Highly Efficient Approaches for Biometric Security Systems

Abstract

This paper proposes to implement the biometric security system spoofing detection on palm vein, face and iris image patterns. A Biometric system is essentially a pattern recognition system that makes use of bio-metric traits to recognize individuals. In a biometric security system, the data hiding approach is involved to conceal the secret personal informatics for enhancing the privacy protection. There are negative effects on recognition performance on fingerprint and palm print biometrics due to the some factors like the dryness or dirt in the finger and it also varies with age, for instance, this system is not appropriate for children, because the size of their fingerprint changes quickly. This paper depicts a proposed method which avoids the above negative factors. Palm vein, face and Iris patterns stand out from the host of intrinsic biometric traits for the development of a recognition system that can meet all the security expectations of a biometric system. In the proposed method palm vein, face and iris image patterns spoofing can be easily detected using Neural Network (NN) with the help of GLCM properties. Vein patterns are the network structure of blood vessels underneath the human skin that are almost invisible to the naked eye under natural lighting conditions and can be acquired only when employing infrared illumination. The texture of the blood vessels and Iris of different individuals has been proven to be distinctive even among identical twins. The selected image of palm veins, face and Iris is aligned and cropped according to the key points. The image is enhanced and resized. The features of palm vein, iris and face are compared with database image feature vectors and are recognized using Probabilistic Neural Network classifier (PNN). Finally the performance of multimodal system along with stenographic approach will be measured with accuracy and it proves to provide better matching rate than earlier approaches.

Authors and Affiliations

Suchitra P. V

Keywords

Related Articles

Aiding Application of Speech-Hearing Impaired for Effective Social Contact

In this world many people suffer from hearing loss (deaf) and speech loss (dumb) that might have occurred since birth or during their lifetime later. It is tedious for the deaf & dumb people to talk with the ordinary peo...

Smart City Street Light System using Internet of Things

Internet of things is a developing technology that makes use of internet to control and monitor electronic, mechanical and other physical devices connected to internet. In today's world, IoT is used in various fields. Gl...

நல்லம்மப் பாட்டு: வரலாற்று – நிலவியல் கோட்பாட்டை முன்னிறுத்தி

நல்லம்மப் பாட்டு: வரலாற்று – நிலவியல் கோட்பாட்டை முன்னிறுத்தி

Dynamic Web Site Adaptation by Applying Web usage Mining Techniques

In the Cyberspace, most people are tailored to obtain intelligence from the World Wide Web. To endure and flourish, a Web site has to constantly encourage its overall layout and potentials while providing a variety of co...

Stress Assessing System through Verbal and Non-Verbal Gestures using Raspberry Pi

The computer vision based stress identification system observes the non verbal gestures such as facial expressions using camera and verbal gestures such as Speech using microphone. While combining the observations on spe...

Download PDF file
  • EP ID EP642655
  • DOI -
  • Views 164
  • Downloads 0

How To Cite

Suchitra P. V (2017). Highly Efficient Approaches for Biometric Security Systems. International Journal of Linguistics and Computational Applications, 4(1), 1-6. https://europub.co.uk/articles/-A-642655