A Review on Different Biometric Techniques: Single and Combinational

Similar documents
Keywords Biometrics, Iris, Recognition, Advantage, Shortcomings.

User Awareness of Biometrics

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

BIOMETRICS BY- VARTIKA PAUL 4IT55

Biometric Recognition Techniques

Biometrics - A Tool in Fraud Prevention

Introduction to Biometrics 1

ISSN Vol.02,Issue.17, November-2013, Pages:

About user acceptance in hand, face and signature biometric systems

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Iris Recognition-based Security System with Canny Filter

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

The Role of Biometrics in Virtual Communities. and Digital Governments

International Journal of Pure and Applied Mathematics

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

An Enhanced Biometric System for Personal Authentication

Authenticated Document Management System

Feature Extraction Techniques for Dorsal Hand Vein Pattern

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Authentication using Iris

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

Study and Analysis on Biometrics and Face Recognition Methods

Student Attendance Monitoring System Via Face Detection and Recognition System

Iris Recognition using Hamming Distance and Fragile Bit Distance

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.

Shannon Information theory, coding and biometrics. Han Vinck June 2013

AN EFFICIENT METHOD FOR RECOGNIZING IDENTICAL TWINS USING FACIAL ASPECTS

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Improved Human Identification using Finger Vein Images

Iris Segmentation & Recognition in Unconstrained Environment

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

ISSN: Page 511. International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

Orthogonal Polarization Position Based MIMO Antenna For Wireless Applications Y. V. N. R. Swamy. Banothu* 1, P. Siddaiah 2 1, 2

Investigation of Recognition Methods in Biometrics

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

Modern Biometric Technologies: Technical Issues and Research Opportunities

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

IRIS RECOGNITION USING GABOR

Note on CASIA-IrisV3

DYNAMIC POWER ALLOCATION SCHEME USING LOAD MATRIX TO CONTROL INTERFERENCE IN 4G MOBILE COMMUNICATION SYSTEMS

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

Gesticulation Based Smart Surface with Enhanced Biometric Security Using Raspberry Pi

A Real Time Static & Dynamic Hand Gesture Recognition System

Touchless Fingerprint Recognization System

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems

Little Fingers. Big Challenges.

A New Fake Iris Detection Method

The Human Eye and a Camera 12.1

Fingerprint Recognition using Minutiae Extraction

An Efficient Noise Removing Technique Using Mdbut Filter in Images

Evolution of Biometric Technology

A Novel Approach for Human Identification Finger Vein Images

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Personal Identification Using Different Biometrics : A Review

A Survey of Multibiometric Systems

Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part I. The Biometric Systems

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

Advancements in Gesture Recognition Technology

AIMICT.ORG AIMICT Newsletter

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

3D Face Recognition System in Time Critical Security Applications

DESIGN OF 4 BIT BINARY ARITHMETIC CIRCUIT USING 1 S COMPLEMENT METHOD

3 I, Kent Gibson, state the following, of which I have personal knowledge:

Computer Vision in Human-Computer Interaction

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

IRIS Recognition Using Cumulative Sum Based Change Analysis

Role of multibiometric systems in analysis of biological data

Human Identification Using Foot Features

Use these words to complete the sentences about light: absorb different diffuse focus prism refraction same slower specula transmit

Challenges and Potential Research Areas In Biometrics

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System

Automatic Locking Door Using Face Recognition

A Review of Optical Character Recognition System for Recognition of Printed Text

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

Designing the Smart Foot Mat and Its Applications: as a User Identification Sensor for Smart Home Scenarios

Title Goes Here Algorithms for Biometric Authentication

Real time verification of Offline handwritten signatures using K-means clustering

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes'

Impact of Resolution and Blur on Iris Identification

A Novel Approach For Recognition Of Human Face Automatically Using Neural Network Method

Automated Signature Detection from Hand Movement ¹

Identification of Suspects using Finger Knuckle Patterns in Biometric Fusions

Training Eye Instructions

EC-433 Digital Image Processing

A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION

Transcription:

