Dual-nature biometric recognition epitome
Main Article Content
Abstract
All humans are born with unique physically identified body characteristics to other persons which remains unchanged throughout life. These characteristics are taken into account by the emerging technology to get recognized from person to person. The technology used by the traditional human identification system sometimes becomes inefficient when data or images received are not up to the acceptable quality mark or when a person has a face covered with mask-like during epidemic virus fistula. In order to overcome such human recognition challenges, a Multi-biometric sustainable approach (D-nb) has been proposed using two uniquely identified modalities like foot and iris. This approach shrewdly identifies and makes the bodacious recognition among humans and suggests the sagacious result which is foremost better than the traditional biometric system.
Downloads
Article Details
Copyright (c) 2020 Ashraf S, et al.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Biometric Recognition: Challenges and Opportunities (2010) The National Academies Press. Link: https://bit.ly/3hPFzD5
Yang W, Hu J, Wang S, Wu Q (2018) Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection. Wireless Communications and Mobile Computing 2018: 7107295. Link: https://bit.ly/2BrHNYA
MS University (2018) Unlocking new possibilities for biometrics. MSUToday. Link: https://bit.ly/314PH4X
False Acceptance Rate and False Recognition Rate in biomemetrics. Link: https://bit.ly/2Ymy7rc
Gunasekaran K, Raja J, Pitchai R (2019) Deep multimodal biometric recognition using contourlet derivative weighted rank fusion with human face, fingerprint and iris images. Automatika 60: 253-265. Link: https://bit.ly/3hSmNL9
Saini RK, Rana N (2014) Comparison of Various Biometric Methods. Link: https://bit.ly/3fLXGb5
Uhl A, Wild P (2007) Personal identification using Eigenfeet, Ballprint and Foot geometry biometrics. In 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems 1-6. Link: https://bit.ly/37QWXmd
Campisi P, Maiorana E, Neri A (2011) Signature Biometrics. In Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia, Eds. Boston, MA: Springer US 1208–1210.
Ashraf S, Saleem S, Chohan AH, Aslam Z, Raza A (2020) Challenging strategic trends in green supply chain management. Int J Res Eng Appl Sci Jreas 5: 71-74. Link: https://bit.ly/3dNy9gn
Pandya J (2019) Hacking Our Identity: The Emerging Threats From Biometric Technology. Forbes. Link: https://bit.ly/3hT6xcQ
(2020) Multimodal System - an overview. Link: https://bit.ly/3hPRX66
Giannakos MN, Sharma K, Pappas IO, Kostakos V, Velloso E (2019) Multimodal data as a means to understand the learning experience. Int J Inf Manag 48: 108-119. Link: https://bit.ly/2Nje3jh
Ashraf S, Gao M, Chen Z, Kamran S, Raza Z (2017) Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol. Int J Adv Comput Sci Appl 8. Link: https://bit.ly/3fGopG2
Sarfraz N (2019) Adermatoglyphia: Barriers to Biometric Identification and the Need for a Standardized Alternative. Cureus 11: e4040. Link: https://bit.ly/31752Ca
Luaibi MK, Mohammed FG (2019) Facial Recognition Based on DWT – HOG – PCA Features with MLP Classifier. J Southwest Jiaotong Univ 54. Link: https://bit.ly/2CyySFv
Gafurov D (2008) Emerging Biometric Modalities: Challenges and Opportunities. 122: 29-38. Link: https://bit.ly/2YlgIzl
The essence of eigenvalues and eigenvectors in Machine Learning. Link: https://bit.ly/3dkwK0J
