Finger Vein Presentation Attack Detection using Total Variation Decomposition
|
|
- Beatrix Marshall
- 5 years ago
- Views:
Transcription
1 Finger Vein Presentation Attack Detection using Total Variation Decomposition Srija. S.K 1, Sowmiya Preethi. S 2, Vaishnavi. S 3 1,2,3Student, Dept. of Electronics and communication Engineering, Jeppiaar SRR Engineering college, Tamil Nadu, India *** Abstract - Finger vein is a developing biometric strategy for individual verification that has earned extensive consideration in the previous decade. Although appeared to be compelling, late investigations have uncovered that finger vein biometrics is additionally helpless against introduction assaults, i.e., printed adaptations of approved individual finger vein pictures can be utilized to access offices or administrations. In this paper, given that both fogginess and the clamor circulation are somewhat extraordinary among genuine and fashioned finger vein pictures, we propose a proficient and vigorous technique for distinguishing introduction assaults that utilization produced finger vein pictures (print relics). To begin with, we utilize complete variety (television) regularization to deteriorate unique finger vein pictures into structure and commotion segments, which speak to the degrees of haziness and the clamor circulation. Second, a square nearby paired example (LBP) descriptor is utilized to encode both structure and clamor data in the disintegrated parts. At long last, we utilize a fell probabilistic help vector machine (PSVM) demonstrate for order, by which finger vein introduction assaults can be viably recognized. To assess the execution of our methodology, we developed another finger vein introduction assault database. Broad exploratory outcomes gathered from the two-finger vein introduction assault databases and a palm vein introduction assault database demonstrate that our strategy plainly outflanks best in class techniques. Key Words: Presentation attack detection, Total variation, Local binary pattern, Probabilistic support vector machine and Finger vein. 1. INTRODUCTION Lately, biometric procedures have pulled in expanded consideration in different applications where right personality evaluation is vital. When all is said in done, by exploiting natural physiological or extraneous conduct qualities of people for vigorous individual confirmation, biometric strategies have indicated critical focal points over customary verification components, for example, passwords, keys, individual distinguishing proof numbers, and brilliant cards. In the previous three decades, numerous human characteristics have been examined top to bottom for use with biometric methods, including the face, iris, unique finger impression, voice, palm print, and mark. Even though the above attributes have been effectively exploited by biometric frameworks in various applications, for example, movement freedom, budgetary installments, get to control frameworks, and buyer hardware, they are defenseless against introduction assaults, which can considerably diminish their dimension of security. For instance, facial acknowledgment frameworks are possibly parodied by phony photos, recorded recordings, and three-dimensional fake face models. Also, iris acknowledgment frameworks can be tricked by phony iris pictures. Unique mark and palm print acknowledgment frameworks are likewise defenseless against assaults by means of fashioned pictures produced using normally accessible materials, for example, gelatin and earth. With such a wide cluster of biometric procedures being used, improving their introduction assault recognition (Cushion) capacities has turned out to be progressively critical for genuine applications. To address this issue, many Cushion procedures for biometric frameworks dependent on perceiving a face, iris, unique mark, and palm print have been proposed. Likewise, vein acknowledgment, including both finger vein acknowledgment and palm vein acknowledgment, is one of the most recent developing biometrics procedures, getting more consideration from analysts given its potential applications. Since vein designs are practically undetectable to the exposed eye under common lighting conditions and must be obtained utilizing infrared brightening, analysts trust that vein-based biometric frameworks can adequately avoid endeavored parody assaults; notwithstanding, late examinations have demonstrated that finger vein acknowledgment frameworks are additionally powerless against introduction assaults from printed vein pictures, with a satirizing false acknowledgment rate as high as 86%. Henceforth, exploring Cushion techniques has turned out to be progressively vital for finger vein biometrics in the previous three years. A few finger vein Cushion techniques have been proposed which can be isolated into two classifications, i.e., surface based and liveness-based. Surface based techniques investigate the distinctions in picture quality among genuine 2019, IRJET Impact Factor value: ISO 9001:2008 Certified Journal Page 2824
