A Multibiometric Recognition System: Categorization, Retrieval Techniques & Applications
A Multibiometric Recognition System: Categorization, Retrieval Techniques & Applications
A Multibiometric Recognition System: Categorization, Retrieval Techniques & Applications
78 www.erpublication.org
A Multibiometric Recognition System : Categorization, Retrieval Techniques & Applications
the requirement of huge amount of computational resources, predetermined part of the retinal vasculature could be imaged.
especially in the identification mode. The image acquisition involves cooperation of the subject,
entails contact with the eyepiece, and requires a conscious
Face: effort on the part of the user. All these factors adversely affect
Face recognition as shown in Fig (b) is a non-intrusive method the public acceptability of retinal biometric. Retinal
and also requires minimum cooperation from the subject. The vasculature can reveal some medical conditions, e.g.,
dimensions, proportions and physical attributes of a persons hypertension, which is another factor deterring the public
face are unique. In some application scenario like crowd acceptance of retinalscan-based biometrics.
surveillance, face recognition probably is the only feasible
modality to be used. Face recognition can be in a static
controlled environment or a dynamic uncontrolled
environment. One popular approach to face recognition is
based on the location, dimensions and proportions of facial
attributes such as eyes, eyebrows, nose, lips, and chin and
their spatial relationships. Another approach being widely
used is based on the overall analysis of the face image that
represents face as a weighted combination of a number of
canonical faces.
Face recognition involves two major tasks: i) face location
and ii) face recognition. Face location is determining the
location of face in the input image. For recognizing the Fig (c)
located face, the eigenface approach is one of the very popular Ear:
methods. The eigenface-based recognition method consists of It has been suggested that the shape of the ear and the
two stages: i) training stage and ii) operational stage. In the structure of the cartilaginous tissue of the pinna are
training stage, training set of face images are acquired. The distinctive. The ear recognition as shown in the Fig (d)
acquired face images are projected into lower dimensional approaches are based on matching the distance of salient
subspace using Principle Component Analysis (PCA). A set points on the pinna from a landmark location on the ear. The
of images that best describe the distribution of training images features of an ear are not expected to be very distinctive in
in a lower dimensional face space (the eigenspace) is establishing the identity of an individual.
computed. Then the training facial images are projected into
this eigenspace to generate representation of the training
images in the eigenspace. In the operational stage, the input
face image is projected into the same eigenspace that the
training samples were projected into. Then, recognition can
be performed by a classifier operating in the eigenspace.
Fig (b)
Fig (d)
Iris and Retina: DNA:
Fig (c) show the difference between iris and retina scan. Iris is As shown in the Fig (e) Deoxyribonucleic acid (DNA) is the
the annular region of the eye regulating the size of the pupil. It one-dimensional (1D) ultimate unique code for ones
is bounded by pupil and sclera (white of the eye) on either individuality except for the fact that identical twins have
side. Iris develops during prenatal period and stabilizes identical DNA patterns. It is, however, currently used mostly
during the first two years of life. The complex iris texture in the context of forensic applications for person recognition.
carries very distinctive information useful for personal Three issues limit the utility of this biometrics for other
recognition. Irises of twins are different as well. Iris based applications: 1) contamination and sensitivity: it is easy to
recognition systems provide promising speed and accuracy steal a piece of DNA from an unsuspecting subject that can be
and support large scale identification operations as well. subsequently abused for an ulterior purpose; 2) automatic
Contact lenses printed with fake iris can be detected. The real-time recognition issues: the present technology for DNA
hippus movement of the eye can also be used for liveness matching requires cumbersome chemical methods (wet
detection. processes) involving an experts skills and is not geared for
The retinal vasculature is rich in structure and is supposed to on-line noninvasive recognition; and 3) privacy issues:
be a characteristic of each individual and each eye. It is information about susceptibilities of a person to certain
claimed to be the most secure biometric since it is not easy to diseases could be gained from the DNA pattern and there is a
change or replicate the retinal vasculature. The image concern that the unintended abuse of genetic code information
acquisition requires a person to peep into an eye-piece and may result in discrimination, e.g., in hiring practices.
focus on a specific spot in the visual field so that a
79 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-2, Issue-8, August 2014
Voice:
Voice is a combination of physiological and behavioral
biometrics. Fig (h) shows how it can be used for
identification. The features of an individuals voice are based
on the shape and size of the appendages (e.g., vocal tracts,
mouth, nasal cavities, and lips) that are used in the synthesis
of the sound. These physiological characteristics of human
speech are invariant for an individual, but the behavioral part
of the speech of a person changes over time due to age,
medical conditions (such as a common cold), and emotional
state, etc. Voice is also not very distinctive and may not be
Fig (e) appropriate for large-scale identification. A text-dependent
voice recognition system is based on the utterance of a fixed
Gait: predetermined phrase. A text-independent voice recognition
As shown in the Fig (f) gait is the peculiar way one walks and system recognizes the speaker independent of what she
is a complex spatio-temporal biometric. Gait is not supposed speaks. A text-independent system is more difficult to design
to be very distinctive, but is sufficiently discriminatory to than a text-dependent system but offers more protection
allow verification in some low-security applications. Gait is a against fraud. A disadvantage of voice-based recognition is
behavioral biometric and may not remain invariant, especially that speech features are sensitive to a number of factors such
over a long period of time, due to fluctuations in body weight, as background noise. Speaker recognition is most appropriate
major injuries involving joints or brain, or due to inebriety. in phone-based applications but the voice signal over phone is
Acquisition of gait is similar to acquiring a facial picture and, typically degraded in quality by the microphone and the
hence, may be an acceptable biometric. Since gait-based communication channel.
systems use the video-sequence footage of a walking person
to measure several different movements of each articulate
joint, it is input intensive and computationally expensive.
