Multimodal Biometric Personal Identification System Based On IRIS & Fingerprint
Journal Title: International Journal of Computer Science and Communication Networks - Year 2013, Vol 3, Issue 4
Abstract
Biometric systems can recognize individuals according to their physiological or behavioral characteristics. Many times due to some problems like noisy data, non-university, spoof attacks, and unacceptable error rates, a single biometric system can not meet the desired requirements for many user applications. Algorithm based on facts and existing data show that the recognition of an identification or verification system performance can be improved by using more than one biometric "Multimodal Biometric". The proposed system introduced in this paper is based on two biometrics (IRIS and Fingerprint).
Authors and Affiliations
Prof:Ahmed M. Hamad , Dr. Rasha Salah Elhadary , Ahmed Omar Elkhateeb
A Similar Structure Block Prediction for Lossless Image Compression
In image compression the main challenge is to efficiently encode and represent high frequency image structural components such as patterns, edges and textures. In this work, we develop an efficient image co...
Multimodal Biometric Personal Identification System Based On IRIS & Fingerprint
Biometric systems can recognize individuals according to their physiological or behavioral characteristics. Many times due to some problems like noisy data, non-university, spoof attacks, and unacceptable error rat...
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm
This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self)....
A Comparative Analysis of Various Clustering Techniques used for Very Large Datasets
Data Mining is the process of extracting hidden knowledge, useful trends and pattern from large databases which is used in organization for decision-making purpose. There are various data mining techniques like clusterin...
Study of Emerging Trends of Cyber Attacks in Indian Cyber Space & their Countermeasures
Targeted attack refers to intrusions by attackers who pursue aggressively and compromise specific targets often using social engineering and malware. Such attacks maintain a constant presence within the victim’s network...