Applications of Human Biometrics in Digital Image Processing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Volume 5, Issue 7, July – 2020 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Applications of Human Biometrics in


Digital Image Processing
Anshul Kumar Singh1, Brajesh Kumar Singh2
Department of C. S. E.
R. B. S. Engineering Technical Campus, Agra, U.P., 283105, India12

Abstract:- Digital image processing is the trending topic molecules where author requires scanned or digitally
of research in recent time and big amount of research photographed images which can be obtained through
work related to Biometric features is done and currently microscope and various operations can be performed by
it achieved good amount of accuracy. Biometric features using digital image processing software’s to study about
is used for security, verification and recognition purpose. cells and molecules. We have presented a review of various
This paper is a showcase of how security systems can be works done by author in the field of biometrics,
developed by using biometric features of human like biotechnology and bioscience. We tried to put a relation
face, fingerprint and iris, etc. It can be used for the between digital image processing and biotechnology or
purpose of identification, recognition and bioscience. Unique biometric extracted features of human
Authentication and it is also applicable for making are used in security systems to identify a person; fingerprint
software for image preparation in bioscience is mainly used biometric feature that can be used to
laboratories that make use of scanned or digitally recognize a particular person and many other biometric
photographed images. The widespread use of such features of a person can be used for security, surveillance,
image processing techniques using photography and collage campus, government organizations, and in military
microscope imaging across the natural science with etc., video based face recognition is used for real time
particular attention being paid to research in cell and surveillance which helps to keep track of a person. It can be
molecular bioscience. This paper is a review of various useful in various civil and defense places.
methods trending to the field of biometric applications
on biotechnologies. II. RELATED WORK

Keywords: - Digital Image Processing, Biotechnology,  Finger Print


Bioscience, Biometric. Fingerprint is one of the most talked about biometric
feature and have been used by various authors. Every
I. INTRODUCTION person’s fingerprint is unique and have been an invaluable
feature for law enforcement and forensics science,
Digital image processing is used in the field of fingerprint based identification or recognition is the mostly
Biometric, Biotechnology and Bioscience for past several used and reliable biometric feature for automated person
decades. Biotechnology is the use of living systems and identification and recognition, its uniqueness and
organisms to develop or make any product or any un-changeability over a period of time made it the most
technological application that uses biological systems. trusted tool that is widely used by many police agencies.
Author used biometric features of human or living The fingerprint recognition is a very long process if the
organisms, and various author uses biometric features such stored one are in millions. With the help of Classification,
as face, fingerprint, iris, and palm for the purpose of recognition take less time. Automated fingerprint
identification, recognition and authentication. And on the recognition is the best approach to identify individual.
other hand digital image processing also have applications
in the field of Bioscience. For example study of cell and

IJISRT20JUL748 www.ijisrt.com 1273


Volume 5, Issue 7, July – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
E. Marasco et al. [1] discusses various issues related by normalization. The extracted features of the input face is
to the vulnerability of fingerprint recognition systems to matched against those of enrolled faces in the database or
attack the system with artificial fingerprints, where dataset, if it has a desired confidence value then the face is
materials such as, silicone, playdoh, and gelatin are matched otherwise not.
inscribed with fingerprint ridges. Researchers have
experimented that some fingerprint recognition systems can
be deceived/attacked when these artificial fingers are
placed on the sensor, the system successfully allowed
false/artificial fingerprints. Various anti spoofing schemes
are announced to overcome this issue that are
hardware-based, several software-based approaches.

Fig 2:- Face Recognition

Results of face recognition mainly rely on extracted


features of face to identify patters and classification
methods are used to recognise face.

 Iris Recognition
Fig 1:- Finger Print J. Daugmen [3] proposed an algorithm to recognize
individual by their iris patterns and it turn out to be most
 Face Recognition unique and reliable biometric feature after fingerprint.
S. A. Patil et al. [2] discusses face recognition is a Every person have unique iris patterns and it became
visual pattern recognition problem as face has factors interesting alternative approach to reliable visual
affecting illumination, pose, expressions. It is converted to recognition of humans when imaging system is placed at
two-dimensional image for the purpose of identification. In distance less than a meter, and it works fast with very large
face recognition system test image is localized and databases without any false match even with database size
normalized under pre-processing steps and generally in millions. The iris has the great mathematical advantage
consists of four steps: Detection, Alignment, Feature that its pattern variability among different persons is
extraction, and Matching. In video based face recognition, enormous. It is internal yet fully visible and well protected
the detected faces need to be tracked using a face tracking feature and it does not change over a period of time.
components. Accuracy is achieved by Face alignment.
Facial components, such as eyes, nose, and mouth and
facial outline, are located; based on the location points,
geometrical transform or image morphing is used to
normalize face image with respect to geometrical
properties, such as size and pose. Face image is need to be
normalized with respect to illumination and gray scale.
Geometrically and photo metrically, feature extraction is
performed to provide effective information that is useful for
distinguishing between faces of different persons and stable Fig 3:- Iris Recognition
with respect to the geometrical and photometrical variations