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. I (Jul.-Aug.2016), PP 25-30 www.iosrjournals.org A Review on Different Biometric Techniques: Single and Combinational 1 S.sravan Kumar, 2 N.Anand Ratnesh 1 Assistant professor, Dept of ECE, RVR&JCCE, A.P, India. 2 Assistant professor, Dept of ECE, RVR&JCCE, A.P, India. Abstract: In this paper comparison of different biometric techniques are shown. Here we propose a new method called combinational biometrics (combination of two or more biometric techniques) for providing better security and authentication. In present day scenario security systems are essential almost everywhere, especially in commercial areas and educational institutions to provide such security, biometric systems are essential. A brief introduction of every biometric technique is also written and the results are compared with one another to choose the best biometric technique or combination. Keywords: biometrics, authentication, security, combinational biometrics. I. Introduction In the ever-changing world of global data communications, and fast-paced software development, security is becoming more and more of an issue. No system can ever be completely secure, all one can do is make it increasingly difficult for someone to compromise the system. The more secure the system is, the more intrusive the security becomes. One needs to decide where in this balancing act the system will still be usable and secure for the purposes. Here we have discussed different Biometric tools and related security issues [1]. Biometrics are nothing but methods to identify a human uniquely based on their psychological or behavioural characteristics in which psychological traits include facial features, iris, retina, and behavioural traits include voice, gait, keystroke. This identification method is preferred over traditional methods like passwords or pins because it has several advantages like the person who has to be authenticated has to be physically present and no other person can authenticate for him.in the modern day as the usage of computers increased exponentially there are lot of pins and passwords we have to remember, so biometrics can take the place of the traditional methods to make the life easier for the human beings [2]. There are many ways to identify the identity of a person such as finger print, voice, retina signature, face recognition and we all know that there is no perfect security system yet. Every system has its pro s and con s we will see each of them in detail to seek the more advantageous one. Figure1. a) Face b) Finger Print c) Hand Biometry d) Iris e) Signature f) Voice. DOI: 10.9790/2834-1104012530 www.iosrjournals.org 25 Page

II. Different Methods Of Biometry Finger print: These are minute ridges or patterns which are round in shape which are at your fingertips no two (even twins) will doesn t have same kind of patterns at their fingertips. These patterns are formed on our fingers at the time of eight month in the mother s womb and remain unchanged throughout the life. Until now this is the most used technique across the world which is simple and reliable. Cuts or scars or burnt accidents can have negative effect on the results. Can be cheated at the training itself by taking two finger impressions of a person and can be treated as two persons because they are not identical Figure 2: A simple fingerprint Voice recognition: Speech is more simpler way of proving your identity because you don t need to touch the machine also you can talk and verify yourself as if you are talking to your friend these speech features different for different people and these features can be extracted by several feature extraction methods such as MFCC, LPC etc.though proper care is needed to be taken care during the training This way of identity can vary in the high noisy environment This system may not produce accurate results when the person is suffering from cold or throat problems Figure 3: Voice transmission over a biometric machine. Face recognition: A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems. Face recognition can be considered to be same as photograph recognition, so it lacks in many areas [5]. Even the automated system for face recognition has lacking as photographs are highly affected by camera angle, brightness, etc. And also the face of the person changes over the time, unlike fingerprint which remains same throughout the life span of a person. Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been problems Face is the most easiest feature that can be remembered in our mind to recognize others facial features can be many it is based on the region of interest (ROI) we can scan the particulars face there are several methods to recognize the features of a face principle component analysis (PCA) is one of the most used methods. This is also an easy way of identifying yourself. Identity may be difficult sometimes when you have spectacles, moustache, beard etc The identification can be difficult when a person changes over a period of time DOI: 10.9790/2834-1104012530 www.iosrjournals.org 26 Page

Figure 4: Face biometric machine Figure 5: Face changes over a period of time Iris recognition: Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high resolution images of the irises of an individual's eyes. Iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual [6]. Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. Because of its speed of comparison, iris recognition is the only biometric technology well-suited for one-to-many identification. A key advantage of iris recognition is its stability, or template longevity, a single enrollment can last a lifetime. There are few advantages of using iris as biometric identification: It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea). This distinguishes it from fingerprints, which can be difficult to recognize after years of certain types of manual labour. The iris is mostly flat, and its geometric configuration is only controlled by two complementary muscles (the sphincter pupillae and dilator pupillae) that control the diameter of the pupil. This makes the iris shape far more predictable than, for instance, that of the face. The iris has a fine texture that like fingerprints is determined randomly during embryonic gestation [7]. Iris is an indusial ring shaped coloured area around the pupil it is formed at the age of two it stabilizes at that point and remains same throughout no two will have same iris same as in the case of fingerprint and it is also more reliable as it could work even if you are wearing contact lenses distance is also not an criteria. This is high in cost Also users acceptance level has to be taken into consideration as we are taking photo of such sensitive part of eye Figure 6: Iris sample DOI: 10.9790/2834-1104012530 www.iosrjournals.org 27 Page

