR USAGE There are two kinds of errors that biometric systems do: 1. False rejection (Type 1 error): It may sometime happen that a valid user is rejected because the system does not find the user s current biometric data similar enough to the master template stored in the database, this is called false rejection or type 1 error. A hundred percent similarity between the given biometric data and the stored template is also suggests a very good fake. 2. False acceptance (Type 2 error): sometimes a biometric data provided by an fraud accepted because of its enough similarity with the master template of a legitimate user, this is called false acceptance or type 2 error.
3 Biometric Technology: A Review 289 In an ideal system, there are no false rejections and no false acceptances. In a real system, however, some false rejection and false acceptance exist depending on the security threshold. The higher the threshold the more false rejections and less false acceptances and the lower the threshold the less false rejections and more false acceptances. The decision which threshold to use depends mainly on the purpose of the entire biometric system. It is chosen as a compromise between the security and the usability of the system. The number of false rejections/false acceptances is usually expressed as a percentage from the total number of authorized/ unauthorized access attempts. These rates are called the False rejection rate (FRR)/false acceptance rate (FAR). The values of the rates are bound to a certain security threshold. If the device supports multiple security levels or returns a score we can create a graph indicating the dependence of the FAR and FRR on the threshold value. The following picture shows an example of such a graph: of authentication can be made possible by the use of multimodal biometric systems. 5.1 Modes of Operation A multimodal biometric system can operate in one of three different modes: serial mode, parallel mode, or hierarchical mode. In the serial mode of operation, the traits are applied one by one; the output of one biometric trait is typically used to narrow down the number of possible identities before the next trait is used. In the parallel mode of operation multiple traits are used simultaneously to perform recognition. In the serial mode we could have come to the decision without acquiring all the traits, in that case it s the decision of the system manager to either not to use the leftover traits or to use all the traits for better decision making. 5.2 Levels of Fusion Multimodal biometric systems integrate information data offered by multiple biometric indicators. The information can be consolidated at various levels. Figure 3 illustrates the three levels of fusion when combining two or more biometric systems. These are: Figure 2: Dependency of the FAR & FRR on the Threshold Value The curves of FAR and FRR cross at the point where FAR and FRR are equal. This value is called the equal error rate (ERR) or the crossover accuracy generally does not have any practical use, but it indicates the accuracy of the device. If we have two devices with the equal error rates of 5% and 10% then we know that the first device crossover is more accurate (i.e., does fewer errors) than the other. 5. MULTIMODAL BIOMETRICS Some of the limitations imposed by unimodal biometric systems can be overcome by using multiple biometric modalities. In a multimodal system more than one biometric trait are used for the identification purpose and expected to be more reliable due to the presence of multiple, independent pieces of evidence. Further, multimodal biometric systems provide anti-spoofing measures by making it difficult for an intruder to simultaneously spoof the multiple biometric traits of a legitimate user. By asking the user to present a random subset of biometric, the system ensures the liveliness of the user in some degree. Thus, a challenge-response type Figure 3: Different Levels of Fusion in a Parallel Fusion Mode: a) Fusion at the Feature Extraction Level; b) Fusion at Matching Score (Confidence or Rank) Level; c) Fusion at Decision (Abstract Label) Level. In all the Three Cases, the Final Class Label is Accept or Reject when the Biometric System is Operating in the Verification Mode or the Identity of the Best Matched User when Operating in the Identification Mode. In c) the Intermediate Abstract Label(s) could be Accept or Reject in a Verification System or a Subset of Database Users in an Identification System.
