Intricacies of Secured Multi-Biometric System
Abstract:
The Multi-biometrics
system is designed as a measure for security purposes to recognize individuals using
all available features. It is a thrilling research domain carried out to boost the
security level of a country or of an organization. The integration of muti-modal
biometrics in real time application resolves the limitations of the uni-modal applications.
Although, the design and assessment of the multi-biometrics systems raises much
issues, this paper tends to unravel the clumsiness and trade-offs in its applications,
the benefits of fusion level, integration strategies and check to spoofing. In conclusion,
a thorough reviewing of multi-modal secured biometrics techniques and approaches
was carried out to ensure data identification integrity. Some points were suggested
for consideration as subjects of interest for future research.
Keywords: Multi-Biometrics; Multimodal application; Unimodal application; Secured Biometrics;
fusion levels Spoofing.
References:
[1]. Amirthalingam, "A Multimodal Approach
for Face and Ear Biometric System," International Journal of Computer
Science Issues (IJCSI), vol. 10, no. 5, pp. 234-241, 2013.
[2]. Ahuja M. S. and S. Chabbra, "A Survey
of Multimodal Biometrics," International Journal of Computer Science and
its Applications, vol. 1, no. pp. 157-160, 2011.
[3]. Anwar, M. A. Rahman, and S. Azad,
"Multibiometric Systems Based Verification Technique," European J.
Scientific Research, vol. 34, no. 2, pp. 260-270, 2009.
[4]. Asha S. and C. Chellappan,
"Authentication of E-Learners Using Multimodal Biometric Technology,"
presented at the Biometrics and Security Technologies, 2008. ISBAST 2008.
International Symposium on, Islamabad, 2008. pp. 1-6.
[5]. AlMahafzah and M. Z. AlRwashdeh, "A
Survey of Multibiometric Systems," International Journal of Computer
Applications vol. 43, no. 15, pp. 36-43, 2012.
[6]. Bhatia R., "Biometrics and Face
Recognition Techniques," International Journal of Advanced Research in
Computer Science and Software Engineering, vol. 3, no. 5, pp. 93-99, 2013.
[7]. Bhargava and R. S. Ochawar, "Biometrics
in Access Control System," International Journal of Emerging Technology and
Advanced Engineering, vol. 3, no. 2, pp. 269-273, 2013.
[8]. Deriche, "Trends and Challenges in
Mono and Multi biometrics," presented at the Image Processing Theory,
Tools and Applications, 2008. IPTA 2008. First Workshops on, Sousse, 2008. pp.
1-9.
[9]. Delac and M. Grgic, "A Survey of
Biometric Recognition Methods," in Electronics in Marine, 2004.
Proceedings Elmar 2004. 46th International Symposium, ELMAR-2004, Zadar,
Croatia, 2004, pp. 184-193.
[10]. Elumalai and M. Kannan, "Multimodal
Authentication for High End Security," International Journal on Computer
Science and Engineering, vol. 3, no. 2, pp. 687-692, 2011.
[11]. Feng, K. Dong, D. Hu, and D. Zhang,
"When Faces are Combined With Palmprints: A novel Biometric Fusion
Strategy," presented at the In proc. of 1st Int. Conf. on Biometric
authentication, Hong Kong, China, 2004. pp. 701-707.
[12]. Gad R., M. Mohamed, and N. El-Fishawy,
"Iris Recognition Based on Log-Gabor and Discrete Cosine Transform
Coding," Journal of Computer Science and Engineering, vol. 5, no. 2, pp.
19-26, 2011.
[13]. Gavrilova L. and M. M. Monwar,
"Current Trends in Multimodal Biometric System Rank Level Fusion," in
Pattern Recognition, Machine Intelligence and Biometrics, ed: Springer, 2011,
pp. 657-673.
[14]. Geethanjali and K. Thamaraiselvi,
"Feature Level Fusion of Multimodal Biometrics and Two Tier Security in
ATM System," International Journal of Computer Applications, vol. 70, no.
14, pp. 17-23, 2013.Karray, J. A. Saleh, M. N. Arab, and M. Alemzadeh,
"Multi Modal Biometric Systems: A State of the Art Survey," Pattern
Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo,
Canada, no. 2007.
[15]. Jain K., A. Ross, and S. Prabhakar,
"An Introduction to Biometric Recognition," IEEE Transactions on
Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4-20, 2004.
