A Comprehensive Survey on Various Biometric Systems

Total Page:16

File Type:pdf, Size:1020Kb

A Comprehensive Survey on Various Biometric Systems International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 5 (2018) pp. 2276-2297 © Research India Publications. http://www.ripublication.com A Comprehensive Survey on Various Biometric Systems T.Sabhanayagam 1, Dr. V. Prasanna Venkatesan2 and Dr. K. Senthamaraikannan3 1 Research Scholar, Center for Computer and Information Technology Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, India. 1And Assistant Professor, School of Computing, SRMIST, Chennai 1Orcid: 0000-0002-9782-7068 2 Dr.V.Prasanna Venkatesan, Proof & Head, Dept. of Banking Technology, Pondicherry University, Puducherry, India. 3 Dr. K.Senthamaraikannan, Prof & Head, Dept. of Statistics, Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, India. Abstract Biometrics gains significant importance in this technical world and it means analysis of biological data. It is defined as the technology of analyzing individual person based on physiological, behavioural or morphological traits such as face, fingerprint, iris, retina, voice, and signature etc,. It is possible to establish one’s identity with the help of biometric techniques. Today biometric have been successfully deployed in various fields like forensic science, security, identification and authorization system. For the last three decades, lot of research work has to be carried out for the growth of biometric system based on fingerprint, voice, iris, face, etc, but recently new biometrics has been come up. To provide a comprehensive survey, this paper presents an overview to various biometric systems, their applications, limitations and the different type of biometrics recognition systems. Keywords: Biometrics, physiological, behavioural, identification, techniques. Figure 1: Categories of Biometrics INTRODUCTION The emerging technology applications use the physical characteristics to recognize the humans. Nowadays, variety of Biometric is a methodological study of measuring and applications depends on the verification or identification analyzing biological data for the purpose of authentication or purpose to confirm the individual’s identity. Traditional identification. Biometrics refers to certain physiological or passwords, PINs and ID cards have been used for personal behavioral characteristic that is uniquely associated to a identification [2][3] to secure the systems by restricting the person. In fact, biometric technology is ancient Egyptian access, but these can be easily breached. The passwords times technology. The Biometrics can be defined as the study cannot be remembered and ID can be pirated. Whereas the of measuring and analyzing the unique physical or behavioral biometrics cannot be stolen, forgotten, borrowed or forged. traits, which is used for the purpose of recognizing a person. Also biometric features can be used with additional security The word " biometric” is originated from the Greek words [4]. The biometric systems have various benefits by 'bios' (life) and ‘metric ’or ‘metrikos’ (measure) , directly comparing traditional authentication systems. Walls, huge translates into “life measurement”. Physical characteristics forts and people are used as authentication techniques for include – Face Fingerprint, DNA, Ear, Iris, Retina and Hand ensuring security and privacy. The authentication technique is geometry and they are associated with the shape or based on by Knowledge, by Possession and by Property and measurements of the human body. Behavioral characteristics its goal to protect a system against the unauthorized use. include – Signature, Voice and Gait and they are associated Authenticated users are allowed to access the information to with the behavior or dynamic measurements of an individual ensure the protection of information and it is required that the [1][2][3] . Each biometric trait has its own merits and individual being recognized should be present at the time of demerits. Depend on the application requirement, appropriate authentication [5].The conventional authentication technique biometric trait should be used for a given authentication depends on something you have and something you know application. The Figure 1 shows the categories of biometrics. whereas biometric authentication is something you are. Thus authentication process based on biometrics is the most secure system. 