Full Paper View Go Back
Biometric Security System for Identification and Verification
Kaushal Kumar1 , Harshit Kumar2 , Piyush Singh3 , Amit Kumar4 , K.M. Shikha5
Section:Survey Paper, Product Type: Journal-Paper
Vol.8 ,
Issue.1 , pp.16-19, Feb-2020
Online published on Feb 28, 2020
Copyright © Kaushal Kumar, Harshit Kumar, Piyush Singh, Amit Kumar, K.M. Shikha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Kaushal Kumar, Harshit Kumar, Piyush Singh, Amit Kumar, K.M. Shikha, “Biometric Security System for Identification and Verification,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.1, pp.16-19, 2020.
MLA Style Citation: Kaushal Kumar, Harshit Kumar, Piyush Singh, Amit Kumar, K.M. Shikha "Biometric Security System for Identification and Verification." International Journal of Scientific Research in Computer Science and Engineering 8.1 (2020): 16-19.
APA Style Citation: Kaushal Kumar, Harshit Kumar, Piyush Singh, Amit Kumar, K.M. Shikha, (2020). Biometric Security System for Identification and Verification. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 16-19.
BibTex Style Citation:
@article{Kumar_2020,
author = {Kaushal Kumar, Harshit Kumar, Piyush Singh, Amit Kumar, K.M. Shikha},
title = {Biometric Security System for Identification and Verification},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {1},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {16-19},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1687},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1687
TI - Biometric Security System for Identification and Verification
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Kaushal Kumar, Harshit Kumar, Piyush Singh, Amit Kumar, K.M. Shikha
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 16-19
IS - 1
VL - 8
SN - 2347-2693
ER -
Abstract :
This research work has applied for the Biometrics identification System. It is used for security purposes. Biometrics system used for individual identification to scan finger, hand geometry, face recognition, iris retinal scanning, vascular pattern, ear, DNA, Biometrics identification is used for biometric attendance and it used to identify the criminals and decrease the crime rates and terrorism.
Key-Words / Index Term :
Biometric, Verification, Identification, Security
References :
[1] Mandryk, R.L. & Atkins, M.S., “A Fuzzy Phsiological Approach for Continuously Modeling Emotion During Interaction with Play Technologies,” International Journal of Human Computer Studies, Vol.65, Issue.6, pp.329-347, 2007.
[2] Geetika, Manavjeet Kaur, “ Fuzzy Vault with Iris and Retina: A Review,” International Journal of Advanced Research in Computer Science and Software Engineering , Vol.3, Issue.4, pp.15-21, April, 2013.
[3] Nilam Choudhary, Shikhar Agarwal & Geerija Lavania, “Smart Voting System through Facial Recognition,” International Journal of Scientific Research in Computer Science and Engineering , E-ISSN: 2320-7639, Vol.7, Issue.2, pp.7-10, 30th Apr 2019.
[4] Nitin Tiwari, “An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology,” International Journal of Scientific Research in Computer Science and Engineering E-ISSN: 2320-7639, Vol.5, Issue.6, pp.69-74, December 2017.
[5] 1.Wikipedia Pantic, M. & Rothkrantz, L.J.M., 2004. Facial Action Recognition for Facial Expression Analysis from Static Face Images. Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 34(3), pp.1449 - 1461.
[6] Pantic, M. & Rothkrantz, L.J.M., 2004. Facial Action Recognition for Facial Expression Analysis from Static Face Images. Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 34(3), pp.1449 - 1461.
[7] Pantic, M. & Rothkrantz, L.J.M., 2004. Facial Action Recognition for Facial Expression Analysis from Static Face Images. Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 34(3), pp.1449 -1461.
[8] Pantic, M. & Rothkrantz, L.J.M., 2004. Facial Action Recognition for Facial Expression Analysis from Static Face Images. Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 34(3), pp.1449 - 1461
[9] C. S. Chua and R. Jarvis, “Point signatures: A new representation for 3D object recognition,” International Journal of Computer Vision, vol.271, Issue.5, pp.63–85, 1997.
[10] 6. Arulalan.V, Balamurugan.G, “A Survey on Biometric Recognition Techniques,” International Journal of Advanced Research in Computer and Communication Engineering Vol.3, Issue.2, pp.24-28, February, 2014.
[11] Sukhwinder Singh, Ajay Jatav, “A closure looks to Iris Recognition system,” IOSR Journal of Engineering, e-ISSN: 2250-3021, p-ISSN: 2278-8719, Vol.3, Issue.3, pp. 121-126, March, 2013.
[12] Shradha T, Chourasia NI, Chourasia VS, “A review of advancements in biometric systems,” International Journal of Innovative Research in Advanced Engineering Vol.2, Issue.2, pp.187-204, 2015.
[13] George Chellin Chandran. J, Dr. Rajesh. R. S., “Performance Analysis of Multimodal Biometric System Authentication,” International Journal of Computer Science and Network Security, Vol.9, Issue.3, pp.55-59, March, 2009.
[14] Lourde, R.M. and D. Khosla, “Fingerprint identificationin biometric security systems,” International Journal of Computer and Electrical Engineering, Vol.2, Issue.6, pp.852-855, 2010.
[15] Kumar, D. and Y. Ryu, “A brief introduction of biometricsand fingerprint payment technology,” International Journal of Advanced Science and Technology, ISSN: 22076360, Vol.4,Issue.4, pp. 25-38, 2009.
[16] Trivedi JA, “Voice identification system using neuro fuzzy approach,” International Journal of Advanced Research in Computer Science and Technology, Vol.8, Issue.6, pp.1-5, 2014.
[17] D. R. Prithvi, R Madhu, “Recognition Using Secret Key in Iris Feature Extraction and Palm Print Features,” Proceedings of AECE-IRAJ International Conference, Tirupati, India, ISBN: 978-81-927147-9-0, pp.211-217, 14th July 2013.
[18] Kar, B. Kartik, B. Dutta, P.K., “Speech and Face Biometric for Person Authentication,” International Proceedings of IEEE International Conference on Industrial Technology, India, pp.391 – 396, December 2006.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.