2 Fig-1 Block diagram of finger vein presentation and produced veins, which are principally reflected in the surface goals and commotion dimension of the pictures. Liveness-based techniques decide if a finger vein is genuine by distinguishing proof of the fundamental indications of the finger. Such strategies can be more precise and solid than surface-based techniques. Through our own inside and out examination, we found that surface-based strategies perform well in avoiding printed assaults because the produced finger vein pictures contain printing ancient rarities and other commotion starting from the printing and imaging preparing, bringing about marginally extraordinary surface highlights among genuine and manufactured pictures. Most surface-based strategies just endeavor clamor highlights or concentrate includes straightforwardly from unique pictures, ignoring other unmistakable data, for example, haziness. More haziness will in general happen in fashioned vein pictures than in genuine pictures because of the poor goals of the manufactured pictures, defocus, and other comparable elements. In this investigation, we found that haziness and clamor data vary to some degree among fashioned and genuine vein pictures. Subsequently, completely using both these highlights can additionally improve the discriminative intensity of surface-based techniques. Given the abovementioned, our goal is to discover an answer that viably removes both fogginess and commotion highlights from fashioned and genuine vein pictures, and after that consolidates these two highlights to more likely recognize finger vein introduction assaults. In flag preparing, all out variety (TV) regularization, otherwise called absolute variety denoising, gives an astounding answer for clamor end. Television regularization depends on the rule that signals with intemperate and possibly misleading subtleties have a high complete variety, which is characterized as the fundamental of the total angle of the flag. This commotion evacuation strategy has points of interest over straightforward methods, for example, direct smoothing or middle separating, which decrease clamor as well as smooth away edges to a more noteworthy or lesser degree. More explicitly, TV regularization is astoundingly successful at all the while safeguarding edges while sifting through commotion in level areas, even at low flag to-clamor proportions (SNRs). We along these lines abuse TV regularization to disintegrate unique finger vein pictures. Further, nearby parallel examples is a straightforward and proficient surface descriptor that has been generally connected to numerous PC vision errands, including facial, outward appearance, palm vein, and finger vein acknowledgment. LBP likewise performs well in the field of biometric PAD, for example, face PAD, iris PAD, and unique finger impression PAD. In view of both TV regularization and the LBP descriptor, we propose a novel PAD conspire, named TV-LBP, for finger vein PAD. A flowchart of our proposed TV- LBP strategy is appeared in Fig. 1. To start with, we use TV regularization to break down an information finger vein picture into two parts, explicitly the structure and clamor segments. The structure segment essentially catches the fundamental vein structure and fogginess data, while the clamor segment principally holds the commotion data. Second, we utilize a square LBP descriptor to separate discriminative highlights from the over two parts and to use the structure data reflecting finger thickness and finger joint attributes. Next, we apply a fell help vector machine as a classifier to stay away from shared obstruction between the two parts and improve the speculation capacity of our proposed strategy. At last, as indicated by the test convention depicted in, vein tests can be isolated into two classes, i.e., those containing full unique pictures with no preparing and those containing just areas of-intrigue (ROIs) edited from their unique pictures. We outline the fundamental commitments of our investigation as pursues. In the first place, we propose a novel and hearty finger vein PAD calculation, called TV-LBP. In our strategy, square LBP highlights are removed from structure and clamor segments deteriorated by TV regularization, which together have solid discriminative power for finger vein PAD. To the best of our insight, our proposed strategy is the first to use both the structure and commotion segments for finger vein PAD. Second, we acquaint with the examination network another finger vein introduction assault database containing 7200 pictures. More explicitly, we built another finger vein introduction assault database, called the South China University of Technology (SCUT) finger vein introduction assault database (FVD). Contrasted with the Idiap Research Institute (IDIAP) introduction assault database FVD [4], the fashioned vein pictures inside SCUT-FVD contain less printing ancient rarities and clamor, and consequently, gives a higher level of constancy for improving the methodology for creating the database. The SCUT-FVD database will be freely accessible not long after it is additionally extended and improved. Third, we directed escalated probes two finger vein introduction assault databases and a palm vein introduction assault database. Our proposed TV-LBP strategy obviously beats cutting edge strategies. Specifically, TV-LBP accomplishes 100% PAD on every one of the three of the given databases, which is a promising outcome. 2019, IRJET Impact Factor value: ISO 9001:2008 Certified Journal Page 2825
3 2. METHODOLOGY In this segment, we present the strategies for TV regularization, LBP, and SVMs in detail. Note that preprocessing, for example, picture separating and improvement, which would almost certainly lead to the loss of some discriminative data, is precluded from our proposed strategy to ensure its adequacy in PAD. 2.1 Image decomposition using TV regularization Albeit manufactured pictures created by printing finger vein pictures are instinctively like the relating genuine pictures, there are still a few contrasts as far as picture quality, fogginess, and clamor level. Fogginess data is essentially amassed in the low-recurrence run, while clamor is fundamentally dispersed in the high-recurrence extend. On the off chance that fogginess and commotion are straightforwardly extricated as one element from the first pictures, they may meddle with each other, hence incompletely lessening the discriminative power. In this manner, extricating fogginess and commotion data independently in the element extraction organize is a superior decision. Traditional denoising calculations, for example, Gaussian separating, mean sifting, middle sifting, and TV regularization, have diverse attributes. For instance, Gaussian and mean separating will in general haze pictures, while middle sifting lessens intense edges and line fragments to some degree. Television regularization can adequately expel commotion as well as hold surface subtleties, for example, edges, in the reproduced picture. 2.2 Feature extraction using block LBP LBP is a powerful surface descriptor that has been effectively connected to various vision assignments and gives superb outcomes in the field of biometric PAD. Motivated by the work depicted in, which investigates LBP for PAD, we likewise use LBP to extricate highlights from two separate parts. The first LBP administrator names every pixel of a picture by thresholding the qualities in its neighborhood of pixels with its own esteem and linking all the twofold outcomes in a specific request to frame a decimal number. The general recipe for processing the LBP code of a pixel (xc, yc) with P neighboring pixels at a range R from the middle point. Fig-2 Cascaded SVM model In any case, we find from close perception that regularities show up in all finger vein pictures. For instance, as represented in Figure, a high-brilliance locale with a little zone dependably shows up on the correct side of a vein picture, which is the situation of the distal interphalangeal joint (set apart with a green strong box in the furthest left picture of Figure), though a high-splendor locale with a bigger zone dependably shows up on the left half of the picture, which is the situation of the proximal interphalangeal joint (set apart with a red dashed box in the furthest picture of Figure). Moreover, the natural tissue varieties between the portions of a finger cause uneven splendor circulations in the finger vein pictures. To exploit this basic data, we likewise receive a square LBP technique in our proposed strategy. Our analyses exhibit that separating the picture into 1 1 and 2 2 squares can accomplish better execution. 2.3 Impact of deep learning finger vein Profound learning approaches have indicated brilliant improvement in FVR and different other research areas as far as execution. Late writing exhibits that profound learning approaches have been effectively connected and improve finger vein acknowledgment techniques. Highlight extraction is one of the primary strides in FVR. Profound learning approaches are vigorous to gain includes specifically from crude pixels, without the requirement for high quality descriptors, which incredibly improves coordinating execution. Be that as it may, in traditional methodologies handmade descriptors (Curvature, Gabor filter, Radon change, Information limit, and so on.) are utilized to extricate highlights from finger vein pictures. Furthermore, acquainting profound learning with finger vein acknowledgment can diminish the all-out handling time of acknowledgment. Conversely, traditional finger vein identification requires much calculation time to process distinctive strides of finger vein acknowledgment. Individual precision is as yet a difficult issue in finger vein calculation. Customary finger vein acknowledgment strategy needs complex preprocessing, with much exertion expected to evacuate commotion, concentrate and upgrade the highlights before performing separation-based coordinating technique. In these cases, be that as it may, a little adjustment can diminish 2019, IRJET Impact Factor value: ISO 9001:2008 Certified Journal Page 2826