IJISRT20JUL748 www.ijisrt.com 1274


Volume 5, Issue 7, July – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Study of Cells and Molecules illuminations. One limitation is that, it does not work well
M. H. Sarrafzadeh et al. [4] proposed image under the condition of pose variance
processing based on Red Green and Blue color analysis to
analyse cell concentration of three microalgae i.e. Parsi et al. [3] proposed an approach where they
Botryococcus, baraunii, Chlorella vulgaris and Ettila. The matches individual present on a watchlist and they have
experiment were made using concentrated and diluted used their own classifier for the recognition purpose.
cultures of microalgae to prepare different concentrations Author proposed image morphing technique where source
of dry cell weight. Charge Couple Camera is used to image image is matched to destination image and gray level of the
these samples. This method is simple but efficient image is matched. Author used Active Shape Model (ASM)
technique for microalgae biomass estimation. This method to locate feature points in a face image.
is very useful and can be a base for biomass measurement.
Lee et al. [4] proposed an approach to recognize
 Biometric Security System for surveillance individual form video sequence. In this method, low
A.Singh et al [5] proposed biometric security system dimensional manifold Images are used to enrol users. It is a
to identify miscreants in a real time scenario. It is generally big challenge to recognize individual with having different
a real time surveillance system which can be placed variations to the pose. Hausdorff distance is used between
anywhere to ensure security in mobile area where people the image and its manifold. Temporal information can be
are roaming. Principal Component Analysis (PCA) is used easily approximated with image having high variation.
with Nearest Neighbour classification. Threshold value is Transition matrix is used for storing temporal information
replaced by confidence value. If the test image is found to which can be helpful to recognize any person face with
be matched with the database of stored images with desired partial occlusion. Limitation which author found is that
confidence value then it will set an alarm and recognize the careful alignment need to be done and images are very
individual/miscreant. sensitive to illumination.

III. LITERATURE REVIEW Fan et al. [5] proposed methodology for face
recognition method by using both spatial and temporal
Yang et al. [1] worked on well known traditional face information simultaneously. One big problem which author
recognition approach called Principal Component Analysis found in this approach is to properly combine facial and
(PCA) and they measured the performance of PCA in all temporal dynamics. Video frame is used to learn view
directions and they analyse using PCA with high specific manifold it is performed using Locally Linear
dimensional images takes more time to process and to Embedding (LLE). K means clustering with LLE is used
calculate covariance matrix. Fortunately, they don’t need to for some view specific manifold.
calculate covariance matric because Eigenvectors can also
be calculated by Singular Value Decomposition (SVD) IV. APPLICATIONS OF DIP IN BIOMETRIC
method. But by using SVD, efficiency is very less, SYSTEMS
transformation from 2D to 1D metrics is not needed. This
approach is fully based on 2D metrics as it is more efficient  Cyber Authentication
and time saving in comparison to 1D approach. In cyber world, biometric feature of humans help in
authentication of user that led to preserving the security of
Gottumukkal et al. [2] gave modular approach PCA, any system. In today era of technology authenticity and
which works in partition of image. Face image is divided in security is the major concern. Hence fingerprints are a
various module. PCA is applied on each part and this major key for developing an efficient system.
method provide more accurate and fast results when
compared to conventional PCA under condition of large
variations in brightness, facial expressions and

IJISRT20JUL748 www.ijisrt.com 1275


Volume 5, Issue 7, July – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Detecting liveliness of human classification methods. Approaches like PCA, nearest
The major challenging issue nowadays is to find out neighbour, K means clustering, LLE, and morphology can
that whether any biometric feature belongs to a live person be used to provide better accuracy. Study of molecules and
or spoofed one. In that scenario biometric system plays a cells in biotechnology is possible with the help of Image
vital role in detecting the fingerprints, face, and iris which Processing. In addition Digital image processing is also
in turns provide security and efficiency to the system. applicable in the field of bioscience (Study of cells and
molecules) with the help of digital image processing tools.
 Law Enforcement Agencies:
Biometric security system is also used by several law REFERENCES
related agencies to identify the culprits in any crime cases.
Fingerprints in this field are useful from several years and [1]. A.K.Singh, and C. Bhatnagar. Biometric Security
act as an efficient method. System for Watchlist Surveillance. IEEE Trans.
Elsevier Procedia Computer Science 46 (2015) 596 –
 In Organizations and Corporate: 603.
This method is widely used nowadays in several [2]. M.H.Sarrafzadeh, H. J. La, and J.Y. Lee. Microalgae
organizations at entry level to identify the real person who biomass quanification by digital image processing and
has legally the permission to enter in any particular firm. RGB color analysis. Springer Science + Business
th
Media. 24 March 2014.
 In Retail and Grocery shops: [3]. J. Daugman. How iris recognition works. University
Biometric systems can also be used in retail and of Cambridge, The Computer Laboratory, Cambridge,
grocery shops e.g. Fingerprints are scanned in several shops U.K. 2004
at entry level in order to identify the real customer which is [4]. S. A. Patil and P. J. Deore. Video-based face
helpful for the owner. The scanning of fingerprints of recognition: a survey. Conference on Advances in
human is done at entry level to identify the actual customer. Communication and Computing (NCACC'12). April
21, 2012.
 Banking Application: [5]. Vikram Panchal. Review on Finger Print Recognition
Biometric security system is helpful in ATM’s Systems. International
services also for authentication of user. Security is a [6]. Journal of Emerging Technologies in Computational
challenging goal that needs to be achieved in that case. and Applied Sciences (IJETCAS), 2013.

 In Colleges and Schools:


Fingerprint, face and iris recognition have become an
efficient technique for attendance purpose of faculty
members. The absence and presence of staff members can
be find out using these systems. On the other hand, it is also
helpful in identifying the actual member of any
organization.

V. CONCLUSION

This paper is a showcase of various novel approaches,


methods, and technologies used in the field of image
processing with various unique features such as fingerprint,
face, and iris for the purpose of recognition. Although these
approaches can be combined with other approaches and

IJISRT20JUL748 www.ijisrt.com 1276

You might also like