2276 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 5 (2018) pp. 2276-2297 © Research India Publications. http://www.ripublication.com OBJECTIVE AND SCOPE BIOMETRICS – BRIEF HISTORY Biometrics provide better security and more suitable than The study of human metrics, called Biometrics, has a long traditional approaches of human recognition. In few history that goes back to prehistoric times. Biometrics is an applications, biometrics can supplement or replace the current ancient idea and techniques of recognizing people with their technology. The aim of this paper is to contribute a physical or behavioral characteristics have existed for comprehensive survey and difference between the existing centuries. Facial recognition is an example for one of the biometrics techniques and new biometric techniques. ancient and basic biometrics since the faces have been used to distinguish between known and unknown people from the beginning of civilization. Have a look at some of the most essential historical moments in the development of biometrics from the Table 1. Table 1: Time Line of Biometrics Time Time Description Description line line Sir William Herschel, Civil Service of India Beginning of Annual speaker recognition evaluations 1858 developed First standardized Hand images 1996 hosted by NIST. System “Bertillonage” or anthropometries developed by Alphonse Bertillon to identify individuals NSA published First commercial, generic biometric 1870 1997 based on body measurements, physical interoperability standard. descriptions and photographs. A classification system for fingerprints using CODlS (Combined DNA Index System) to digitally 1892 minutiae, developed by Sir Francis Galton to 1998 store, search and retrieve DNA forensic database, is identify individuals and it is still used today. launched by FBI. The use of fingerprints for identification 1894 published by The Tragedy of Pudd’nhead 1999 Comparative study of biometrics and machine Wilson readable travel documents is launched. A fingerprint classification system developed by Sir Edward Henry, Inspector General of 1896 1999 FBI’s IAFIS major components became operational. the Bengal Police. It is used by FBI many years. Fingerprints for identification of Criminals First Face Recognition Vendor Test (FRVT 2000) is 1903 2000 used by New York State Prison system held Due to inadequate measurements between First research paper on vascular patterns for 1903 2000 two individuals, Bertillon System collapsed. recognition is published Palm System developed by Hungarian used Biometrics Degree program established by West 1907 2000 in criminal case Virginia University (WVU) and FBI. Fingerprint analysis department founded by At the Super Bowl in Tampa, Florida, Face 1921 2001 FBI recognition system is used. The International Organization for Standardization Ophthalmologist Frank Burch proposed Iris 1936 2002 (ISO)/IEC standards committee on biometrics is Pattern for Identification purpose. established. First semi-automated Face recognition created 1960 2002 Formation of M1 Technical Committee on Biometrics. by Woodrow W. Bledsoe A paper on IAFIS (Integrated Automated Fingerprint A Swedish Professor, Gunnar Fant created 1960 2002 Identification System) and Palm print technology is First model of acoustic speech production. submitted to Identification Services Committee. FBI uses the first AFIS system developed by Formal US Government coordination of biometric 1960 2003 NIST. activities begins. 2277 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 5 (2018) pp. 2276-2297 © Research India Publications. http://www.ripublication.com A blueprint to integrate biometrics into machine Hughes published a research paper on 1963 2003 readable travel documents is adopted by the ICAO fingerprint automation. (International Civil Aviation Organization). North America Aviation begins first 1965 2003 European Biometrics Forum established Automated Signature recognition research. The United States Visitor and Immigrant Status An automated process of fingerprint 1969 2004 Indication Technology (US-VISIT) program becomes recognition is attempted by FBI with NIST operational The Department of Defense (DOD), US government Goldstein, Harmon and Lesk made Face implemented the ABIS (Automated Biometric 1970 2004 Recognition for further automation Identification System) to track and identify national security threats. For all federal employees and contractors, mandatory Dr. Joseph Perkell modelled first Behavioral government-wide personal identification card ( HSPD- 1970 2004 components of speech 12 , Homeland Security Presidential Directive 12 ) issued by President Bush First state wide automated palm print databases are First commercial hand geometry systems 1974 2004 deployed in the US by Connecticut, Rhode Island and become available California First Automated Fingerprint using sensors Face Recognition Grand Challenge (FRGC) begins to 1975 and minutiae extracting technology developed 2004 develop algorithms to improve specific identified by NIST in collaboration with FBI. areas of interest in face recognition. US Patent concept for iris recognition
Recommended publications
  • Optical Imaging of the Chorioretinal Vasculature in the Living Human Eye
    Optical imaging of the chorioretinal vasculature in the living human eye Dae Yu Kima, Jeff Finglera, Robert J. Zawadzkib, Susanna S. Parkb, Lawrence S. Morseb, Daniel M. Schwartzc, Scott E. Frasera,1, and John S. Wernerb,1 aBiological Imaging Center, California Institute of Technology, Pasadena, CA 91125; bDepartment of Ophthalmology and Vision Science, University of California, Davis, Sacramento, CA 95817; and cDepartment of Ophthalmology, University of California, San Francisco, CA 94143 Edited* by Napoleone Ferrara, University of California, San Diego, La Jolla, CA, and approved July 9, 2013 (received for review April 18, 2013) Detailed visualization of microvascular changes in the human retina cells, as well as atrophy of the underlying CC and choroidal is clinically limited by the capabilities of angiography imaging, a vessels (4–6). GA regional identification is typically accomplished 2D fundus photograph that requires an intravenous injection of using autofluorescence imaging techniques, which depend on fluorescent dye. Whereas current angiography methods enable lipofuscin accumulation within RPE cells associated with this visualization of some retinal capillary detail, they do not ade- disease, but the current clinical imaging methods are limited in quately reveal the choriocapillaris or other microvascular features detecting early morphological changes in the choriocapillaris beneath the retina. We have developed a noninvasive microvas- (7, 8). An improved understanding of the progression of GA cular imaging technique called phase-variance optical coherence and its underlying mechanisms is important to develop potential tomography (pvOCT), which identifies vasculature three dimen- therapeutic targets for intervention, and diagnostic tools capable sionally through analysis of data acquired with OCT systems. The of observing the key features of atrophic AMD are critical for fulfilling this goal.
    [Show full text]
  • Hand Gestures
    L2/16-308 More hand gestures To: UTC From: Peter Edberg, Emoji Subcommittee Date: 2016-10-31 Proposed characters Tier 1: Two often-requested signs (ILY, Shaka, ILY), and three to complete the finger-counting sets for 1-3 ​ (North American and European system). None of these are known to have offensive connotations. HAND SIGN SHAKA ● Shaka sign ​ ● ASL sign for letter ‘Y’ ● Can signify “Aloha spirit”, surfing, “hang loose” ● On Emojipedia top requests list, but requests have dropped off ​ ​ ● 90°-rotated version of CALL ME HAND, but EmojiXpress has received requests for SHAKA specifically, noting that CALL ME HAND does not fulfill need HAND SIGN ILY ● ASL sign for “I love you” (combines signs for I, L, Y), has moved into ​ ​ mainstream use ● On Emojipedia top requests list ​ HAND WITH THUMB AND INDEX FINGER EXTENDED ● Finger-counting 2, European style ● ASL sign for letter ‘L’ ● Sign for “loser” ● In Montenegro, sign for the Liberal party ● In Philippines, sign used by supporters of Corazon Aquino ● See Wikipedia entry ​ ​ HAND WITH THUMB AND FIRST TWO FINGERS EXTENDED ● Finger-counting 3, European style ● UAE: Win, victory, love = work ethic, success, love of nation (see separate proposal L2/16-071, which is the source of the information ​ ​ below about this gesture, and also the source of the images at left) ● Representation for Ctrl-Alt-Del on Windows systems ● Serbian “три прста” (tri prsta), symbol of Serbian identity ​ ​ ● Germanic “Schwurhand”, sign for swearing an oath ​ ​ ● Indication in sports of successful 3-point shot (basketball), 3 successive goals (soccer), etc. HAND WITH FIRST THREE FINGERS EXTENDED ● Finger-counting 3, North American style ● ASL sign for letter ‘W’ ● Scout sign (Boy/Girl Scouts) is similar, has fingers together ​ Tier 2: Complete the finger-counting sets for 4-5, plus some less-requested hand signs.
