scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Enhancement of Security through Fused Multimodal Biometric System

TL;DR: A robust security system for personal identification using multimodal biometric system using face, fingerprint and palm vein, carried on self generated database images is proposed.
Abstract: Now a days, Person identity is a major issue for security in many applications for example access control, electronic commerce, banking, communications etc. Multimodal biometric technology is the best technology for identification of person than the conventional password based technique. When two or more biometrics used for identification of person then the system called as Multimodal Biometric system. In this paper, we are going to propose a robust security system for personal identification using multimodal biometric system. Three modalities are used in this system face, fingerprint and palm vein. Feature extraction of each modality is done with different algorithm. Local Binary Pattern (LBP) algorithm is used for face feature extraction. Discrete Wavelet transform (DWT) is used for Palm vein feature extraction. And minutiae algorithm is used for finger print feature extraction. Then feature level fusion is done. The proposed method is carried on self generated database images. Finally the more accurate results are achieved. We can further enhance the security adding some encrypted key after fusion.
Citations
More filters
Journal ArticleDOI
TL;DR: This study presents a comprehensive overview of recent research progress of palm vein recognition, from the basic background knowledge to data acquisition, public database, preprocessing, feature extraction and matching, and focuses on palm vein-related fusion.
Abstract: As a new research focus in biometrics, palm vein recognition has attracted people's attention because of high security, liveness-detection, user acceptability and convenience. Palm vein recognition exhibits high security, as it uses the network of blood vessels underneath palm skin for recognition. As palm vein is interior biological information of the body, vein patterns are much harder for intruders to copy compared to other biometric features. Palm vein is mostly invisible to the human eyes; they are commonly captured under near-infrared light. Under its natural state, the veins of the palm are concealed naturally and, for most of time people's hands are in the gesture of half fist. This study presents a comprehensive overview of recent research progress of palm vein recognition, from the basic background knowledge to data acquisition, public database, preprocessing, feature extraction and matching. In addition, the study focuses on palm vein-related fusion. Ultimately, the authors discuss the challenges and future perspectives in palm vein recognition for further works.

37 citations

Journal ArticleDOI
31 Mar 2020
TL;DR: The findings show that fingerprint image quality and password authentication is still an active research area where performance requires improvement, and the graphical password indicates a promising future direction for enhancing password methods.
Abstract: The increasing need for better authentication methods against hackers has called for the use of the biometric authentication method to guard against unauthorized access into the systems. The used of human characteristics for biometrics provides authentication for different kind of systems. However, poor quality of authentication still allows hackers gaining access to these systems. Many biometrics authentication approaches have been proposed to improve the authentication accuracy and other related quality measures. This survey aims to provide a state-of-the-art fingerprint and password biometric authentication approaches. Their challenges have been presented and discussed in terms of biometric authentication. Furthermore, the strengths and weaknesses of each of the fingerprint and password biometric authentication are discussed and compared. The findings show that fingerprint image quality and password authentication is still an active research area where performance requires improvement. Also, the graphical password indicates a promising future direction for enhancing password methods.

4 citations


Cites background from "Enhancement of Security through Fus..."

  • ...Tekade and Shende [4] believe that biometric technology is capable of solving personal identity security issues for many critical application areas....

    [...]

  • ...The biometric authentication was introduced to identified and control access to a system [4]....

    [...]

  • ...Biometric authentication provides authentication security process to verify user identity [4]....

    [...]

Proceedings ArticleDOI
25 Sep 2019
TL;DR: This research puts forward an all-encompassing review pertaining the latest steganography methods that has been implemented to protect the biometric fingerprints information up-to-date.
Abstract: In ascertaining the authenticity of a person's identity, the techniques that utilises Biometric Technology and its vital aspects and attributes are essential in endorsing this endeavour. Transversing the years, identification through biometric means has heightened much attention with regards to its susceptibility to assaults whilst information are being transferred. Thus, there is a dire need for the development for a safeguarding means. Steganography and watermarking methods are adopted towards the enhancement of biometric information secureness. Watermarking entails the embedding of data within file that carries the data, in safeguarding intellectual property rights and copyrights that involves music, video or image files. Meanwhile, steganography entails the concealment of data. This research puts forward an all-encompassing review pertaining the latest steganography methods that has been implemented to protect the biometric fingerprints information up-to-date. This review categorizes the fingerprint system into various sections, inclusive of methods for extracting features and matching procedure.

