Dual-nature biometric recognition epitome

Main Article Content

Shahzad Ashraf*
Tauqeer Ahmed

Abstract

All humans are born with unique physically identified body characteristics to other persons which remains unchanged throughout life. These characteristics are taken into account by the emerging technology to get recognized from person to person. The technology used by the traditional human identification system sometimes becomes inefficient when data or images received are not up to the acceptable quality mark or when a person has a face covered with mask-like during epidemic virus fistula. In order to overcome such human recognition challenges, a Multi-biometric sustainable approach (D-nb) has been proposed using two uniquely identified modalities like foot and iris. This approach shrewdly identifies and makes the bodacious recognition among humans and suggests the sagacious result which is foremost better than the traditional biometric system.

Downloads

Download data is not yet available.

Article Details

Ashraf, S., & Ahmed, T. (2020). Dual-nature biometric recognition epitome. Trends in Computer Science and Information Technology, 5(1), 008–014. https://doi.org/10.17352/tcsit.000012
Research Articles

Copyright (c) 2020 Ashraf S, et al.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Biometric Recognition: Challenges and Opportunities (2010) The National Academies Press. Link: https://bit.ly/3hPFzD5

Yang W, Hu J, Wang S, Wu Q (2018) Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection. Wireless Communications and Mobile Computing 2018: 7107295. Link: https://bit.ly/2BrHNYA

MS University (2018) Unlocking new possibilities for biometrics. MSUToday. Link: https://bit.ly/314PH4X

False Acceptance Rate and False Recognition Rate in biomemetrics. Link: https://bit.ly/2Ymy7rc

Gunasekaran K, Raja J, Pitchai R (2019) Deep multimodal biometric recognition using contourlet derivative weighted rank fusion with human face, fingerprint and iris images. Automatika 60: 253-265. Link: https://bit.ly/3hSmNL9

Saini RK, Rana N (2014) Comparison of Various Biometric Methods. Link: https://bit.ly/3fLXGb5

Uhl A, Wild P (2007) Personal identification using Eigenfeet, Ballprint and Foot geometry biometrics. In 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems 1-6. Link: https://bit.ly/37QWXmd

Campisi P, Maiorana E, Neri A (2011) Signature Biometrics. In Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia, Eds. Boston, MA: Springer US 1208–1210.

Ashraf S, Saleem S, Chohan AH, Aslam Z, Raza A (2020) Challenging strategic trends in green supply chain ‎management. Int J Res Eng Appl Sci Jreas 5: 71-74. Link: https://bit.ly/3dNy9gn

Pandya J (2019) Hacking Our Identity: The Emerging Threats From Biometric Technology. Forbes. Link: https://bit.ly/3hT6xcQ

(2020) Multimodal System - an overview. Link: https://bit.ly/3hPRX66

Giannakos MN, Sharma K, Pappas IO, Kostakos V, Velloso E (2019) Multimodal data as a means to understand the learning experience. Int J Inf Manag 48: 108-119. Link: https://bit.ly/2Nje3jh

Ashraf S, Gao M, Chen Z, Kamran S, Raza Z (2017) Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol. Int J Adv Comput Sci Appl 8. Link: https://bit.ly/3fGopG2

Sarfraz N (2019) Adermatoglyphia: Barriers to Biometric Identification and the Need for a Standardized Alternative. Cureus 11: e4040. Link: https://bit.ly/31752Ca

Luaibi MK, Mohammed FG (2019) Facial Recognition Based on DWT – HOG – PCA Features with MLP Classifier. J Southwest Jiaotong Univ 54. Link: https://bit.ly/2CyySFv

Gafurov D (2008) Emerging Biometric Modalities: Challenges and Opportunities. 122: 29-38. Link: https://bit.ly/2YlgIzl

The essence of eigenvalues and eigenvectors in Machine Learning. Link: https://bit.ly/3dkwK0J

Doriguello JF, Montanaro A (2019) Quantum sketching protocols for Hamming distance and beyond. Phys Rev A 99. Link: https://bit.ly/2AWu6ko