4 290 International Journal of Computer Science and Communication (IJCSC) a. Fusion at the sensor level: The data acquired by different sensor must be compatible to perform the fusion at the sensor level, but it is very rare in case of biometric sensor. So the fusion at the sensor level is very rare. b. Fusion at the feature extraction level: Unique features are exacted from the data acquired from each biometric trait. If the features extracted from different indicators are independent of each other, then it is reasonable to concatenate the vectors into a single new vector, provided the features from different biometric indicators are in the same type of measurement scale. We can also use feature reduction techniques to extract a small number of salient features from the larger set of features. c. Fusion at the matching score level: Each biometric matcher provides a similarity score indicating the proximity of the input feature vector with the template feature vector. These scores can be combined to assert the accuracy of the claimed identity. Techniques such as weighted averaging may be used to combine the matching scores reported by the multiple matchers. d. Fusion at the decision (abstract label) level: Based on its own feature vector each biometric system makes its own identification decision. We can use a majority vote scheme to make the final recognition decision. 6. BIOMETRIC SECURITY No Biometric System is fully fool proof. Several different levels of attacks that can be launched against a biometric system are (Figure 4): (i) a fake biometric trait such as an artificial finger may be presented at the sensor, (ii) illegally intercepted data may be resubmitted to the system, (iii) the feature extractor may be replaced by a Trojan horse program that produces pre-determined feature sets, (iv) legitimate feature sets may be replaced with synthetic feature sets, (v) the matcher may be replaced by a Trojan horse program that always outputs high scores thereby defying system security, (vi) the templates stored in the database may be modified or removed, or new templates may be introduced in the database, (vii) the data in the communication channel between various modules of the system may be altered, and (viii) the final decision output by the biometric system may be overridden[7]. Many researches have been done to secure the biometric data and template using cryptography, steganography and watermarking. In cryptography, the secret message is scrambled using a encryption key, this scrambled message is transmitted through the insecure public channel. And at the receiver site the original message is reconstructed using the appropriate decryption key. In steganography, the secret message is embedded in another message. Using this technology even the fact that a secret is being transmitted has to be secret. This makes these attacks considerably more difficult to achieve. But steganography is more secure than cryptography because there is no separate key in steganography rather key is inbuilt in the template. Figure 4: Various Attack Levels on a Biometric System 7. SUMMARY Nowadays a reliable personal recognition system is very essential for many business processes. The conventional recognition processes (knowledge-based and tokenbased methods) is not able to provide positive personal recognition because they rely on stand-in representations of the person s identity (e.g., exclusive knowledge or possession). It is thus obvious that any system assuring reliable personal recognition must necessarily involve a biometric component. Biometric-based systems also have some limitations that may have adverse implications for the security of a system. Security is a risk management strategy that identifies controls, eliminates, or minimizes uncertain events that may adversely affect system resources and information assets. The security level of a system depends on the requirements of an application and the cost-benefit analysis[8]. Proper design and implementation of the biometric system can indeed increase the overall security. REFERENCES [1] Anil K. Jain Michigan State University, E. Lansing, Michigan and Ruud Bolle and Sharath Pankanti IBM, T.J. Watson Research Center Yorktown Heights, New York Kluwer Academic, Biometrics Personal Identification in Networked Society, 2002 Kluwer Academic Publishers New York, Boston, Dordrecht, London, Moscow. [2] Anil K. Jain, Michigan State University, USA, Patrick Flynn University of Notre Dame, USA, Arun A. Ross West Virginia University, USA, Handbook of Biometrics, [3] R. Clarke, Human Identification in Information Systems: Management Challenges and Public Policy Issues, Information Technology & People, 7, No. 4, pp. 6-37, 1994.
5 Biometric Technology: A Review 291 [4] Anil K. Jain, Arun Ross and Salil Prabhakar, An Introduction to Biometric Recognition, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, 14, No. 1, January [5] Zdenek Riha Vaclav Matyas, Faculty of Informatics Masaryk University, Biometric Authentication Systems, Report Series, [6] An Introduction to Biometrics, White Paper by Motorola, [7] Biometrics, Chapter 1, Implementing Biometric Security. [8] Andrzej Drygajlo (2007), Speech Processing and Biometrics Group, Signal Processing Institute Ecole Polytechnique Federale de Lausanne (EPFL), Biometrics Lectures.
Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationA Novel Approach to Improve the Biometric Security using Liveness Detection
Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationSecure and Private Identification through Biometric Systems
Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationStegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA Pravin M.Sonsare
More informationA Survey on Security in Palmprint Recognition: A Biometric Trait
A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationMultimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters
Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationFrom the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems
From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es
More informationMultimodal Biometric System in Secure e- Transaction in Smart Phone
Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,
More informationFingerprint Verification System using Minutiae Extraction Technique
Fingerprint Verification System using Minutiae Extraction Technique Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu Abstract Most fingerprint recognition techniques are based on
More informationLecture 9 User Authentication
Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationChapter 3: User Authentication
Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process
More informationProper user identification is essential for reliable
Toward Reliable User Authentication through Biometrics Biometric authentication systems identify users by their measurable human characteristics. Although biometrics promise greater system security because
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationA Review of Emerging Biometric Authentication Technologies
International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 7 Issue 2 Ver. IV February 2018 PP. 16-21 A Review of Emerging Biometric Authentication
More informationChapter 6. Multibiometrics
148 Chapter 6 Multibiometrics 149 Chapter 6 Multibiometrics In the previous chapters information integration involved looking for complementary information present in a single biometric trait, namely,
More informationA Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