3 citations


Cites background from "Enhancement of Security through Fus..."

  • ...From the past years to recently, establishments like Samsung and Apple succeeded in incorporating biometrics enabled features in the prevalent gadgets that can open them for access purposes by fingerprint information of the persons owning theses gadgets [47]....

    [...]

Proceedings ArticleDOI
14 Dec 2020
TL;DR: The authentication system through palm veins generally content from four steps, namely acquisition of image, preprocessing, extraction of feature and feature matching, and feature and matching matching are used in each stage as mentioned in this paper.
Abstract: With the development of technology, recognition has become now a very important and main thing due to the large number of fraud and forgery operations that occur. The traditional methods such as signature and recognition based on knowledge do not meet the safety requirements due to the ease of forging and stealing them, as biometric technologies have emerged as an alternative to them due to the high security provided and accuracy. Biometrics rely on behavioral and physiological characteristics such as recognition based on palm veins to provide maximum protection and avoid unauthorized access to our personal property. In this paper, we will talk about authentication through palm veins. They are biological properties that do not change over time, and each person has his own pattern of veins, even symmetric twins have different patterns. These veins are not seen with the eye, which is difficult to forge and steal as the pattern of veins is extracted by near infrared rays palm veins images are considered one of the most promising technologies that meet the advanced safety requirements of modern privacy policies for highly sensitive systems. The authentication system through palm veins generally content from four steps, namely acquisition of image, preprocessing, extraction of feature and feature matching. In each stage, there is a set of methods used in this research. We will talk about these methods used in the palm vein by using the cassia database.

1 citations

References
More filters
Journal Article
TL;DR: This research work empirically evaluate face recognition which considers both shape and texture information to represent face images based on Local Binary Patterns for person-independent face recognition.
Abstract: The face of a human being conveys a lot of information about identity and emotional state of the person. Face recognition is an interesting and challenging problem, and impacts important applications in many areas such as identification for law enforcement, authentication for banking and security system access, and personal identification among others. In our research work mainly consists of three parts, namely face representation, feature extraction and classification. Face representation represents how to model a face and determines the successive algorithms of detection and recognition. The most useful and unique features of the face image are extracted in the feature extraction phase. In the classification the face image is compared with the images from the database. In our research work, we empirically evaluate face recognition which considers both shape and texture information to represent face images based on Local Binary Patterns for person-independent face recognition. The face area is first divided into small regions from which Local Binary Patterns (LBP), histograms are extracted and concatenated into a single feature vector. This feature vector forms an efficient representation of the face and is used to measure similarities between images.

119 citations


"Enhancement of Security through Fus..." refers background or methods in this paper

  • ...The LBP operator uses 3*3 matrix and gives binary number for the pixels with the help of threshold value considering each pixel with center one [20]....

    [...]

  • ...A biometric system is a pattern recognition system that identifies a person based on features extracted from specific characteristics that the person possesses [20]....

    [...]

Journal Article
TL;DR: In this paper, the authors proposed an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key, which is composed of three modules namely, feature extraction, multi-modal biometric template generation and cryptographic key generation.
Abstract: Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to make the key ungues sable to an attacker lacking significant knowledge of the user's biometrics. We go one step further trying to incorporate multiple biometric modalities into cryptographic key generation so as to provide better security. In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. The proposed approach is composed of three modules namely, 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. Initially, the features, minutiae points and texture properties are extracted from the fingerprint and iris images respectively. Subsequently, the extracted features are fused together at the feature level to construct the multi-biometric template. Finally, a 256-bit secure cryptographic key is generated from the multi-biometric template. For experimentation, we have employed the fingerprint images obtained from publicly available sources and the iris images from CASIA Iris Database. The experimental results demonstrate the effectiveness of the proposed approach.

53 citations

Journal ArticleDOI
TL;DR: The advantage of the presented method is analysis of the finger skin using a smartphone, which will help to diagnose pathologies of human skin.

48 citations

Journal ArticleDOI
TL;DR: Comparative results indicate that the proposed ROI extraction method gives superior performance as compared to the previously proposed point-based approaches.

35 citations