    [Show full text]
  • Eye Based Authentication: Iris and Retina Detection
    The University of Saskatchewan Department of Computer Science Technical Report #2011-04 Eye Based Authentication: Iris and Retina Recognition Minhaz Fahim Zibran 2009 Department of Computer Science The University of Saskatchewan, Canada Abstract Biometric authentication comes in play to release the users from the difficulties of remembering and protecting passwords as required by traditional authenti- cation systems. Among all the biometrics in use today, eye biometrics (iris and retina) offers the highest level of uniqueness, universality, permanence, and ac- curacy. Despite these convincing properties of iris and retina biometrics, they have not been in widespread use. Moreover, humans have more or less a natural ability to recognize individuals staring at the person's eye. So, it is interesting to investigate to what extent the eye based biometrics (iris and retina recog- nition) are capable of distinguishing individuals, and what factors are there, which hinder the adoption of these technologies. This report presents a comparative study on iris and retina biometrics based on literature review. The study aims to investigate the two biometrics, conduct a comparative analysis in a fair level of technical detail, and identify the challenges and future possibilities towards their ubiquitous use. In presenting the findings, the study contributes in three ways: (1) This report may serve as a tutorial of eye biometric for those who are new in the area, (2) The comparison between iris and retina biometrics will be helpful for individuals and organizations in choosing the appropriate eye biometric for use in their context. (3) The technical, security, and usability issues identified by the study reveal avenue for further research in order to improve eye biometrics.
    [Show full text]
  • IN the UNITED STATES DISTRICT COURT for the WESTERN DISTRICT of PENNSYLVANIA DAVID HACKBART, ) ) Plaintiff, ) ) V. ) 2:07Cv1
    IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA DAVID HACKBART, ) ) Plaintiff, ) ) v. ) 2:07cv157 ) Electronic Filing THE CITY OF PITTSBURGH, and SGT. ) BRIAN ELLEDGE, ) ) Defendant. ) MEMORANDUM OPINION March 23, 2009 I. INTRODUCTION Plaintiff, David Hackbart (“Hackbart”), filed the instant action pursuant to 42 U.S.C. § 1983, alleging violation of his rights under the First, Fourth and Fourteenth Amendments to the Constitution of the United States by Defendants, the City of Pittsburgh (the “City”) and Sergeant Brian Elledge (“Elledge”). The parties have filed cross-motions for summary judgment, and the matter is now before the Court. II. STATEMENT OF THE CASE On April 10, 2006, Hackbart was traveling along Murray Avenue in the Squirrel Hill section of the City of Pittsburgh, looking for a place to park his vehicle when he saw an open metered parking space. Plaintiff’s Concise Statement of Undisputed Fact (hereinafter “Pl. CSUF”) ¶¶ 2 - 4; Defendants’ Concise Statement of Material Facts (hereinafter “Def. CSMF”) ¶ 1. As Hackbart was attempting to back into the parking space, a vehicle pulled up behind him and effectively blocked Hackbart’s entry into the parking space. Pl. CSUF ¶ 5; Def. CSMF ¶ 2. The driver of the vehicle behind Hackbart would not back up. Def. CSMF ¶ 6. Frustrated, Hackbart extended his left arm out the window of his vehicle and extended his middle finger to the driver. Pl. CSUF ¶ 6. At that time, Elledge was in uniform traveling along Murray Avenue in the direction opposite of Hackbart, and was driving a marked City of Pittsburgh police vehicle. Pl.
