Multi-Model Biometrics Authentication System
نویسنده
چکیده
Multi-model Biometrics authentication system have mainly two authentication process, face identification and signature verification. Facial expressions are a valuable source of information that accompanies facial biometrics. Early detection of physiological and psycho-emotional data from facial expressions is linked to the situational awareness module of any advanced biometric system for personal state re/identification. A set of Fisher scores is calculated through partial derivative analysis of the parameters estimated in each HMM. These Fisher scores are further combined with some traditional features such as log-likelihood, 2-D DCT and appearance based features to form feature vectors that exploit the strengths of both local and holistic features of human face. Neural Network is then applied to analyze these feature vectors for face recognition. Experimental results on a public available face database are provided to demonstrate the viability of this scheme. The performance of this system has been validated on three public databases. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. Handwritten signatures are considered as the most natural method of authenticating a person’s identity. The method presented in this paper consists of image prepossessing, geometric feature extraction, neural network training with extracted features and verification. A verification stage includes applying the extracted features of test signature to a trained neural network which will classify it as a genuine or forged. In this paper, off-line signature recognition & verification using neural network is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified based on parameters extracted from the signature using various image processing techniques. The Off-line Signature Recognition and Verification is implemented using MATLAB. This work has been tested and found suitable for its
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملAdaptive Authentication System for Behavior Biometrics using Supervised Pareto Self Organizing Maps
The biometrics authentication systems take attentions to cover the weakness of password authentication system. In this paper, we focus attention on the multi modal-biometrics of behavior characteristics. For the integration of multi modal biometrics Supervised Pareto learning SOM(SP-SOM) and its incremental learning method for implementing adaptive authentication system are proposed. Key–Words:...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملComparison of the Adaptive Authentication Systems for Behavior Biometrics using the Variations of Self Organizing Maps
The biometrics authentication systems take attentions to cover the weakness of password authentication system. In this paper, we focus attention on the multi modal-biometrics of behavior characteristics. For the integration of multi modal biometrics, some variations of Self Organizing maps and its incremental learning method for implementing adaptive authentication system are implemented and th...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملBiometric cryptosystems: authentication, encryption and signature for biometric identities
Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014