An Accurate Multi-Biometric Personal Identification Model using Histogram of Oriented Gradients (HOG)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
Biometrics is the detection and description of individuals’ physiological and behavioral features. Many different systems require reliable personal identification schemes to either prove or find out the identity of an individual demanding their services. Multi-biometrics are required inside the current context of large worldwide biometric databases and to provide new developing security demands. There are some distinctive and measurable features used to distinguish individuals known as Biometric Identifiers. Multi-biometric systems tend to integrate multiple identifiers to increase recognition accuracy. Face and digital signature identifiers are still a challenge in many applications, especially in security systems. The fundamental objective of this paper is to integrate both identifiers in an accurate personal identification model. In this paper, a reliable multi-biometric model based on Histogram of Oriented Gradients (HOG) features of a face and digital signature and is able to identify individuals accurately is proposed. The methodology is to adopt many parameters such as weights of HOG features in merging process, the HOG parameters itself, and the distance method in matching process to gain higher accuracy. The proposed model achieves perfect results in personal identification using HOG features of digital signature and face together. The results show that the HOG feature descriptor significantly performs target matching at an average of 100% accuracy ratio for face recognition together with the digital signature. It outperforms existing feature sets with an accuracy of 84.25% for face only and 97.42% for digital signature only.
Authors and Affiliations
Mostafa A. Ahmad, Ahmed H. Ismail, Nadir Omer
Multi-Biometric Systems: A State of the Art Survey and Research Directions
Multi-biometrics is an exciting and interesting research topic. It is used to recognizing individuals for security purposes; to increase security levels. The recent research trends toward next biometrics generation in re...
Boosted Constrained K-Means Algorithm for Social Networks Circles Analysis
The volume of information generated by a huge number of social networks users is increasing every day. Social networks analysis has gained intensive attention in the data mining research community to identify circles of...
Priority Based Dynamic Round Robin (PBDRR) Algorithm with Intelligent Time Slice for Soft Real Time Systems
In this paper, a new variant of Round Robin (RR) algorithm is proposed which is suitable for soft real time systems. RR algorithm performs optimally in timeshared systems, but it is not suitable for soft real time system...
Maximum-Bandwidth Node-Disjoint Paths
This paper presents a new method for finding the node-disjoint paths with maximum combined bandwidth in communication networks. This problem is an NP-complete problem which can be optimally solved in exponential time usi...
Identification Problem of Source Term of A Reaction Diffusion Equation
This paper will give the numerical difference scheme with Dirichlet boundary condition, and prove stability and convergence of the difference scheme, final numerical experiment results also confirm effectiveness of the a...