    [Show full text]
  • Many Times We Tend to Use Our Hands to Explain Our Needs and Thoughts
    Many times we tend to use our hands to explain our needs and thoughts. The same hand gesture may mean something quite nasty and offensive to a person from a different cultural background. Hand gestures are a very important part of the body language gestures. In this article we shall understand what are hand gestures. What are Hand Gestures? Hand gestures are a way of communicating with others and conveying your feelings. These gestures are most helpful when one is speaking to someone with no language in common. The meanings of hand gestures in different cultures may translate into different things. To explain my point, I take a very common example of former President George W. Bush who had to face a major faux pas during a visit to Australia. He tried to signal a peace sign by waving the two finger or V-sign at the crowd. You may think of this as a simple gesture, but he committed a major error. Instead of his palm facing outwards, it faced inwards. The meaning of this hand gesture in Australia meant he was asking the crowd to go screw themselves! A grave error committed by the then most powerful man in the world. Therefore, it is very important to understand the meanings of gestures before you travel to different countries. Before you communicate with people in different cultures, you need to understand the meaning of gestures. Those considered as a good gestures in one country may be termed as an offensive gesture in some countries. So, if you are a frequent flier to different countries, improve your communication skills by learning the meaning of hand gestures.
    [Show full text]
  • Diabetic Retinopathy by the Numbers a Guide to Following and Educating Patients LACRIMAL OCCLUSION ■ Who Face This Threatening Diagnosis, P
    REVIEW OF OPTOMETRY Earn 2 CE Credits: Can You Identify These Vitreous Anomalies?, p. 94 ■ VOL. 153 NO. 6 June 15, 2016 www.reviewofoptometry.com ■ JUNE 15, 2016 ■ ANNUAL 7th Annual Retina Report RETINA REPORT Diabetic Retinopathy By the Numbers ■ A guide to following and educating patients LACRIMAL OCCLUSION who face this threatening diagnosis, p. 36 • Food for Thought: Diet, Genetics and AMD, p. 48 • The Dilation Dilemma p. 54 • Managing Patients with ■ VITREOUS ANOMALIES Hypertensive Crisis, p. 58 ■ VIRAL CONJUNCTIVITIS 125 YEARS Plug the Drain with Lacrimal Occlusion, p. 70 | Claim Victory Over Viral Conjunctivitis, p. 78 001_ro0616_fc.indd 1 6/9/16 9:57 AM We call it our fundamental business truth: 1 20/200 Your success is essential to Our success. When your practice grows and flourishes, so does ours. At Johnson & Johnson Vision Care, we have operated according to this simple, but profound, principle for over 30 years. And it is the inspiration and 2 20/100 energy behind every year of our 3 decades of Global leadership in the contact lens marketplace. But history tells only a small part of the story. It is what we will do together in partnership over 3 20/70 the next 3 decades that will truly change the very meaning of vision care. Our commitment to innovation is unwavering. 4 20/50 But at the center of all of the R & D eff orts—be they technological, educational, or commercial in nature— is our commitment to advancing the eye care profession. 5 20/40 We thank you for your partnership and look forward to the continued journey together.
    [Show full text]
  • Did I Do That? a Current Analysis of Biometric Technologies by Jalaynea A
    Did I Do That? A Current Analysis of Biometric Technologies by Jalaynea A. Cooper Introduction Have you ever wondered about a bank transaction that you don’t remember doing or losing your bank credit card and hoping that no one will use it? There are several security authentication options that can be taken in order to assure that no one else claims to be you. One in particular is Biometrics. What is Biometrics? Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics.2 Physiological characteristics are those that we are born with such as fingerprint, hand geometry, or iris. The way a person speaks or a person’s signature is classified as behavioral characteristics. We will explore some of the man types of physiological and behavioral biometrics below. Physiological Characteristics Fingerprint Fingerprints like the one in Figure 1 can be used by matching 3 the minutiae or emulating a traditional police method . No two fingers are alike due to not having the same dermal ridge. Figure 1 The fingerprint biometric identification scheme is the analysis of an individual’s unique fingerprints. 13 It is the oldest and most widely recognized biometric marker. 18 More biometric devices for fingerprints are available to use than any other biometric system. 3 • How does the fingerprint technology work? Fingerprints are made up of ridges and valleys on the surface of the finger. Segments on the upper skin layer are the ridges and the lower skin layers are the valleys. Minutia points are formed by ridges. The fingerprint is determined unique by the pattern of the ridges and minutiae points.