4 acknowledgment precision. Be that as it may, a profound learning approach does not require over-complex preprocessing and picture handling. Besides, profound learning techniques are hearty to clamor and misalignment issues. Although the dataset for finger vein acknowledgment is little, the execution of profound learning finger vein acknowledgment is exceptional. Profound learning finger vein identification strategy execution can be upgraded by utilizing substantial datasets, so there is a requirement for a huge finger vein imaged at asset. Besides, applying profound learning techniques to Presentation Attack Detection (PAD) methodologies can likewise upgrade the discovery execution of introduction assault of finger vein picture. Moreover, template size of finger vein requires more memory space. Hence, most of the conventional methods are proposed to reduce template size but none of them perform well enough. To determine this, the CNN profound learning strategy with managed discrete hashing method are proposed, which perform to decrease the layout size to 2000 bits. Besides, the strategies accelerate the coordinating procedure of finger vein method. 3. PERFORMANCE ANALYSIS Execution Analysis We can see the primary strides of the finger vein framework are steady, however they have diverse kinds of technique. Execution assessment is an imperative method to perceive whether these calculations are fortunate or unfortunate. In this area, first the benchmarks in the assessment of FVR execution are recorded, and after that the execution of different FVR strategies was inputted to a noncoordinating format in the dataset. Collector Operating Characteristic bend (ROC) instinctively speaks to the parity (FAR)and (FRR). The threshold issued to make a decision on the coordinating calculation. On the off chance that the edge is diminished, FAR or false match rate (FMR) expanded and FRR or False Non-Match Rate (FNMR) diminished. So also, the higher limit builds the FRR or FNMR and diminishes the FAR or FMR. Level with blunder rate (EER) esteem can be essentially accomplished from Receiver Operating Curve (ROC). 3.1 Conventional Finger Vein Recognition Method Ordinary finger vein approaches were less hearty to commotion and misalignment than AI approaches; hence, picture preprocessing strategies were normally connected in front of highlight extraction and coordinating to beat the previously mentioned issues. Various traditional finger vein identification strategies have been grown, yet a few techniques [5] have accomplished exceptional improvement. In 2010, Lie et al. proposed a finger vein verification approach, and acquired exactness of 97.8% for identification. In term of exactness, poly directional neighborhood line paired example calculation achieved 99.21% precision on a dataset of 1902 pictures [2]. In addition, as far as equivalent mistake rate, traditional finger vein strategy additionally accomplished some huge accomplishments. The technique proposed in References realizes exceptionally low equivalent mistake rate of 0.61 and on 100 and 156 subject's databases separately. The majority of the customary finger vein acknowledgment procedures show exceptional execution regarding precision and equivalent blunder rate; anyway, the absolute computational expense of the traditional finger vein calculation is excessively high. Shows the execution of regular ordinary FVR strategies in part of exactness, EER, FAR, FRR, Correct Classification Rate (CCR). 3.2 Traditional Machine Learning Finger Vein Recognition Methods Some machine learning techniques (e.g., SVM, neural network and fuzzy logic) have been used in the element extraction and coordinating phase of biometrics. These sorts of systems have likewise ended up being efficient for highlight extraction, coordinating and upgrading the execution of the FVR technique. In most FVR procedures, AI classifier-based techniques were utilized amid the coordinating phase of FVR. In any case, ordinary finger vein approaches utilize remove based strategies amid the coordinating stage. Precision rate of practically all the proposed AI finger vein calculations is near 100%. Records the current writing on customary AI procedures related finger vein acknowledgment 4. FUTURE ENHANCEMENT In this paper, we audit all the handling ventures of FVR: picture procurement, preprocessing, include extraction and coordinating. Additionally, in Section 4 we likewise examine the execution of customary, AI and profound learning calculations in the FVR space. Albeit profound learning FVR strategies are perceived as very efficient, there are a few issues which still should be unraveled. The first issue is identified with the first venture of picture preprocessing ROI extraction technique for finger vein acknowledgment strategies. Yang et al. utilized a super-pixel-based limit identification technique for ROI extraction, which is vigorous towards picture variety, for example, dim dimension and foundation commotion to a constrained degree. Notwithstanding, the trial exhibits that the super-pixel-based extraction technique does not flawlessly choose the following point to identify the finger limit. Besides, in the greater part of the ROI extraction technique there is an issue of vein data misfortune. Thus, there is a need for a robust ROI extraction method to overcome the problem of information loss and improve the execution of finger vein acknowledgment. Moreover, regular factors additionally influencing the nature of the picture are picture obscuring, non-uniform brightening, low differentiation, temperature, stickiness, sexual orientation, thickness of fat and so on. Thus, debased execution is as yet the primary issue for finger vein acknowledgment frameworks. Numerous tradition Image quality assessment, picture improvement and reclamation 2019, IRJET Impact Factor value: ISO 9001:2008 Certified Journal Page 2827
5 strategies have been created to beat these picture quality issues. These techniques upgrade the finger vein picture to some degree; anyway, little consideration has been given to components of finger tissue (fat, tissue, muscle, water, and so forth.) which result in low quality of finger vein picture. This is yet an open issue; a worthy dimension of acknowledgment execution has not yet been accomplished. Subsequently, increasingly ground-breaking profound learning picture quality strategies are as yet expected to manage the nature of picture. 5. CONCLUSION In this paper, we proposed a novel technique called TV- LBP for finger vein PAD. As far as anyone is concerned, it is the first occasion when that both the level of fogginess and the commotion dispersions of genuine and manufactured pictures are treated as various highlights. Given this, we found that we can extricate discriminative highlights as criteria for PAD. We utilized TV regularization to break down a unique picture into structure and commotion parts, speaking to the level of fogginess and the clamor appropriation. We at that point misused square LBP descriptors and a fell SVM model to encode and group applicant finger vein pictures. We additionally built another finger vein introduction assault database for execution assessment. Next, we led broad tests utilizing three databases, including our own FVD, an open FVD, and an open PVD. The outcomes demonstrate that our proposed strategy can accomplish total separation utilizing both edited and full size genuine and manufactured pictures, beating best in class strategies in both intra-database and between database test situations. In our future work, we mean to build a vast agent database with less contrasts among genuine and produced pictures and to direct comparing investigations utilizing this new database to all the more completely meet the prerequisites of genuine applications. Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 32, no. 9, pp , [5] T. Ojala, M. Pietikäinen, and T. Mäenpää, Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 24, no. 7, pp , AUTHORS Srija.S. K Sowmiya Preethi.S Vaishnavi.S REFERENCES [1] "SC37-Biometrics Presentation Attack Detection," in ISO/IEC Standard FDIS An Overview At: /Busch-PADstandards pdf, [2] H. Qin, and M. A. El-Yacoubi, Deep Representation based feature extraction and recovering for Finger-vein verification, IEEE Transactions on Information Forensics and Security, [3] T. Jabid, M. H. Kabir, and O. Chae, "Local directional pattern (LDP) for face recognition," in Consumer Electronics (ICCE), 2010 Digest of Technical Papers International Conference on, 2010, pp [4] J. Chen, S. Shan, C. He, G. Zhao, M. Pietikäinen, X. Chen, and W. Gao, WLD: A robust local image descriptor, 2019, IRJET Impact Factor value: ISO 9001:2008 Certified Journal Page 2828
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationAUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR VEHICLE IDENTIFICATION USING OPTICAL CHARACTER RECOGNITION
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR VEHICLE IDENTIFICATION USING OPTICAL CHARACTER RECOGNITION S. R. Aher 1, Prof. N. D. Kapale 2 1student, 2 professor Department of Electronics, Sanjivani College
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationACTIVITY LIGHT DETECTION FOR COLORBLIND PEOPLE Shima Ramesh 1, B.Sujesh Kumar 2