www.ijcsi.org 209 A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key Tanmay Bhattacharya 1, Sirshendu Hore 2 and S. R. Bhadra Chaudhuri
More informationA Study on Attacks and Security Against Fingerprint Template Database
A Study on Attacks and Security Against Fingerprint Template Database Abstract: Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is
More informationBIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES
BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationEncryption of Text Using Fingerprints
Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,
More informationOverview of Fingerprint Based Biometric System
Overview of Fingerprint Based Biometric System Pooja Chaudhary Chaudharypooja348@gmail.com Abstract: Biometric fingerprints are one of the most permanence biometric system, that is widely used in various
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationRobust Biometrics Based on Palmprint
Robust Biometrics Based on Palmprint Lalit V. Jadhav 1, Prakash V. Baviskar 2 11 North Maharashtra University, Department Of E & TC, SSVP s College of Engineering, Dhule, Maharashtra, INDIA. 2] North Maharashtra
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationA Survey on Fusion Techniques for Multimodal Biometric Identification
A Survey on Fusion Techniques for Multimodal Biometric Identification S.R.Soruba Sree 1, Dr. N.Radha 2 Research Scholar, Department of Computer Science, P.S.G.R. Krishnammal College for Women, Coimbatore,
More informationMultimodal Biometrics Information Fusion for Efficient Recognition using Weighted Method
Multimodal Biometrics Information Fusion for Efficient Recognition using Weighted Method Shalini Verma 1, Dr. R. K. Singh 2 1 M. Tech scholar, KNIT Sultanpur, Uttar Pradesh 2 Professor, Dept. of Electronics
More informationAn Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationEnhanced Authentication for Self-organizing Software platform using Smart SSD. Im Y. Jung, Gil-Jin Jang, Jung-Min Yang
Enhanced Authentication for Self-organizing Software platform using Smart SSD Im Y. Jung, Gil-Jin Jang, Jung-Min Yang School of Electronics Engineering, Kyungpook National University, Republic of Korea
More informationKeywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach
More informationK-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion
K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India
More informationMultimodal Biometric Face and Fingerprint Recognition Using Neural Network
Multimodal Biometric Face and Fingerprint Recognition Using Neural Network 1 Praveen Kumar Nayak, 2 Prof. Devesh Narayan 1 (Mtech in CT, Department of Computer Science and Engineering Rungta College of
More informationBiometric Security Technique: A Review
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.
More informationAuthentication Objectives People Authentication I
Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)
More informationICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification
ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationSpoof Detection of Fingerprint Biometrics using PHOG Descriptor
I J C T A, 9(3), 2016, pp. 269-275 International Science Press Spoof Detection of Fingerprint Biometrics using PHOG Descriptor Arunalatha G.* and M. Ezhilarasan** Abstract: Biometrics are used for authentication.
More informationCuckoo Search Optimization for Feature Selection in Face & Fingerprint Nishu Rani 1, Rajan Sachdeva 2 1 Research Fellow 2 Assistant Professor
Cuckoo Search Optimization for Feature Selection in Face & Fingerprint Nishu Rani 1, Rajan Sachdeva 2 1 Research Fellow 2 Assistant Professor GGS College of Modern Technology, Kharar, Punjab, India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationInternational Journal of Informative & Futuristic Research ISSN:
Reviewed Paper Volume 3 Issue 12 August 2016 International Journal of Informative & Futuristic Research Fingerprint Based Vehicle Security Paper ID IJIFR/V3/ E12/ 007 Page No. 4486-4494 Research Area Embedded
More informationIJITKM Volume 7 Number 1 December 2013 pp (ISSN )
Biometric Recognition Challenges Dr. Chander Kant, Archana Toky Assistant Professor, Deptt. of computer Science & Appl. K.U. Kurukshetra Faculty, Deptt. Of Computer Science, Govt. College for women, Hisar
More informationSTUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION
STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Level of Fusion
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationLecture 11: Human Authentication CS /12/2018
Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted
More informationEnhanced Iris Recognition System an Integrated Approach to Person Identification
Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,
More informationCurrent Practices in Information Fusion for Multimodal Biometrics
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-6, Issue-4, pp-148-154 www.ajer.org Research Paper Open Access Current Practices in Information Fusion for Multimodal
More informationFINGERPRINT BIOMETRICS
FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...
More informationBiometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS
www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationDevelopment of Biometrics technology in multimode fusion data in various levels
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. III (Sep.- Oct. 2017), PP 01-05 www.iosrjournals.org Development of Biometrics technology in
More informationMySQL and MATLAB Interfacing for Biometric Template Protection with Encryption M.Mani Roja
MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption M.Mani Roja Dr.Sudhir Sawarkar Research Scholar, Principal, Sant Gadge Baba Amravati University, Datta Meghe College of Engineering,
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini
More informationIris Recognition: The Safest Biometrics
265 Iris Recognition: The Safest Biometrics Sachin Gupta [1], Dr. Chander Kant [2] [1] M.Tech. Student, Department of Computer Science and Applications K.U., Kurukshetra, Haryana, INDIA [2] Assistant Professor,
More informationAn Algorithm for Feature Level Fusion in Multimodal Biometric System
An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure
More informationContinuous User Authentication Using Temporal Information
Continuous User Authentication Using Temporal Information Koichiro Niinuma a, Anil K. Jain b a Fujitsu Laboratories, Kawasaki, Japan; b Department of Computer Science & Engineering, Michigan State University,
More informationBiometric Cryptosystems: for User Authentication
Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,
More informationThe Design of Fingerprint Biometric Authentication on Smart Card for
The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia
More informationELK ASIA PACIFIC JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS. ISSN: ; ISSN: (Online) Volume 2 Issue 1 (2016)
www.elkjournals.com SURVEY ON FUSION OF MULTIMODAL BIOMETRICS USING SCORE LEVEL FUSION S.MOHANA PRAKASH P.BETTY K.SIVANARULSELVAN P.G student Assistant Professor Associate Professor Department of computer
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More information: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationAnalysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System
Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System Ayushi Mathur 1, Mr. Rupal Gupta 2 1 Research Scholar, CCSIT, Teerthankar Mahaveer University, Moradabad
More informationPerformance Evaluation of PPG based multimodal biometric system using modified Min-Max Normalization.
