IEEE b14 - Final
IEEE b14 - Final
B Arjun sahas
UG Student
Department of Computer Science and Engineering
MLR Institute of Technology
Hyderabad,India
[email protected]
Abstract —It is proposed to use a combination of three the retina. The colour of the iris is often referred to as "eye
biometric identities: iris, palm print, and face. Firstly, Input colour” .Iris recognition refers to the capability of verifying
images that contain noise undergo pre-processing from which the identity of a person through his eyes i.e. Iris. The human
key features are extracted. These features are compared with iris is the space located around the pupil of the eye and is
the existing images present in the database that are considered
to be Authenticated. In this stage, we obtain Matching scores.
covered by the cornea layer which comes under the unique
A module fuses these individual scores obtained. The final information of a person[3].
fusion is capable of classifying a person to be authenticated or
un-authenticated.
For each subject, we collect palm print images
Keywords — Image Quality Assessement, Pre-processing,
from both left and right hands. These images are 8 bit gray-
Feature extraction, Biometrics, DWT Segmentation, Image
Fusion.
level JPEG files by our self-developed face recognition
device. Subjects are required to put his face near to the
capturing hardware and make sure that he is in Evenly
I. INTRODUCTION coloured background. The device takes the biological
features of a person.
The process begins with image pre-processing,
which includes noise removal and then feature extraction.
We have to interpret the shapes of Iris, palm print and face
properly because we need to train the computer which
cannot distinguish the shapes as human do. Another issue is
that an image can be influenced by a variety of elements II. LITERATURE SURVEY
such as the angle at which we take the picture or the lighting
conditions in the area. [1],[7]. A.
During a literature survey, we collected some of
the information about the mechanisms of detecting fake
A. Overview biometrics .
The iris is thin layer, circular component in the eye,
is responsible for the control of diameter and size of the Survey1:- On the vulnerability of face verification systems
pupil which is proportional to the amount of light reaching to hill-climbing attacks
Using Bayesian we try to test the weaknesses of two face
recognition systems via adaptation.. The hill-climbing
assault algorithm is used here. This attack considers the
distinct properties such as eigenface based and parts based
verification systems. We may conclude that the proposed
method has successfully bi-passed over the bulk of the III. SYSTEM ARCHITECTURE
accounts that have been attacked[5 [8].
Discrete wavelet transform decomposes the input image Figure 4: Fused Image is formed
into four levels which are LL,HL,LH and HH[8].
[3]https://www.researchgate.net/publication/317138401_Eff
icient_Score-
Based_Indexing_Technique_for_Fast_Palmprint_Retrieval