An Accurate Multi-Biometric Personal Identification Model using Histogram of Oriented Gradients (HOG)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
Biometrics is the detection and description of individuals’ physiological and behavioral features. Many different systems require reliable personal identification schemes to either prove or find out the identity of an individual demanding their services. Multi-biometrics are required inside the current context of large worldwide biometric databases and to provide new developing security demands. There are some distinctive and measurable features used to distinguish individuals known as Biometric Identifiers. Multi-biometric systems tend to integrate multiple identifiers to increase recognition accuracy. Face and digital signature identifiers are still a challenge in many applications, especially in security systems. The fundamental objective of this paper is to integrate both identifiers in an accurate personal identification model. In this paper, a reliable multi-biometric model based on Histogram of Oriented Gradients (HOG) features of a face and digital signature and is able to identify individuals accurately is proposed. The methodology is to adopt many parameters such as weights of HOG features in merging process, the HOG parameters itself, and the distance method in matching process to gain higher accuracy. The proposed model achieves perfect results in personal identification using HOG features of digital signature and face together. The results show that the HOG feature descriptor significantly performs target matching at an average of 100% accuracy ratio for face recognition together with the digital signature. It outperforms existing feature sets with an accuracy of 84.25% for face only and 97.42% for digital signature only.
Authors and Affiliations
Mostafa A. Ahmad, Ahmed H. Ismail, Nadir Omer
An Ecn Approach to Congestion Control Mechanisms in Mobile Adhoc Networks
Node(s)/link(s) of a network are subjected to overloading; network performance deteriorates substantially due to network congestion. Network congestion can be mitigated with the help of Explicit Congestion notification (...
Performance Comparison of Detection, Recognition and Tracking Rates of the different Algorithms
This article discusses the approach of human detection and tracking in a homogeneous domain using surveillance cameras. This is a vast area in which significant research has been taking place from more than a decade and...
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks....
Triangle Hyper Hexa-cell Interconnection Network A Novel Interconnection Network
The interconnection networks play the main role in many applications, because it has a direct influence on it. Nowadays; the challenge is to find suitable topology that can deal with fewer requirements and min-cost. One...
Collective Movement Method for Swarm Robot based on a Thermodynamic Model
In this paper, a distributed collective movement control method is proposed for a swarm robotics system based on an internal energy thermodynamic model. The system can move between obstacles with a changing aggregation s...