ACTIVITY LIGHT DETECTION FOR COLORBLIND PEOPLE Shima Ramesh 1, B.Sujesh Kumar 2 Abstract This paper proposed a calculation that recognizes activity light hues for partially blind people, the proposed calculation
More informationDYNAMIC FACE RECOGNITION IN A GROUP PHOTOGRAPH USING PCA ALGORITHM
DYNAMIC FACE RECOGNITION IN A GROUP PHOTOGRAPH USING PCA ALGORITHM Mangala R #1 and Dr. Bindu A Thomas *2 # Student, Dept. of ECE, VVIET, Mysore, India * HOD, Dept. of ECE, VVIET, Mysore, India Abstract
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationLearning Hierarchical Visual Codebook for Iris Liveness Detection
Learning Hierarchical Visual Codebook for Iris Liveness Detection Hui Zhang 1,2, Zhenan Sun 2, Tieniu Tan 2, Jianyu Wang 1,2 1.Shanghai Institute of Technical Physics, Chinese Academy of Sciences 2.National
More informationEr. Varun Kumar 1, Ms.Navdeep Kaur 2, Er.Vikas 3. IJRASET 2015: All Rights are Reserved
Degrade Document Image Enhancement Using morphological operator Er. Varun Kumar 1, Ms.Navdeep Kaur 2, Er.Vikas 3 Abstract- Document imaging is an information technology category for systems capable of
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 10, October -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 REVIEW
More informationAPPENDIX 1 TEXTURE IMAGE DATABASES
167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture
More informationSMART SURVEILLANCE SYSTEM FOR FACE RECOGNITION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationBE Scholars, Department of Computer Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 4 ISSN : 2456-3307 Face Recognition Technique for Processing Library
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationEdge Histogram Descriptor for Finger Vein Recognition
Edge Histogram Descriptor for Finger Vein Recognition Yu Lu 1, Sook Yoon 2, Daegyu Hwang 1, and Dong Sun Park 2 1 Division of Electronic and Information Engineering, Chonbuk National University, Jeonju,
More informationAn Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)
, pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1
More informationPresentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study
215 11th International Conference on Signal-Image Technology & Internet-Based Systems Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study R. Raghavendra Christoph
More informationSurvey on Offline Signature Recognition Techniques
Survey on Offline Signature Recognition Techniques Mandeep Kaur #1, Sonika jindal #2 1 Research Scholar, Department of Computer science Engineering, SBSSTC, India 2 Associate Professor, Department of Computer
More informationAn Enhanced Biometric System for Personal Authentication
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication
More informationLocal Binary Pattern (LBP) of Image Tampering Fragile Watermarking Algorithm
Local Binary Pattern (LBP) of Image Tampering Fragile Watermarking Algorithm Kodavanti Venkata Pratyush Department of CSE, Gitam University, Visakhapatnam, AP, India. Abstract In this paper we portray
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationOCCASIONAL ITEMSET MINING BASED ON THE WEIGHT
OCCASIONAL ITEMSET MINING BASED ON THE WEIGHT 1 K. JAYAKALEESHWARI, 2 M. VARGHESE 1 P.G Student, M.E Computer Science And Engineering, Infant Jesus College of Engineering and Technology,Thoothukudi 628
More informationDetermination and Classification of Blood Groups Using Image Processing Technique
Determination and Classification of Blood Groups Using Image Processing Technique Ms AMBUJA K 1, Dr. Kiran Y. C 2 1IV sem M. Tech, Department of Computer Science and Engineering, BNM Institute of Technology,
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationDifferentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern
Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationMultiresolution Analysis of Connectivity
Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationBiometrics Final Project Report
Andres Uribe au2158 Introduction Biometrics Final Project Report Coin Counter The main objective for the project was to build a program that could count the coins money value in a picture. The work was
More informationTarget detection in side-scan sonar images: expert fusion reduces false alarms
Target detection in side-scan sonar images: expert fusion reduces false alarms Nicola Neretti, Nathan Intrator and Quyen Huynh Abstract We integrate several key components of a pattern recognition system
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationAutocomplete Sketch Tool
Autocomplete Sketch Tool Sam Seifert, Georgia Institute of Technology Advanced Computer Vision Spring 2016 I. ABSTRACT This work details an application that can be used for sketch auto-completion. Sketch
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationIdentification of Suspects using Finger Knuckle Patterns in Biometric Fusions