Herbadji A, Akhtar Z, Siddique K, Guermat N, Ziet L, et al. (2020) Combining Multiple Biometric Traits Using Asymmetric Aggregation Operators for Improved Person Recognition. Symmetry 12: 444. Link: https://bit.ly/2NwE8f3

Ashraf S, Arfeen ZA, Khan MA, Ahmed T (2020) SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture. Int J Mod Trends Sci Technol 6: 162-167. Link: https://bit.ly/2Z1OTem

Ashraf S, Raza A, Aslam Z, Naeem H, Ahmed T (2020) Underwater Resurrection Routing Synergy using Astucious Energy Pods. J Robot Control JRC 1. Link: https://bit.ly/3eouwi7

Ashraf S, Ahmad A, Yahya A, Ahmed T (2020) Underwater Routing Protocols: Analysis of Link Selection ‎Challenges. AIMS Electron Electr Eng 4: 200–215. Link: https://bit.ly/2VBwvbt

Kak N, Gupta R, Mahajan S (2010) Iris Recognition System. Int J Adv Comput Sci Appl 1. Link: https://bit.ly/2AP09D5

Sarfraz N (2019) Adermatoglyphia: Barriers to Biometric Identification and the Need for a Standardized Alternative. Cureus 11: e4040. Link: https://bit.ly/3hT8HsY

Kushwaha R, Nain N, Singal G (2017) Detailed Analysis of Footprint Geometry for Person Identification. In 2017 13th International Conference on Signal-Image Technology Internet-Based Systems (SITIS). 229-236. Link: https://bit.ly/37NBCKC

Ashraf S, Saleem S, Ahmed T (2019) Sagacious Communication Link Selection Mechanism for Underwater ‎Wireless Sensors Network. Int J Wirel Microw Technol 10: 12–25.

Hoo SC, Ibrahim H (2019) Biometric-Based Attendance Tracking System for Education Sectors: A Literature Survey on Hardware Requirements. 2019: 1-25. Link: https://bit.ly/2Z3ZpSG

Ashraf S, Ahmed T (2016) Machine Learning Shrewd Approach For An Imbalanced Dataset Conversion ‎Samples. J Engneering Technol 10: 7–25.

Jain Y, Juneja M, Student M (2018) Ridge Energy Based Human Verification Using Iris and Palm Print. 5: 7. Link: https://bit.ly/2Z3ZLbY

ECIC. Link: https://bit.ly/316XOOq

Ashraf S (2020) Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies. Int J Sci Res Comput Sci Eng 8: 1-9. Link: https://bit.ly/2NiUUOt

What Are Log-Gabor Filters and Why Are They Good?. Link: https://bit.ly/3dl87kl

Kapoor P, Lee D, Kim B, Lee S (2020) Computation-Efficient Quantization Method for Deep Neural Networks. Link: https://bit.ly/2NhQWp9

Ashraf S, Ahmed T, Raza A, Naeem H (2020) Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells. Smart Cities 3: 74–92. Link: https://bit.ly/3hTCphx

Ashraf S, Muhammad D, Khan MA, Ahmed T (2019) Fuzzy based efficient Cosmetology Paradigm. Int J Multidiscip Curr Res 8: 421-425.

Ashraf S, Gao M, Mingchen Z, Ahmed T, Raza A, et al. (2020) USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time. Wirel Commun Mob Comput 2020: 12. Link: https://bit.ly/3hT9slM

What is false rejection rate (FRR)? Webopedia Definition. Link: https://bit.ly/3fL2JZj

Ashraf S, Ahmed T, Saleem S, Aslam Z (2020) Diverging Mysterious in Green Supply Chain Management. Orient J Comput Sci Technol 13: 22–28. Link: https://bit.ly/2B1xFGb

Ashraf S, Yahya A, Khan MA Culminate coverage for sensor network through Bodacious-instance Mechanism. Manag. J Wirel Commun Netw 8: 1–7.

Reed IS, Chen X (1999) Reed-Solomon Codes. In Error-Control Coding for Data Networks. Reed IS, Chen X, Eds. Boston, MA: Springer US 233–284. Link: https://bit.ly/2AQ91IF

Most read articles by the same author(s)