Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Unimodal & Multimodal Biometric Recognition Techniques A Survey  
  Authors : Sabah Bashir; Shabir Sofi; Shubham Aggarwal; Sanyam Singhal
  Cite as:

 

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on "who she/he is" rather than "what she/he has" (card, token, key) or "what she/he knows" (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

 

Published In : IJCSN Journal Volume 4, Issue 1

Date of Publication : February 2015

Pages : 148 - 155

Figures : 07

Tables : --

Publication Link : Unimodal & Multimodal Biometric Recognition Techniques A Survey

 

 

 

Sabah Bashir : National Institute of Technology Srinagar Hazratbal Srinagar, J&K-190006, India

Shabir Sofi : National Institute of Technology Srinagar Hazratbal Srinagar, J&K-190006, India

Shubham Aggarwal : National Institute of Technology Srinagar Hazratbal Srinagar, J&K-190006, India

Sanyam Singhal : National Institute of Technology Srinagar Hazratbal Srinagar, J&K-190006, India

 

 

 

 

 

 

 

Biometrics

Unimodal

Multimodal

Fingerprint

Iris

DNA

Ear

In this world of globalization where the whole world is connected to each other for sharing of resources in one way or the other, the following statement holds true. The only system which can be relied upon to be safe is the one that is powered off! So, the crux of the story lies in the strength of the security feature of the system. There are two sides of every coin. Biometric systems are no exception. There also exists the flop side. To be more specific, we may find the usual cropping of failures due to bugs, blunders, and complacency. Biometrics is like many other protection mechanisms (alarms, seals, tamper sensing enclosures,) in which environmental conditions can cause havoc. Noise, dirt, vibration, and unreliable lighting conditions all take their toll. Some systems, like speaker recognition, are vulnerable to alcohol intake and stress.

 

 

 

 

 

 

 

 

 

[1] Joseph Lewis, University of Maryland, Bowie State University, “Biometrics for secure Identity Verification: Trends and Developments” January 2002. [2] Lia Ma, Yunhong Wang, Tieniu Tan, “Iris Recognition Based on Multichannel Gabor Filtering”, ACCV2002: The 5th Asian Conference on Computer Vision, 23-25 January 2002, Melbounce, Australia. [3] Muhammad Khurram Khan, Jiashu Zhang and Shi-Jinn Horng, “An Effective Iris Recognition System for Identification of Humans”, IEEE 2004. [4] Libor Masek, the University of Western Australia, “Recognition of Human Iris Patterns for Biometric Identification”, 2003. [5] Mathew Kabatoff John Dougman, BioSocieties, “Pattern Recognition: Biometrics, Identity and State – An Interview with John Dougman”, (2008), 3, 81, 86, © London School of Economics and Political Science, London UK. [6] A.K. Jain, L. Hong, R. Bolle, “On-line Fingerprint verification” , IEEE Trans. Pattern Anal. Mach. Intel. 1997. [7] K. Karu, A.K. Jain, “Fingerprint classification, Pattern Recognition”, 1996. [8] Pathak,Ajay Kumar Zhang, David D., “Handgeometry recognition using entropy-based discretization”, IEEE Transactions on information forensics and security, June 2007, v. 2, no. 2, p. 181- 187, Jun-2007. [9] L. Hong, A. K. Jain, "Integrating faces and fingerprints for personal identification," IEEE Trans. Pattern Analysis Machine Intell., Vol. 20, pp. 1295-1307, December 1998 [10] A. K. Jain, A. Ross, "Multibiometric Systems", Appeared in Communication of the ACM, Special Issue on Multimodal Interfaces, Vol. 47, No.1, pp. 34-40, January 2004 [11] Arbaugh, W. A., Fithen, W. L., & McHugh, J. (2000b). "Windows of vulnerability: A case study analysis". IEEE Computer, 33 (December), 52–59. [12] Arora, A., Krishnan, R., Telang, R., & Yang, Y. (2005)." An empirical analysis of vendor response to disclosure policy". The 4th annual workshop on economics of information security (WEIS05). Harvard University.