Identification of Suspects using Finger Knuckle Patterns in Biometric Fusions P Diviya 1 K Logapriya 2 G Nancy Febiyana 3 M Sivashankari 4 R Dinesh Kumar 5 (1,2,3,4 UG Scholars, 5 Professor,Dept of CSE,
More informationA SURVEY ON HAND GESTURE RECOGNITION
A SURVEY ON HAND GESTURE RECOGNITION U.K. Jaliya 1, Dr. Darshak Thakore 2, Deepali Kawdiya 3 1 Assistant Professor, Department of Computer Engineering, B.V.M, Gujarat, India 2 Assistant Professor, Department
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationAn Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationNonuniform multi level crossing for signal reconstruction
6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven
More informationABSTRACT I. INTRODUCTION
2017 IJSRSET Volume 3 Issue 8 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology Hybridization of DBA-DWT Algorithm for Enhancement and Restoration of Impulse Noise
More informationDESIGN AND SIMULATION OF WIDE AREA MONITORING WITH SMART GRIDS USING PHASOR MEASUREMENT UNIT WITH DISTRIBUTED GENERATION
DESIGN AND SIMULATION OF WIDE AREA MONITORING WITH SMART GRIDS USING PHASOR MEASUREMENT UNIT WITH DISTRIBUTED GENERATION 1 BEJJENKIDINESH, 2 PERUMANDLA SADANANDAM 1 MTECH, DEPARTMENT OF ELECTRICAL AND
More informationAuthentication using Iris
Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationPixel Classification Algorithms for Noise Removal and Signal Preservation in Low-Pass Filtering for Contrast Enhancement
Pixel Classification Algorithms for Noise Removal and Signal Preservation in Low-Pass Filtering for Contrast Enhancement Chunyan Wang and Sha Gong Department of Electrical and Computer engineering, Concordia
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Illumination Invariant Face Recognition Sailee Salkar 1, Kailash Sharma 2, Nikhil
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMAGE ENCRYPTION USING TRAPDOOR ONE WAY FUNCTION Eshan Khan *1, Deepti Rai 2 * Department of EC, AIT, Ujjain, India DOI: 10.5281/zenodo.1403406
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationEC-433 Digital Image Processing
EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)
More informationConvolutional Networks Overview
Convolutional Networks Overview Sargur Srihari 1 Topics Limitations of Conventional Neural Networks The convolution operation Convolutional Networks Pooling Convolutional Network Architecture Advantages
More informationAn Efficient Color Image Segmentation using Edge Detection and Thresholding Methods
19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationNirali A. Patel 1, Swati J. Patel 2. M.E(I.T) Student, I.T Department, L.D College of Engineering, Ahmedabad, Gujarat, India
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology A Survey On Hand Gesture System For Human Computer Interaction(HCI) ABSTRACT Nirali
More informationProcessing and Enhancement of Palm Vein Image in Vein Pattern Recognition System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationGlobal and Local Quality Measures for NIR Iris Video
Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu
More informationA Review Paper of MRI Brain Image for Various Types of Noise Removal in Different Filters
A Review Paper of MRI Brain Image for Various Types of Noise Removal in Different Filters Pallav Parmar, Prof. Abhishek Sharma, Anushree Ashokan M. Tech Scholar, Department of Electronics and Communication,
More informationModern Biometric Technologies: Technical Issues and Research Opportunities
Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric
More informationRESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS
RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,
More informationFEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos
FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,
More informationComprehensive Analytics of Dehazing: A Review
Comprehensive Analytics of Dehazing: A Review Guramrit kaur 1, Er. Inderpreet Kaur 2, Er. Jaspreet Kaur 2 1 M.Tech student, Computer science and Engineering, Bahra Group of Institutions, Patiala, India
More informationPaper Sobel Operated Edge Detection Scheme using Image Processing for Detection of Metal Cracks
I J C T A, 9(37) 2016, pp. 503-509 International Science Press Paper Sobel Operated Edge Detection Scheme using Image Processing for Detection of Metal Cracks Saroj kumar Sagar * and X. Joan of Arc **
More informationVision Based Automatic Parking Slot Detection for ADAS
Vision Based Automatic Parking Slot Detection for ADAS Santhosh D K 1, Honnaraju B 2 1Mtech. Student, Department of Computer Science and Engineering, Maharaja Institute of Technology - Mysore, Karnataka,
More informationEffects of the Unscented Kalman Filter Process for High Performance Face Detector
Effects of the Unscented Kalman Filter Process for High Performance Face Detector Bikash Lamsal and Naofumi Matsumoto Abstract This paper concerns with a high performance algorithm for human face detection
