Skip to main content

A Two-Level Security System Based on Multimodal Biometrics and Modified Fusion Technique

  • Conference paper
  • First Online:
Sustainable Communication Networks and Application

Abstract

Biometrics is physical or behavioral characteristics to identify a human digitally. The identification of humans involves training and testing process. In general, the training process requires a large database to store the extracted features of multiple samples of a human, and the lighting conditions of acquiring samples also make it more complex. These challenges of using single biometric can be addressed by using multimodal biometrics. In this paper, multimodal biometrics of humans like face, fingerprint, and iris are considered for their easy and secure recognition among the group of people. The testing process involves the comparison of the features of real-time sample with the features of training samples, and consequently, the recognition rate of this algorithm increases. This algorithm uses discrete wavelet transform (DWT) for the filtering and compression, singular value decomposition (SVD) for the extraction of features from the compressed and filtered results of DWT. The proposed method gives better performance like 98% of accuracy and 100% recognition rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B Elisha Raju, P. Satyanarayana Murty, Face recognition using DWT-SVD based feature extraction methods. ICRTCET-2018, GJESR, (2019), pp. 499–504. ISSN 2348–8034

    Google Scholar 

  2. G.L. Marcialis, F. Roll, Fingerprint verification by fusion of optical and capacitive sensors‖. Pattern Recogn. Lett. 25(11), 1315–1322 (2004)

    Article  Google Scholar 

  3. A. Ross, A.K. Jain, J. Reisman, A hybrid fingerprint matcher. Pattern Recognit. 36(7), 1661–1673 (2003)

    Google Scholar 

  4. H. Hill, P.G. Schyns, S. Akamatsu, Information and viewpoint dependence in face recognition‖. Cognition 62(2), 201–222 (1997)

    Article  Google Scholar 

  5. R. Brunelli, D. Falavigna, Person identification using multiple cues. IEEE Trans. Pattern Anal. Mach. Intell. 17(10), 955–966 (1995)

    Article  Google Scholar 

  6. A. Jameer Basha, V. Palanisamy, T. Purusothaman, Efficient multimodal biometric authentication using fast fingerprint verification and enhanced iris features. J. Comput. Sci. 7(5): 698–706 (2011)

    Google Scholar 

  7. N. Radha, A. Kavitha, Rank level fusion using fingerprint and iris biometrics. Indian J. Comput. Sci. Eng. 2(6), 917–923 (2012)

    Google Scholar 

  8. M. Abdolahi, M. Mohamadi, M. Jafari, Multimodal biometric system fusion using fingerprint and iris with fuzzy logic. Int. J. Soft Comput. Eng. 2(6), 504–510 (2013)

    Google Scholar 

  9. T. Vijayakumar, R. Vinothkanna, Retrieval of complex images using visual saliency guided cognitive classification. J. Innov. Image Process. (JIIP) 2(02), 102–109 (2020)

    Article  Google Scholar 

  10. P.R. Budumuru, G.P. Kumar, B.E. Raju, Hiding an ımage in an audio file using LSB audio technique, in 2021 International Conference on Computer Communication and Informatics (ICCCI) (2021), pp. 1–4

    Google Scholar 

  11. E.E.B. Adam, Evaluation of fingerprint liveness detection by machine learning approach-a systematic view. J. ISMAC 3(01), 16–30 (2020)

    Article  Google Scholar 

  12. D. Egfin Nirmala, V. Vaidehi, Comparison of Pixel-level and feature level image fusion methods, in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (2015), pp. 743–748

    Google Scholar 

  13. K. R. Chandra, B. Prudhvi Raj, G. Prasannakumar, An efficient image encryption using chaos theory, in 2019 International Conference on Intelligent Computing and Control Systems (ICCS) (Madurai, India, 2019), pp. 1506–1510

    Google Scholar 

  14. M. Dileep, B. Prudhviraj, G. Prasannakumar, A new image encryption and data hiding technique using wavelet transform. Int. J. Res. Eng. Technol. 5(5), 195–198 (2016)

    Article  Google Scholar 

  15. V. Vaidehi, N. Babu, H. Avinash, M. Vimal, A. Sumitra, P. Balamuralidhar, M. Chandra, Face recognition using discrete cosine transform and fisher linear discriminant, in 2010 11th International Conference on Control Automation Robotics & Vision (2010), pp. 1157–1160

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Elisha Raju .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Elisha Raju, B., Ramesh Chandra, K., Budumuru, P.R. (2022). A Two-Level Security System Based on Multimodal Biometrics and Modified Fusion Technique. In: Karrupusamy, P., Balas, V.E., Shi, Y. (eds) Sustainable Communication Networks and Application. Lecture Notes on Data Engineering and Communications Technologies, vol 93. Springer, Singapore. https://doi.org/10.1007/978-981-16-6605-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6605-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6604-9

  • Online ISBN: 978-981-16-6605-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics