Multi-Biometric System for High Security Applications
Mani Surya Sava1, Rakesh Yadav2, Ramakrishna Savirigana3, Nivas Simhadri4, Kathirvelu M5
1Mani Surya Sava, Department of ECE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
2Kathirvelu M, Department of ECE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
3Rakesh Yadav, Department of ECE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
4Ramakrishna Savirigana, Department of ECE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
5Nivas Simhadri, Department of ECE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
Manuscript received on 05 May 2019 | Revised Manuscript received on 17 May 2019 | Manuscript Published on 23 May 2019 | PP: 615-620 | Volume-7 Issue-6S5 April 2019 | Retrieval Number: F11080476S519/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Iris recognition and face recognition systems are thought of because of the most authentic and precise biometric systems accessible up too now. Some edges embody protection, speed, accuracy, quantifiability, and stability. This paper is concentrated on security in jammed places (like malls, airports, schools, colleges) and high-security places (like analysis centers, border security). This system uses a contactless system from a so much distance. Most of the current security systems are inaccurate and it takes an excessive amount of time for verification. It becomes harassing for the commoner to travel through such systems. The projected system is economical and efficient. The main beneficiation of this combination is to make amends for errors in facial feature detection because of occlusions, cause, and illumination change, we have tendency to projected to extract HOG descriptors from an everyday grid. Other will be to establish the need for performing arts featuring choice to remove redundant and extraneous options to form the classification method less vulnerable to overfitting. Once an individual enters the zone, continuous snapshots will be taken with the help of camera associated sent to the code to be study and estimate with existing information of trustworthy folks.
Keywords: Iris Recognition, Face Recognition, Biometric Systems, HOG Descriptors.
Scope of the Article: Plant Cyber Security