Doriguello JF, Montanaro A (2019) Quantum sketching protocols for Hamming distance and beyond. Phys Rev A 99. Link: https://bit.ly/2AWu6ko
Herbadji A, Akhtar Z, Siddique K, Guermat N, Ziet L, et al. (2020) Combining Multiple Biometric Traits Using Asymmetric Aggregation Operators for Improved Person Recognition. Symmetry 12: 444. Link: https://bit.ly/2NwE8f3
Ashraf S, Arfeen ZA, Khan MA, Ahmed T (2020) SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture. Int J Mod Trends Sci Technol 6: 162-167. Link: https://bit.ly/2Z1OTem
Ashraf S, Raza A, Aslam Z, Naeem H, Ahmed T (2020) Underwater Resurrection Routing Synergy using Astucious Energy Pods. J Robot Control JRC 1. Link: https://bit.ly/3eouwi7
Ashraf S, Ahmad A, Yahya A, Ahmed T (2020) Underwater Routing Protocols: Analysis of Link Selection Challenges. AIMS Electron Electr Eng 4: 200–215. Link: https://bit.ly/2VBwvbt
Kak N, Gupta R, Mahajan S (2010) Iris Recognition System. Int J Adv Comput Sci Appl 1. Link: https://bit.ly/2AP09D5
Sarfraz N (2019) Adermatoglyphia: Barriers to Biometric Identification and the Need for a Standardized Alternative. Cureus 11: e4040. Link: https://bit.ly/3hT8HsY
Kushwaha R, Nain N, Singal G (2017) Detailed Analysis of Footprint Geometry for Person Identification. In 2017 13th International Conference on Signal-Image Technology Internet-Based Systems (SITIS). 229-236. Link: https://bit.ly/37NBCKC
Ashraf S, Saleem S, Ahmed T (2019) Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network. Int J Wirel Microw Technol 10: 12–25.
Hoo SC, Ibrahim H (2019) Biometric-Based Attendance Tracking System for Education Sectors: A Literature Survey on Hardware Requirements. 2019: 1-25. Link: https://bit.ly/2Z3ZpSG
Ashraf S, Ahmed T (2016) Machine Learning Shrewd Approach For An Imbalanced Dataset Conversion Samples. J Engneering Technol 10: 7–25.
Jain Y, Juneja M, Student M (2018) Ridge Energy Based Human Verification Using Iris and Palm Print. 5: 7. Link: https://bit.ly/2Z3ZLbY
ECIC. Link: https://bit.ly/316XOOq
Ashraf S (2020) Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies. Int J Sci Res Comput Sci Eng 8: 1-9. Link: https://bit.ly/2NiUUOt
What Are Log-Gabor Filters and Why Are They Good?. Link: https://bit.ly/3dl87kl
Kapoor P, Lee D, Kim B, Lee S (2020) Computation-Efficient Quantization Method for Deep Neural Networks. Link: https://bit.ly/2NhQWp9
Ashraf S, Ahmed T, Raza A, Naeem H (2020) Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells. Smart Cities 3: 74–92. Link: https://bit.ly/3hTCphx
Ashraf S, Muhammad D, Khan MA, Ahmed T (2019) Fuzzy based efficient Cosmetology Paradigm. Int J Multidiscip Curr Res 8: 421-425.
Ashraf S, Gao M, Mingchen Z, Ahmed T, Raza A, et al. (2020) USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time. Wirel Commun Mob Comput 2020: 12. Link: https://bit.ly/3hT9slM
What is false rejection rate (FRR)? Webopedia Definition. Link: https://bit.ly/3fL2JZj
Ashraf S, Ahmed T, Saleem S, Aslam Z (2020) Diverging Mysterious in Green Supply Chain Management. Orient J Comput Sci Technol 13: 22–28. Link: https://bit.ly/2B1xFGb
Ashraf S, Yahya A, Khan MA Culminate coverage for sensor network through Bodacious-instance Mechanism. Manag. J Wirel Commun Netw 8: 1–7.
Reed IS, Chen X (1999) Reed-Solomon Codes. In Error-Control Coding for Data Networks. Reed IS, Chen X, Eds. Boston, MA: Springer US 233–284. Link: https://bit.ly/2AQ91IF