Preview

Multimodal Biometrics

Powerful Essays
Open Document
Open Document
2488 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multimodal Biometrics
ABSTRACT:

This paper presents a novel multi-level wavelet based fusion algorithm that combines information from fingerprint, face, iris, and signature images of an individual. The effectiveness of the fusion algorithm is experimentally validated by computing the matching scores and the equal error rates before fusion, after reconstruction of biometric images, and when the composite fused image is subjected to both frequency and geometric attacks. The complexity of the fusion and the reconstruction algorithms is O(n log n) and is suitable for many real-time applications. The final decision is made by fusion at “matching score level architecture” in which feature vectors are created independently for query images and are then compared to the enrollment templates which are stored during database preparation for each biometric trait.

We also propose a multi-modal biometric algorithm that further reduces the equal error rate compared to individual biometric images. The proposed approach reduces the memory size, increases the recognition

accuracy using multi-modal biometric features, and withstands common attacks such as smoothing, cropping, and filtering due to tampering.

INTRODUCTION:

Biometrics” means “life measurement”, but the term is usually associated with the use of unique physiological characteristics to identify an individual. One of the applications which most people associate with biometrics is security. It is an automated method of recognizing a person based on the features face, fingerprints, hand geometry, handwriting, iris, retinal, vein, voice etc. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.
In particular, biometric authentication systems generally suffer from



References: [2] A. Ross & A. K. Jain, Information Fusion in Biometrics, Pattern Recognition Letters, 24 , pp. 2115-2125, 2003.

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Allensmith, S. C. (n.d.). Understanding Face Recognition Systems . (Course Technology ) Retrieved Sept. 16, 2014…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Recent technological advancements have made face recognition a very viable identification and verification technique and one reason behind its popularity is the nonintrusive nature of image acquisition. A photo can be acquired easily without the person even being aware of the process.…

    • 15936 Words
    • 64 Pages
    Powerful Essays
  • Good Essays

    Biometrics Term Paper

    • 733 Words
    • 3 Pages

    handwriting, the way that you walk, etc. There are also two categories for the use of this…

    • 733 Words
    • 3 Pages
    Good Essays
  • Better Essays

    This paper encloses the information regarding the ‘IMAGE PROCESSING’. And discussed one of the major application of image processing ‘BIOMETRICS’. Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors. No doubt, biometrics is going to be next generation’s powerful security tool…!…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    research paper

    • 3812 Words
    • 16 Pages

    I.J. Intelligent Systems and Applications, 2012, 6, 46-52 Published Online June 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2012.06.06 Touch-less Fingerprint Analysis — A Review and Comparison Prabhjot Kaur Dept. of Information Technology, Maharaja Surajmal Institute of Technology, GGSIP University, New Delhi, INDIA Email: thisisprabhjot@gmail.com Ankit Jain…

    • 3812 Words
    • 16 Pages
    Powerful Essays

Related Topics