Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Iris and Face Verification using Decision Level Fusion Technique

Published on February 2012 by N. D. Kapale, R.N. Kankarale, D.G.Lokhande
National Conference on Emerging Trends in Computer Science and Information Technology
Foundation of Computer Science USA
NCETCSIT - Number 1
February 2012
Authors: N. D. Kapale, R.N. Kankarale, D.G.Lokhande
e3ec8b2d-97da-43f8-82fe-00c3c4ed162b

N. D. Kapale, R.N. Kankarale, D.G.Lokhande . Iris and Face Verification using Decision Level Fusion Technique. National Conference on Emerging Trends in Computer Science and Information Technology. NCETCSIT, 1 (February 2012), 5-9.

@article{
author = { N. D. Kapale, R.N. Kankarale, D.G.Lokhande },
title = { Iris and Face Verification using Decision Level Fusion Technique },
journal = { National Conference on Emerging Trends in Computer Science and Information Technology },
issue_date = { February 2012 },
volume = { NCETCSIT },
number = { 1 },
month = { February },
year = { 2012 },
issn = 0975-8887,
pages = { 5-9 },
numpages = 5,
url = { /proceedings/ncetcsit/number1/4752-t002/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Computer Science and Information Technology
%A N. D. Kapale
%A R.N. Kankarale
%A D.G.Lokhande
%T Iris and Face Verification using Decision Level Fusion Technique
%J National Conference on Emerging Trends in Computer Science and Information Technology
%@ 0975-8887
%V NCETCSIT
%N 1
%P 5-9
%D 2012
%I International Journal of Computer Applications
Abstract

Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. The ultimate goal of any biometric user authentication is to adopt the concepts for natural recognition or authentication of subjects, find techniques to automate this process and to implement these techniques in such way that a minimum of authentication errors occur.

References
  1. IRIS RECOGNITION, C. H. Daouk, L. A. El-Esber, F. D. Kammoun and M. A. Al Alaoui Electrical and Computer Engineering Department, Faculty of Engineering and Architecture, American University of Beirut, P.O. Box: 110236, Riad El Solh, Beirut 1107 2020.
  2. Daugman, J. “How Iris Recognition Works”, available at http://www.ncits.org/tc_home/m1htm/docs/m1020 044.pdf.
  3. Daugman, J., “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE transactions on pattern analysis and machine intelligence, vol. 15, no.11, November 1993, pp. 1148-1161.
  4. Daugman, J., “Complete Discrete 2-D Gabor Transforms by Neural Networks for Image Analysis and Compression”, IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. 36, no. 7, July 1988, pp. 1169-1179.
  5. Gonzalez, R.C., Woods, R.E, Digital Image Processing, 2nd ed., Prentice Hall
  6. Wildes, R.P, “Iris Recognition: An Emerging Biometric Technology”, Proceedings of the IEEE, VOL. 85, NO. 9, September 1997, pp. 1348-1363.
  7. Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004.
  8. Venkata SubbaReddy Poli, Nagaraja Arcot and Jyothsna Charapanamjeri, “Evaluation of Biometrics”, IJCSNS International Journal of Computer Science and Network Security, Vol. 9 No. 9, September 2009.
  9. Computational Imaging Systems for Iris Recognition, Robert Plemmons, Michael horvatha, Emily Leonhardt, Paul Pauca, Sudhakar Prasad, Stephen Robinson, Harsha Setty, Todd Torgersen, Joeseph van der Gracht, Edward Dowski, Ramkumar Narayanswamyd, Paulo E. X. Silveira, Wake Forest University, University of New Mexico, HoloSpex, Inc. CDM Optics, Inc.
  10. L. Mai, T. Tan, Y. Wang, and D. Zhang, “Personel identification based on iris texture analysis,” IEEE Trans. on Pattern.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Imagefusion multimodal verification PCA