Signature recognition: we know that signature is the most known method it is observed as the trace of pen and paper but signatures may vary depends upon the pen paper and area where we are writing It can be easily copied. This is not accurate in all conditions. Besides these there are palm print recognition, retinal recognition and other biometrics but they are tough to implement when the people are in large number. III. Training & Testing Of Samples Enrolment: The enrolment is nothing but taking the samples whether it is for the speech or image or fingers or anything it has to go through a process of training and classification can be done in different ways for different input signals. For an instance we will see how the fingerprint training can be done and the rest of all likewise The training phase is later followed by the testing phase in which the enrolment inputs that means the inputs at the training phase is taken as a reference suppose in a fingerprint biometry. when a user places his fingertip the value id is compared with the original id which is stored in the database it accepts and sends an acknowledgement like thank you for the verified and voice doesn t come up for the users who are not verified likewise, when training an speech samples in external conditions is as well as important, As internal no noise has to be found better to take it in a closed room more number of samples had to be taken for the correct identification for iris recognition it is easy somewhat when compared to others because it is not effected by external conditions. Face recognition also depends upon the angle of the face in which at we have trained it has to be verified at same angle. Figure 7: Training& Testing fingerprint IV. Combinational Biometrcs Combinational biometrics means mixing two or more biometric models to get a new one these are famously called as multimodal biometrics we propose various kinds of combinational biometrics for increasing the system accuracy Voice-Iris biometry: it has to be happened in the feature extraction the voice features and the iris recognition is done separately by each node and the majority decision is taken by the classifier on the basis of majority principle Fingerprint Iris biometry: the finger prints are recognized for some users and then they are tested with iris if both of them show the same result then the user is identified These methods are called as fusion methods we can any of two or even three recognizing methods if at all it is acceptability There are many advantages by using this combinational biometrics Simple and robust. Reliability increases. Ease of use doesn t need to even touch it also by some methods. DOI: 10.9790/2834-1104012530 www.iosrjournals.org 28 Page

By ignoring the cost-effectiveness, we have to say that these are methods which can give the luxury when they come into existence. Figure 8: Sample multimodal biometric Applications: Future phone banking. When making transactions through internet we can give your voice as a password. In smart phones thumb impression has already in existence. Military for preventing unauthorised entry. Public services, financial, healthcare, transportation etc. Simply wherever we need high security we can replace the existing PIN/ PASSWORD systems by biometrics and with the combinational biometrics it is easier and reliable. V. Results These results obtained considering various factors are shown in the table given below. Table 1: Comparison of performance of various biometric methods Biometric Methods Accuracy Uniqueness Ease of use Reliability Error causing factors & stability Finger print High High medium Medium Scars, dryness, age Voice medium High High Medium Noise,environmental Iris high High High High Lightning Facial Medium High High Medium Age, head angle Signature Low Medium High Low Surface Figure 9: FAR (VS) FFR DOI: 10.9790/2834-1104012530 www.iosrjournals.org 29 Page

The table below indicates cross over rates different biometric methods. Table 2: Indicates the cross over rate for various biometric methods Biometric methods Cross over rate Finger print 0.8% Iris 0.000793% Facial 0.5% Voice 3% Signature 3.5% References [1]. K.P Tripathi A Comparative Study of Biometric Technologies with reference to Human interface International Journal of Advances in Science and Technology (IJAST) Vol. 2 Issue I (March 2014). [2]. Kalyani Mali, Samayita Bhattacharya Comparative Study of Different Biometric Features IJARCE Vol. 2, Issue 7, July 2013. [3]. Alina Klokova Comparison of various biometric methods Southampton, UK, SO17 1BJ. [4]. Rula Abu Samaa n, Biometrics Authentication Systems, April 2003, PP 1-2. [5]. Rupinder Saini, NarinderRana Comparison of various biometric methods International Journal of Advances in Science and Technology (IJAST) Vol. 2 Issue I (March 2014). [6]. Arpita Gopal, Chandrani Singh, e-world Emerging Trends in Information Technology, Excel Publication, New Delhi (2009). [7]. Bonsor, K. "How Facial Recognition Systems Work". Http://computer.howstuffworks.com/facial-recognition.htm. AUTHOR S BIBLOGRAPHY MR. SIKHAKOLLI SRAVAN KUMAR Completed his M. Tech in the field of Communication Engineering and Signal Processing (CESP) under Acharya Nagarjuna University in 2015; he completed his B.Tech (ECE) under JNTUK in 2013. He is Currently Working as an Assistant Professor from past 1 year in department of ECE RVR & JC College of Engineering (Autonomous). His research areas include Speech signal processing and wireless communications. Mr. N. ANAND RATNESH was born in 1988 in Guntur district, Andhra Pradesh, India. He completed his M.Tech in Communication and Radar Systems in the ECE department from K L University. He completed his B.Tech at NIET College Affiliated to JNTUK and received his Bachelor s degree in ECE, from JNTU Kakinada in 2010. He is Currently Working as an Assistant Professor in department of ECE RVR & JC College of Engineering (Autonomous). He published nearly 7 papers in the International Journals like IJEMS, IJAST, IJERA, IJCSIT, IJAET and IJEAT. His interested research areas are Antennas, Radars and Wireless & Satellite Communications. DOI: 10.9790/2834-1104012530 www.iosrjournals.org 30 Page