    [Show full text]
  • Finger Angle-Based Hand Gesture Recognition for Smart Infrastructure Using Wearable Wrist-Worn Camera
    applied sciences Article Finger Angle-Based Hand Gesture Recognition for Smart Infrastructure Using Wearable Wrist-Worn Camera Feiyu Chen 1, Jia Deng 1, Zhibo Pang 2 ID , Majid Baghaei Nejad 3, Huayong Yang 1 and Geng Yang 1,* 1 State Key Laboratory of Fluid Power and Mechatronic Systems, School of Mechanical Engineering, Zhejiang University, Hangzhou 310027, China; [email protected] (F.C.); [email protected] (J.D.); [email protected] (H.Y.) 2 ABB Corporate Research Sweden, Vasteras 72178, Sweden; [email protected] 3 Electrical Engineering Department, Hakim Sabzevari University, Sabzevar 9617976487, Iran; [email protected] * Correspondence: [email protected] Received: 8 February 2018; Accepted: 28 February 2018; Published: 3 March 2018 Featured Application: Interaction with domestic robots and appliances in smart infrastructure. Abstract: The arising of domestic robots in smart infrastructure has raised demands for intuitive and natural interaction between humans and robots. To address this problem, a wearable wrist-worn camera (WwwCam) is proposed in this paper. With the capability of recognizing human hand gestures in real-time, it enables services such as controlling mopping robots, mobile manipulators, or appliances in smart-home scenarios. The recognition is based on finger segmentation and template matching. Distance transformation algorithm is adopted and adapted to robustly segment fingers from the hand. Based on fingers’ angles relative to the wrist, a finger angle prediction algorithm and a template matching metric are proposed. All possible gesture types of the captured image are first predicted, and then evaluated and compared to the template image to achieve the classification.
    [Show full text]
  • Optical Imaging of the Chorioretinal Vasculature in the Living Human Eye
    Optical imaging of the chorioretinal vasculature in the living human eye Dae Yu Kima, Jeff Finglera, Robert J. Zawadzkib, Susanna S. Parkb, Lawrence S. Morseb, Daniel M. Schwartzc, Scott E. Frasera,1, and John S. Wernerb,1 aBiological Imaging Center, California Institute of Technology, Pasadena, CA 91125; bDepartment of Ophthalmology and Vision Science, University of California, Davis, Sacramento, CA 95817; and cDepartment of Ophthalmology, University of California, San Francisco, CA 94143 Edited* by Napoleone Ferrara, University of California, San Diego, La Jolla, CA, and approved July 9, 2013 (received for review April 18, 2013) Detailed visualization of microvascular changes in the human retina cells, as well as atrophy of the underlying CC and choroidal is clinically limited by the capabilities of angiography imaging, a vessels (4–6). GA regional identification is typically accomplished 2D fundus photograph that requires an intravenous injection of using autofluorescence imaging techniques, which depend on fluorescent dye. Whereas current angiography methods enable lipofuscin accumulation within RPE cells associated with this visualization of some retinal capillary detail, they do not ade- disease, but the current clinical imaging methods are limited in quately reveal the choriocapillaris or other microvascular features detecting early morphological changes in the choriocapillaris beneath the retina. We have developed a noninvasive microvas- (7, 8). An improved understanding of the progression of GA cular imaging technique called phase-variance optical coherence and its underlying mechanisms is important to develop potential tomography (pvOCT), which identifies vasculature three dimen- therapeutic targets for intervention, and diagnostic tools capable sionally through analysis of data acquired with OCT systems. The of observing the key features of atrophic AMD are critical for fulfilling this goal.
