Highly Efficient Approaches for Biometric Security Systems

Abstract

This paper proposes to implement the biometric security system spoofing detection on palm vein, face and iris image patterns. A Biometric system is essentially a pattern recognition system that makes use of bio-metric traits to recognize individuals. In a biometric security system, the data hiding approach is involved to conceal the secret personal informatics for enhancing the privacy protection. There are negative effects on recognition performance on fingerprint and palm print biometrics due to the some factors like the dryness or dirt in the finger and it also varies with age, for instance, this system is not appropriate for children, because the size of their fingerprint changes quickly. This paper depicts a proposed method which avoids the above negative factors. Palm vein, face and Iris patterns stand out from the host of intrinsic biometric traits for the development of a recognition system that can meet all the security expectations of a biometric system. In the proposed method palm vein, face and iris image patterns spoofing can be easily detected using Neural Network (NN) with the help of GLCM properties. Vein patterns are the network structure of blood vessels underneath the human skin that are almost invisible to the naked eye under natural lighting conditions and can be acquired only when employing infrared illumination. The texture of the blood vessels and Iris of different individuals has been proven to be distinctive even among identical twins. The selected image of palm veins, face and Iris is aligned and cropped according to the key points. The image is enhanced and resized. The features of palm vein, iris and face are compared with database image feature vectors and are recognized using Probabilistic Neural Network classifier (PNN). Finally the performance of multimodal system along with stenographic approach will be measured with accuracy and it proves to provide better matching rate than earlier approaches.

Authors and Affiliations

Suchitra P. V

Keywords

Related Articles

தற்கால இலக்கணக் கட்டமைப்பில் தினமலர்

தற்கால இலக்கணக் கட்டமைப்பில் தினமலர்

Origin and Growth of Early English Dramas from the Pre-Dramatic Stage to the Advent of Christopher Marlowe

Before the rise of proper drama in English literature people entertain one another through mimicry and make beliefs. The Church had objections to dramatic performances at first. Eventually and ironically that very Church...

A Comparative Study of Hierarchical Clustering in Heterogeneous Environment

— In this project, the Hierarchical clustering is one of the most popular clustering methods that can find hierarchical structure hidden in input data for data analysis. To perform this method, one needs to define the no...

Railway Crossing Automation using Infrared Sensor

— As we came across many newspapers, many accidents that are made in unmanned level crossings. The trains running on same track are also the cause of major accidents at railways crossing. In both of the cases, human loss...

Traffic Control System for Emergency Vehicles using Radio Frequency Identification

Nowadays road traffic in all urban and in national highways are increased and which leads to the accidents. The road traffic is controlled by using Radio Frequency Identification (RFID) technology [1][2]. The RFID sensor...

Download PDF file
  • EP ID EP642655
  • DOI -
  • Views 170
  • Downloads 0

How To Cite

Suchitra P. V (2017). Highly Efficient Approaches for Biometric Security Systems. International Journal of Linguistics and Computational Applications, 4(1), 1-6. https://www.europub.co.uk/articles/-A-642655