[16]. Kalra S. and A. Lamba, "A Survey on
Multimodal Biometric," International journal of computer science and
information technologies, vol. 5, no. 2, pp. 2148-2151, 2014.
[17]. Meraoumia, S. Chitroub, and A. Bouridane,
"Multimodal Biometric Person Recognition System based on Iris and
Palmprint Using Correlation Filter Classifier," in Proc. of the Second
International Conference on Communications and Information Technology,
Hammamet, Tunisia, June 26-28, 2012, pp. 782-787.
[18]. Manjunath M. and K. B. Raja, "A Novel Approach for
Iris Recognition using DWT&PCA," Int. J. Advanced Networking and
Applications, vol. 5, no. 1, pp. 1830-1836, 2013.
[19]. Mr. Rupesh Wagh A. P. C., "Analysis of
Mutlimodal Biometrics with Security Key," International Journal of
Advanced Research in Computer Science and Software Engineering (IJARCSSE). vol.
3, no. 8, pp. 1363-1365, 2013.
[20]. Malhotra S. and D. C. Kant, "A Novel
Approach for Securing Biometric Template," Internal Journal of Advanced
Research in Computer Science and Software Engineering (IJARCSSE), vol. 3, no.
5, pp. 397-403, 2013.
[21]. Matsumoto T., H. Matsumoto, K. Yamada, and
S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint
Systems," in Electronic Imaging 2002, Proceedings of SPIE, San Joes, USA,
2002, pp. 275-289.
[22]. Meva T.
and C. K. Kumbharana, "Comparative Study of Different fusion
techniques in multimodal biometric authentication," International Journal
of Computer Applications, vol. 66, no. 19, 2013.
[23]. Monwar M. and M. L. Gavrilova,
"Multimodal Biometric System Using Rank-Level Fusion Approach," IEEE
Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics,, vol. 39,
no. 4, pp. 867-878, 2009.
[24]. Ross A., K. Nandakumar, and A. K. Jain,
Handbook of Multibiometrics vol. 6. New York: Springer Science & Business
Media, 2006.
[25]. Ross A., A. K. Jain, and K. Nandakumar,
"Information Fusion in Biometrics," in Handbook of Multibiometrics,
ed, 2006, pp. 37-58.
[26]. Radha N. and A. Kavitha, "Rank Level
Fusion Using Fingerprint and Iris Biometrics," Indian Journal of Computer
Science and Engineering (IJCSE), vol. 2, no. 6, pp. 917-923, 2011.
[27]. Sathish G., S. V. Saravanan, S. Narmadha,
and S. U. Maheswari, "Multi-Algorithmic Iris Recognition,"
International Journal of Computer Applications, vol. 38, no. 11, pp. 13-21,
2012.
[28]. Singh Y. S. a. S., "Evaluation of
Electrocardiogram for Biometric Authentication," Journal of Information
Security, vol. 3, no. 1, pp. 39-48, 2012.
[29]. Singhal R., N. Singh, and P. Jain,
"Towards. An Integrated Biometric Technique," International Journal
of Computer Applications, vol. 42, no. 13, pp. 20-23, 2012.
[30]. Siddiqui M., R. Telgad, and P. D. Deshmukh,
"Multimodal Biometric Systems: Study to Improve Accuracy and Performance,"
International Journal of Current Engineering and Technology, vol. 4, no. 1, pp.
165-171, 2014.
[31]. Schouten and B. Jacobs, "Biometrics
and Their Use in E-Passports," Image and Vision Computing, vol. 27, no. 3,
pp. 305-312, 2009.
[32]. Satyarthi, Y. P. S. Maravi, P. Sharma, and
R. K. Gupta, "Comparative Study of Offline Signature Verification
Techniques," International Journal of Advancements in Research &
Technology, vol. 2, no. 2, pp. 1-6, 2013
[33]. Sharma S., "An Improved Iris
Recognition System Based on 2-D DCT and Hamming Distance Technique,"
ICRTEDC-2014, GV/ICRTEDC/08, vol. 1, no. 2, pp. 32-34, 2014.Soltane M., N.
Doghmane, and N. Guersi, "Face and Speech Based Multi-Modal Biometric
Authentication," International Journal of Advanced Science and Technology,
vol. 21, no. 6, pp. 41-56, 2010.