    [Show full text]
  • Phd Antonia Reinke Printing Copy UL
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo CONCEPTS OF (UN)DRESSING IN GREEK DRAMA Antonia Marie Reinke (née Schrader) Murray Edwards College Faculty of Classics, University of CamBridge This dissertation is submitted for the degree of Doctor of Philosophy April 2019 PREFACE This dissertation is the result of my own work and includes nothing which is the outcome of work done in collaboration except as declared in the Preface and specified in the text. It is not substantially the same as any that I have submitted, or, is being concurrently submitted for a degree or diploma or other qualification at the University of Cambridge or any other University or similar institution except as declared in the Preface and specified in the text. I further state that no substantial part of my dissertation has already been submitted, or, is being concurrently submitted for any such degree, diploma or other qualification at the University of Cambridge or any other University or similar institution except as declared in the Preface and specified in the text. It does not exceed the word limit prescribed by the Faculty of Classics. iii iv ABSTRACT Concepts of (Un)dressing in Greek Drama Antonia Marie Reinke In recent years, dramatic props and costumes have become the focus of a renewed scholarly interest in the performance aspects of Greek drama. This has entailed, in particular, a shift away from enquiries into the ostensible realia of Greek staging to explorations of their complex con- structions, semiotics and agencies in the plays and their cultural contexts more widely.
    [Show full text]
  • Research Article a Novel Retinal Identification System
    Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 280635, 10 pages doi:10.1155/2008/280635 Research Article A Novel Retinal Identification System Hadi Farzin,1 Hamid Abrishami-Moghaddam,1 and Mohammad-Shahram Moin2 1 Department of Electrical Engineering, K.N. Toosi University of Technology, Seyed Khandan, 16315-1355 Tehran, Iran 2 Iran Telecommunication Research Center, North Kargar, 14399-55471 Tehran, Iran Correspondence should be addressed to Hamid Abrishami-Moghaddam, [email protected] Received 1 May 2007; Revised 27 December 2007; Accepted 21 February 2008 Recommended by Nikolaos V. Boulgouris This paper presents a novel biometric identification system with high performance based on the features obtained from human retinal images. This system is composed of three principal modules including blood vessel segmentation, feature generation, and feature matching. Blood vessel segmentation module has the role of extracting blood vessels pattern from retinal images. Feature generation module includes the following stages. First, the optical disk is found and a circular region of interest (ROI) around it is selected in the segmented image. Then, using a polar transformation, a rotation invariant template is created from each ROI. In the next stage, these templates are analyzed in three different scales using wavelet transform to separate vessels according to their diameter sizes. In the last stage, vessels position and orientation in each scale are used to define a feature vector for each subject in the database. For feature matching, we introduce a modified correlation measure to obtain a similarity index for each scale of the feature vector.
    [Show full text]
  • Automatic Biometric Recognition Using Artificial Neural Networks
    © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138) AUTOMATIC BIOMETRIC RECOGNITION USING ARTIFICIAL NEURAL NETWORKS 1Gururaj J.P. , 2Dr. T.A. Ashok Kumar 1HOD & Assistant Professor, 2Associate Professor & Dean Dept. of Computer Science,Government First Grade College, Harihara-577601, Ph.D. Research Scholar, Garden City University, Bangalore, Karnataka, India. Abstract - Personal identification, recognition is a vital problem in any biometric application scenario. Biometrics finds a lot of application in the modern day security aspects whether it may be in industrial sector, defense sector or in domestic sectors. Entry of a person into an organization in the work environment plays a very important role as unauthorized persons if entered into a premises may create a flutter & inviable to some terrorist attacks. Hence, biometrics of an authorized person into the work environment plays a very important role. There are a large number of biometric methods for identification, viz., physiological & behavioural. Some of them are face, fingerprint, iris, voice, hand, thumb, ear, vein, gait, code, password, signature, pattern, palm print, etc... As there are a number of biometric methods for the automatic detection of human beings, retina scan is being considered as the biometric identity in the research work undertaken by us because of a large number of advantages over the other biometric identities. For biometric recognition of a person using retina scans, a number of methods exists in the literature. In this context, Artificial Neural Nets & Convolution Neural Netsmethod aresome of the methods that could be used for biometric recognition of humans.
    [Show full text]