International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 54    Submit Your Rating     Cite This   Download        Certificate

INTEGRATING MULTIPLE CUES IN BIOMETRIC SYSTEMS

    1 Author(s):  SACHIN KUMAR

Vol -  1, Issue- 1 ,         Page(s) : 81 - 85  (2010 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Biometrics provides a better solution for increasing security requirements and privacy protection than traditional recognition methods such as passwords and PINs. Figure 2.1 shows a biometric system that uses a single biometric trait to establish identity is known as unibiometric system. Various limitations imposed by such biometric systems are noisy data, non-universality, intra-class variations, inter-class similarities and spoof attacks. These limitations can be alleviated by fusing the information presented by multiple sources. A system that consolidates the evidence presented by multiple biometric sources is known as a multibiometric system. Figure 2.2 shows a typical multibiometric system. Integration of evidences is called information fusion. If fusion is appropriately done then it can enhance the matching accuracy of a recognition system. These systems are also expected to be more reliable due to the availability of multiple pieces of evidence. Combining multiple sources of information into a system, improves matching performance, increases population coverage and deters spoofing activities.Mere using multiple biometrics does not imply better system performance rather degrades the performance of individual biometric traits when used in poorly designed system [HON, 1999].

  1. [ZHA, 2004] W. Zhang, Y.-J. Chang and T. Chen., “Optimal thresholding for key generation based on biometrics”, In Intl. Conf. on Image Processing, 2004.
  2. [BAC, 2008] Miroslav Baca, Marko Antoni, “Upgrading Existing Biometric Security Systems by Implementing the Conceptof Cancelable Biometrics”, 2008.
  3. [BAL, 2002] Balci, K., Atalay, V., “PCA for Gender Estimation: Which Eigenvectors Contribute?”, in16th International Conference on Pattern Recognition (ICPR’02) Vol. 3, QC, Canada, 363-366, 2002.
  4. [BEI, 1992] T. Beier and S. Neely, “Feature-Based Image Metamorphosis”, Proceedings of SIGGRAPH, ACM, pp. 35 – 42, NewYork (1992).
  5. [BEN, 1999] Souheil Ben-Yacoub, YousriAbdeljaoued, and Eddy Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification”, IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 5, SEPTEMBER 1999.
  6. [YAN, 2002] M.H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting faces in images: A Survey,” IEEE Trans. Patt. Anal. Machine Intell., vol. 24, pp. 34-58, Jan. 2002.
  7. [YAN, 2005] F. Yang, M. Paindavoine, H. Abdi, and A. Monopoli, “Development of a Fast Panoramic Face Mosaicking and Recognition System”, Optical Engineering, 44(8), 2005.
  8. [BEU, 2000] Beumier C. and McKay N., “Automatic 3D face authentication”, Image and VisionComputing, 18(4):315-321, 2000.
  9. [BIG, 1997] E. S. Bigun, J.Bigun, B. Duc, and S. Fischer, “Expert Conciliation for Multimodal Person Authentication Systems using Bayesian Statistics”, In Proceedingsof First International Conference on Audio- and Video-Based Biometric PersonAuthentication (AVBPA), pages 291-300, Crans-Montana, Switzerland, March1997.
  10. [BOR, 2008] H. Borgen, P. Bours, S. D. Wolthusen, “Visible-Spectrum Biometric Retina Recognition”, In International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIHMSP’08, pp. 1056 – 1062, 2008.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details