More informationHistogram Equalization: A Strong Technique for Image Enhancement
, pp.345-352 http://dx.doi.org/10.14257/ijsip.2015.8.8.35 Histogram Equalization: A Strong Technique for Image Enhancement Ravindra Pal Singh and Manish Dixit Dept. of Comp. Science/IT MITS Gwalior, 474005
More informationStudy Impact of Architectural Style and Partial View on Landmark Recognition
Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition
More informationEffective Contrast Enhancement using Adaptive Gamma Correction and Weighting Distribution Function
e t International Journal on Emerging Technologies (Special Issue on ICRIET-2016) 7(2): 299-303(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Effective Contrast Enhancement using Adaptive
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationClassification in Image processing: A Survey
Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,
More informationChapter 17. Shape-Based Operations
Chapter 17 Shape-Based Operations An shape-based operation identifies or acts on groups of pixels that belong to the same object or image component. We have already seen how components may be identified
More informationSoftware Development Kit to Verify Quality Iris Images
Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,
More informationPerformance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images
Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,
More informationIris based Human Identification using Median and Gaussian Filter
Iris based Human Identification using Median and Gaussian Filter Geetanjali Sharma 1 and Neerav Mehan 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 456-461
More informationOBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK
xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras
More informationStudy and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for feature extraction
International Journal of Scientific and Research Publications, Volume 4, Issue 7, July 2014 1 Study and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for
More informationA COMPARATIVE ANALYSIS OF IMAGE SEGMENTATION TECHNIQUES
International Journal of Computer Engineering & Technology (IJCET) Volume 9, Issue 5, September-October 2018, pp. 64 69, Article ID: IJCET_09_05_009 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=9&itype=5
More informationA Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique
A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique Ms. Priti V. Dable 1, Prof. P.R. Lakhe 2, Mr. S.S. Kemekar 3 Ms. Priti V. Dable 1 (PG Scholar) Comm (Electronics) S.D.C.E.
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationReal Time Face Recognition using Raspberry Pi II
Real Time Face Recognition using Raspberry Pi II A.Viji 1, A.Pavithra 2 Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India 1 Department of Electronics
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More informationCombined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationA Comparison Study of Image Descriptors on Low- Resolution Face Image Verification
A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification Gittipat Jetsiktat, Sasipa Panthuwadeethorn and Suphakant Phimoltares Advanced Virtual and Intelligent Computing (AVIC)
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationBIOMETRIC IDENTIFICATION USING 3D FACE SCANS
BIOMETRIC IDENTIFICATION USING 3D FACE SCANS Chao Li Armando Barreto Craig Chin Jing Zhai Electrical and Computer Engineering Department Florida International University Miami, Florida, 33174, USA ABSTRACT
More informationThe Advanced Local Binary Pattern (LBP) for the Tampering Fragile Watermarking Scheme
IJCST Vo l. 7, Is s u e 4, Oc t - De c 2016 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) The Advanced Local Binary Pattern (LBP) for the Tampering Fragile Watermarking Scheme 1 P. Jyothirmai, 2 Dr.
More informationIMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE
Second Asian Conference on Computer Vision (ACCV9), Singapore, -8 December, Vol. III, pp. 6-1 (invited) IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Jia Hong Yin, Sergio
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationAn Improved Event Detection Algorithm for Non- Intrusive Load Monitoring System for Low Frequency Smart Meters
An Improved Event Detection Algorithm for n- Intrusive Load Monitoring System for Low Frequency Smart Meters Abdullah Al Imran rth South University Minhaz Ahmed Syrus rth South University Hafiz Abdur Rahman
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationImproved SIFT Matching for Image Pairs with a Scale Difference
Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationAuthenticated Automated Teller Machine Using Raspberry Pi
Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.
More information