Multimodal Biometric Face and Fingerprint Recognition Using Adaptive principal Component Analysis and Multilayer Perception
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 6
Abstract
A multimodal biometric face and fingerprint recognition using neural network system based on adaptive principal component analysis and multilayer perception.To improve accuracy and performance, Reliable method for security and integrity of the biometrics data. An efficient Face and fingerprint recognition algorithm combining ridge based and Eigen face approach for parallel execution .The aim is to reduce one or more of the following -False accept rate (FAR) False reject rate (FRR) Failure to enroll rate (FTE) . Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies show that Unimodal biometric systems had many disadvantages regarding performance and accuracy. Multimodal biometric systems perform better than unimodal biometric systems and are popular even more complex also. We examine the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off- TheShelf (COTS) products.
Authors and Affiliations
Praveen Kumar Nayak, Devesh Narayan
Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this are...
A Comparative Study of Text Detection Algorithms for Natural Scenes
Text detection from image is highly needed application in current techno world. However, text detection is no longer an unsolved problem as many approaches/algorithms for it are encouraged by researchers. Algorithms...
Efficient Techniques For load balancing and dynamic resource management in cloud
Cloud computing applications are developed using MapReduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numbe...
Detection of DDos Attack using HCIF Algorithm in Cloud Computing
Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinat...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...