Establishing User Authentication using Face Geometry

The use of digital media or information is very precarious for increasing of hacker in the nation. So the information security is one of the commanding articles to shield it. The biometric information security is one information security mechanism, which is powerful than conventional cryptography system. The biometric system plays a vital role in person recognition. The main reason of biometry is so popular in security, because there is no risk if something might be lost or stolen in case of traditional IDs and passwords. After several comparisons among possible features of a human face geometry processing approaches, an authorized person recognition system have been designed and developed. Freely accessible sample faces of different persons are used in this novel biometric authentication system. Furthermore, the functionality to extract features of face has been implemented to compare the new samples with user templates. The implementation has been evaluated by the FAR (False Acceptance Rate) and FRR (False Rejection Rate) of the system in order to reduce FAR. Examining the Distance between some objects of faces and angles between objects points are used in this system and this is the novelty.

[1]  Kazuhiko Ohnuma,et al.  Novel biometrics based on nose pore recognition , 2009 .

[2]  Anil K. Jain,et al.  Face Matching and Retrieval Using Soft Biometrics , 2010, IEEE Transactions on Information Forensics and Security.

[3]  D. O'Shaughnessy,et al.  Speaker recognition , 1986, IEEE ASSP Magazine.

[4]  Ravindra C. Thool,et al.  SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS , 2010 .

[5]  D. Levicky,et al.  Using of Hand Geometry in Biometric Security Systems , 2007 .

[6]  Panos M. Pardalos,et al.  Handbook of Massive Data Sets , 2002, Massive Computing.

[7]  Ajay Kumar,et al.  Personal authentication using hand vein triangulation , 2008, SPIE Defense + Commercial Sensing.

[8]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[9]  Anil K. Jain,et al.  Biometrics of Next Generation: An Overview , 2010 .

[10]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[11]  M. R. Spiegel E and M , 1981 .

[12]  Sung Bum Pan,et al.  A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System , 2012, Journal of biomedicine & biotechnology.

[13]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[14]  Natalia A. Schmid,et al.  Performance prediction methodology for biometric systems using a large deviations approach , 2004, IEEE Transactions on Signal Processing.

[15]  Elena Deza,et al.  Encyclopedia of Distances , 2014 .

[16]  Phalguni Gupta,et al.  A Skin-Color and Template Based Technique for Automatic Ear Detection , 2009, 2009 Seventh International Conference on Advances in Pattern Recognition.

[17]  Miroslav Bača,et al.  Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics , 2012 .

[18]  Subhra Mazumdar,et al.  Biometric Security Using Finger Print Recognition , 2008 .

[19]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[20]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[22]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[23]  Miguel A. Patricio,et al.  Privacy and Legal Requirements for Developing Biometric Identification Software in Context-Based Applications 13 , 2010 .

[24]  Roberto Brunelli,et al.  Template Matching Techniques in Computer Vision: Theory and Practice , 2009 .

[25]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[26]  J. Kruskal Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis , 1964 .

[27]  G. Leedham,et al.  Infrared imaging of hand vein patterns for biometric purposes , 2007 .

[28]  Melvyn L. Smith,et al.  Using Photometric Stereo for Face Recognition , 2011 .

[29]  Shan Juan Xie,et al.  New Trends and Developments in Biometrics , 2012 .

[30]  M.K. Khan,et al.  An effective iris recognition system for identification of humans , 2004, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..

[31]  Daniel Riccio,et al.  Biometric Authentication , 2014, Lecture Notes in Computer Science.

[32]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.