Fig (h)
Hand Geometry:
Hand geometry recognition systems, as shown in the Fig (i)
Fig (f) are based on the different measurements such as shape of the
hand, size of palm, lengths and widths of the fingers. Hand
Signature: features are not very distinctive. They are suitable for
The way a person signs his or her name is known to be a verification but not for identification. In certain situations
characteristic of that individual, as shown in the Fig (g). such as immigration and border control, biometrics such as
Although signatures require contact with the writing fingerprints may not be suitable because they infringe on
instrument and an effort on the part of the user, they have been privacy. In such situations hand geometry can be used for
accepted in government, legal, and commercial transactions verification as hand geometry is not very distinctive. Hand
as a method of verification. Signatures are a behavioral geometry features may not be invariant during the growth
biometric that change over a period of time and are influenced period of children. The size of such recognition systems is
by physical and emotional conditions of the signatories. large and hence it is difficult to embed the systems in other
Signatures of some people vary substantially: even successive devices such as laptops.
impressions of their signature are significantly different.
Further, professional forgers may be able to reproduce
signatures that fool the system.
Fig (i)
Fig (g)
A brief comparison of the above biometric techniques based
on seven factors is provided in Table-I. The applicability of a
80 www.erpublication.org
A Multibiometric Recognition System : Categorization, Retrieval Techniques & Applications
specific biometric technique depends heavily on the modality. Maximum benefit would be derived from
requirements of the application domain. No single technique algorithms that are based on distinctly different and
can outperform all the others in all operational environments. independent principles.
In this sense, each biometric technique is admissible and there
is no optimal biometric characteristic. For example, it is well
known that both the fingerprint-based and iris-based
techniques are more accurate than the voice-based technique.
However, in a tele-banking application, the voice-based
technique may be preferred since it can be integrated
seamlessly into the existing telephone system.
81 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-2, Issue-8, August 2014
matching against a large number of identities increases the matched with the set of reference images already stored in the
response time of the system and may also reduce the accuracy database. So as compared to the number of reference images
of identification. One way to reduce the response time is by the index codes varies the reference images may be viewed as
designing biometric templates that allow for rapid matching. basis vectors in the original feature space. If two images
An alternative approach is to limit the number of identities ,the input and reference images are similar then their values
against which matching is performed based on criteria that are are expected to be lesser than the threshold ,where the
fast to evaluate. In this technique the search space is reduced threshold is set before processing ,if the C values are greater
by partitioning the database into several bins. Following such than threshold
binning, the biometric database will be partitioned such that it is assumed that the two images belongs to different
the templates in each bin are similar and correspond to some individuals. During identification, the indexing system first
natural or statistical class. In case of the traditional 1: N computes the index code S of the probe. Then it outputs all
comparisons for identification, the time needed for the system enrolled identities whose index codes are within a certain
would be to determine the distance between the test template distance from S. The index codes are generated from both
and the N templates in database. Thus the total time needed in face and Fingerprint Images.
such a case could be given as: Q (N). This is achieved by
reducing the search space using Gittins index algorithm and it 3. Input Image Clipping Processing:
also improves the accuracy of identification. Clipping refers to any procedure which identifies the portion
of a picture which is either inside or outside a region using any
clipping algorithm. The region against which an object is to
be clipped is; called clipping window. Clipping is a process of
capturing or processing an image where the intensity in a
certain area falls outside the minimum and maximum intensity
which can be represented. In the input image clipping process,
the input image is partitioned into several patches and each
patch will search for corresponding matches in database. If
any match is found then RGB and color code value is
generated for that image.
Second Approach:
82 www.erpublication.org
A Multibiometric Recognition System : Categorization, Retrieval Techniques & Applications
IV. APPLICATIONS
83 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-2, Issue-8, August 2014
V. CONCLUSION
This paper overviews and discusses the various scenarios that
are possible in multimodal biometric systems using
fingerprint, face and iris recognition, the techniques that can
be adopted to retrieve the information and improve overall
system accuracy.
REFERENCES
[1] A. Ross and A.K. Jain, Information Fusion in Biometrics, Pattern
Recognition Letter 24, pp.2115-2125, 2003.
[2] A. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal
Identification in Networked Society, Kluwer Academic Publishers,
1999.
[3] ISO/IEC JTC 1/SC 37 Biometrics, Working Draft Technical Report on
Multi-Modal and Other Multi-Biometric Fusion, August 2005.
[4] S. Prabhakar and A.K. Jain, Decision-level fusion in fingerprint
verification, Pattern Recognition, Vol. 35, No. 4, pp. 861-874, 2002.
[5] H. Korves, L. Nadel, B. Ulery, and D. Masi, Multibiometric Fusion:
From Research to Operations, Sigma, Mitretek Systems, Summer
2005.
[6] Summary of NIST Standards for Biometric Accuracy,
Tamper Resistance, and Interoperability, November 13,
2002.
[7] A. Mhatre, S. Palla, S. Chikkerur, and V. Govindaraju, Efficient search
and retrieval in biometric databases, Biometric Technol.Human
Identification II, vol. 5779, no. 1, pp. 265273, 2005
[8] A. Gyaourova and A. Ross, A coding scheme for indexing multimodal
biometric databases, in Proc. IEEE Computer Society Workshop on
Biometrics at the Computer Vision and Pattern Recognition (CVPR)
Conf., Miami, FL, Jun. 2009.
[9]http://www.biometric solutions.com/applications/index.php
[10] http://www.intechopen.com/books/recent-application-in-biometrics
84 www.erpublication.org