Performance Evaluation of PPG based multimodal biometric system using modified Min-Max Normalization. Girish Rao Salanke N S 1, Dr. M V Vijaya Kumar 2, Dr. Andrews Samraj 3 1 Assistant Professor, Department
More informationDigital Signature Generation using Fingerprint, Password and Smart Card
Digital Signature Generation using Fingerprint, Password and Smart Card FAWAD AHMED and MOHAMMED YAKOOB SIYAL School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang
More informationFusion of Iris and Retina Using Rank-Level Fusion Approach
Fusion of and Using Rank-Level Fusion Approach A. Kavitha Research Scholar PSGR Krishnammal College for Women Bharathiar University Coimbatore Tamilnadu India kavivks@gmail.com N. Radha Assistant Professor
More information1.1 Performances of a Biometric System
Performance Analysis of Multimodal Biometric Based Authentication System Mrs.R.Manju, a Mr.A.Rajendran a,dr.a.shajin Narguna b, a Asst.Prof, Department Of EIE,Noorul Islam University, a Lecturer, Department
More informationHiding Fingerprint Minutiae in Images
Hiding Fingerprint Minutiae in Images Anil K. Jain and Umut Uludag Computer Science and Engineering Department, Michigan State University 3115 Engineering Building, East Lansing, MI, 48824, USA {jain,
More informationBiometrics Hybrid System Based Verification
Biometrics Hybrid System Based Verification Mahesh Naidu K #1, Prof Govindarajulu P *2 #1 Ph.D Research Scholar,Dept of Computer Science, SVU College of CM&CS, S.V. University, Tirupati, Andhra Pradesh,
More informationMultimodal Biometric Authentication using Face and Fingerprint
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationAn Enhanced Multi-Modal Biometric System for Secure User Identification
An Enhanced Multi-Modal Biometric System for Secure User Identification Ahmad Tasnim Siddiqui Research Scholar OPJS University, Churu, Rajasthan, India Email: tasnim5@yahoo.com Abstract: A biometric system
More informationPERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS)
PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS) 1 DR. NEERAJBHARGAVA, 2 DR. RITUBHARGAVA, 3 MANISH MATHURIA, 4 MINAXI COTIA 1 Associate Professor, Department of Computer
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationA Multimodal Biometric Identification System Using Finger Knuckle Print and Iris
A Multimodal Biometric Identification System Using Finger Knuckle Print and Iris Sukhdev Singh 1, Dr. Chander Kant 2 Research Scholar, Dept. of Computer Science and Applications, K.U., Kurukshetra, Haryana,
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationSECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION
SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION 1 Shiv Kumar Tripathi, 2 Anshul Maheshwari Computer Science & Engineering Babu Banarasi Das Institute of Engineering Technology & Research
More informationNCRD s Technical Review : e-journal, Volume 1, Issue 1 (Jan-Dec 2015) ISSN: X
MOBILE BIOMETRICS: MULTIMODEL BIOMETRICS FOR MOBILE PLATFORM Prof. Mrunali Metri Asst. Professor(MCA), NCRD s Sterling Institute of Management Studies,Nerul, Navi Mumbai Email: mrunalimetri@gmail.com Mr.
More informationA Remote Biometric Authentication Protocol for Online Banking
International Journal of Electrical Energy, Vol. 1, No. 4, December 2013 A Remote Biometric Authentication Protocol for Online Banking Anongporn Salaiwarakul Department of Computer Science and Information
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationAvailable online at ScienceDirect. Procedia Computer Science 92 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 92 (2016 ) 481 486 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) Srikanta
More informationMultimodal Biometric Approaches to Handle Privacy and Security Issues in Radio Frequency Identification Technology
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationFingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 4 (February 2013) PP: 54-61 Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming
More informationSECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY
SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,
More informationPeg-Free Hand Geometry Verification System
Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More information