Skip to main content

Human Authentication Using FingerIris Algorithm Based on Statistical Approach

  • Conference paper
Networked Digital Technologies (NDT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 87))

Included in the following conference series:

Abstract

Biometric becomes nowadays, a strong tool to authenticate persons, because they are able to prove a true identity. Research shows that different applications are used in verification. Fingerprints, Face, Iris recognition are some examples. But most of them safer from FRR and FAR, so for those reasons more researches and new algorithms are needed to be developed and to solve this problem. This paper presents a system with an algorithm, uses a pair of biometrics print (fingerprint and Iris), used to gain access to personal resources, it is based on a statistical approach. Features are extracted and used to authenticate persons. Paper shows that the developed system solves the mentioned problem and accelerates matching process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Elmadani, A.B., Prakash, V., Ramli, A.R.: Smart Card and Secure Coprocessor Enhance Internet Security. Suranaree Journal of Science and Technology 9(2) (2002)

    Google Scholar 

  2. Elmadani, A.B., Prakash, V., Ali, B.M., Ramli, A.R., Jumar, K.: New Technique in Fingerprint Matching based on An-AVL tree Search Algorithm. Journal of Technology and commerce Brunei Darussalam (2006)

    Google Scholar 

  3. Elmadani, A.B., Prakash, V., Ali, B.M., Ramli, A.R., Jumari, K.: Fingerprint Access Control with Anti-spoofing Protection. Brunei Darussalam Journal of Technology and Commerce (2005)

    Google Scholar 

  4. Pankanti, S., Prabhakar, S., Jain, A.K.: On the individuality of fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(8), 1010–1025 (2002)

    Article  Google Scholar 

  5. Wang, S.D., Lee, C.J.: Fingerprint recognition using directional micro pattern histo-grams and LVQ networks. In: Proceedings of International Conference on Information Intelligence and Systems, USA, pp. 300–303 (1999)

    Google Scholar 

  6. Zorski, W., Foxon, B., Blackledge, J., Turner, M.: Application of the Hough Transform: Iris and Fingerprint Identification. In: Horwood, E. (ed.) Third IMA Conference in Image Processing Mathematical Methods, Algorithms and Applications Processing III, pp. 69–81 (2001)

    Google Scholar 

  7. Toft, P.: The Radon Transform - Theory and Implementation, Ph.D. thesis. Department of Mathematical Modelling, Technical University of Denmark (June 1996)

    Google Scholar 

  8. Ganeshan, B., Theckedath, D., Young, R.C.D., Chatwin, C.R.: Biometric iris recognition system using a fast and robust iris localization and alignment procedure. Optics and Lasers in Engineering 44, 1–24 (2006)

    Article  Google Scholar 

  9. Roy, K., Bhattacharya, P.: Iris Recognition: A Machine Learning Approach. VDM Verlag Saarbrücken, Germany (2008)

    Google Scholar 

  10. Hollingsworth, K., Peters, T., Bowyer, K.W., Flynn, P.J.: Iris Recognition Using Signal-Level Fusion of Frames From Video. IEEE Transactions on Information Forensics and Security 4(4), 837–848 (2009)

    Article  Google Scholar 

  11. Massimo, T., Stan, L., Chellappa, Z.: Handbook of Remote Biometrics for Surveillance and Security Series. In: Rama (ed.) Advances in Pattern Recognition (2009)

    Google Scholar 

  12. Yingzi, D., Lves, R.W., Etter, D.M., Welch, T.B.: Biometric signal processing laboratory. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP apos;04), vol. 5(1), pp. 1025–1028 (2004)

    Google Scholar 

  13. Ma, L., Wang, Y., Tan, T.: Iris recognition using circular symmetric filters. In: Proceedings of 16th International Conference on Pattern Recognition, vol. 2, pp. 414–417 (2002)

    Google Scholar 

  14. Lipinski, B.: Iris Recognition: Detecting the Iris. Journal of Medical and Biological Sciences, Scientific Journal International (2004)

    Google Scholar 

  15. Baig, A., Bouridane, A., Kurugollu, F., Qu, G.: Fingerprint-Iris Fusion based Identification System using a single Hamming Distance Matcher. International Journal of Bio-Science and Bio-Technology 1(1) (2009)

    Google Scholar 

  16. Hong, L., Jain, A., Pankanti, S.: Can Multibiometrics Improve Performance? In: Proceedings AutoID’99, Summit, NJ, pp. 59–64 (1999)

    Google Scholar 

  17. Jain, A.K., Hong, L., Kulkarni, Y.: A Multimodal Biometric System using Fingerprint, Face and Speech. In: 2nd International Conference on Audio and Video-Based Biometric Person Authentication, Washington, D.C., pp. 182–187 (1999)

    Google Scholar 

  18. Wang, Y., Tan, T., Jain, A.K.: Combining Face and Iris Biometrics for Identity Verification. Springer, Heidelberg (2003)

    Google Scholar 

  19. Lumini, A., Nanni, L.: When Fingerprints are Combined with Iris – Case Study: FVC 2004 and CASIA. International Journal of Network Security 4(1), 27–34 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Elmadani, A.B. (2010). Human Authentication Using FingerIris Algorithm Based on Statistical Approach. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14292-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14292-5_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14291-8

  • Online ISBN: 978-3-642-14292-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics