SlideShare uma empresa Scribd logo
1 de 33
10/23/2016 1
Content
 Introduction.
 Multimodal Biometric System.
 Verification module.
 Fingerprint verification
 Face recognition
 Speaker verification
 Decision fusion.
 Performance Evaluation
 Databases
 Benchmarks
 Conclusions
10/23/2016 2
Introduction
 Biometric system is often not able to meet the desired
performance requirements.
 In order to enable a biometric system to operate
effectively in different applications and environments,
a multimodal biometric system is preferred.
 In this paper introduce a multimodal biometric system
which integrates fingerprint verification , face
recognition and speaker verification.
10/23/2016 3
Introduction
10/23/2016 4
This system take the advantage of the capabilities of each individual biometrics
Introduction
 System consist of four components:
1. Acquisition module
2. Template database
3. Enrollment module
4. Verification module
10/23/2016 5
10/23/2016 6
Acquisition module Enrollment module
Verification module
Template
Database
Content
 Introduction.
 Multimodal Biometric System.
 Verification module.
 Fingerprint verification
 Face recognition
 Speaker verification
 Decision fusion.
 Performance Evaluation
 Databases
 Benchmarks
 Conclusions
10/23/2016 7
Formulation
Database contain templates : Φ1
, Φ2
,…., Φ 𝑁
Template of user 𝑖 : Φ𝑖
= {Φ𝑖
1 , Φ𝑖
2 , Φ𝑖
3}
Input : Φ0
, 𝐼
10/23/2016 8
fingerprint face speech
{Φ0
1 , Φ0
2 , Φ0
3} User identity
Formulation
𝐼 ∈
𝑤1 , 𝑖𝑓 𝐹 Φ0 , Φ 𝐼 > 𝜖
𝑤2 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝐹 : is the a measuring similarity function
I belong to 𝑤1 : if genuine (true)
I belong to 𝑤2 : if imposter (false)
𝜖 : threshold
10/23/2016 9
Content
 Introduction.
 Multimodal Biometric System.
 Verification module.
 Fingerprint verification
 Face recognition
 Speaker verification
 Decision fusion.
 Performance Evaluation
 Databases
 Benchmarks
 Conclusions
10/23/2016 10
Multimodal Biometric System
 The verification process consists of four stages:
1. Fingerprint verification
2. Face recognition
3. Speaker verification
4. Decision fusion
10/23/2016 11
Fingerprint Verification
10/23/2016 12
Fingerprint Verification
 Fingerprint is the pattern of ridges.
 The two most prominent ridge characteristics, called
minutiae features, are: Ridge ending and Ridge
bifurcation.
10/23/2016 13
Ridge ending Bifurcation
Fingerprint Verification
Steps:
 Minutiae extracting : extract minutiae from input finger
print images.
 Minutiae matching : determine the similarity of two
minutiae patterns.
10/23/2016 14
Fingerprint Verification
𝐹1 Φ0
1, Φ 𝐼
1 =
100𝐶2
𝑃𝑄
 𝐶 : total number of corresponding minutiae pairs
between Φ0
1, Φ 𝐼
1
 𝑃 : total number of minutiae in Φ0
1
 𝑄 : total number of minutiae in Φ 𝐼
1
10/23/2016 15
Face Recognition
10/23/2016 16
Face Recognition
There are two major tasks:
 Face location : finds if there is a face in the input image.
 Face recognition : finds the similarity between the
located face and the stored templates.
10/23/2016 17
Face Recognition
 In our system : eigenface approach is used.
 The eigenface-based face recognition method is
divided into two stages:
1. Training stage.
2. Operational stage.
10/23/2016 18
Face Recognition
1. Training stage :
 set of orthonormal images that best describe the
distribution of the training facial image in a lower
dimensional subspace (eigenspace) is computed.
 The training facial images are projected onto eigenspace
to generate the representations of the facial images in the
eigenspace.
10/23/2016 19
Face Recognition
2. Operational stage : detected facial image is projected
onto the same eigenspace , and the similarity between the
input facial image and the template is computed in the
eigenspace.
𝐹2 Φ0
2, Φ 𝐼
2 = − Φ 𝐼
2 − Φ0
2
10/23/2016 20
Speaker Verification
10/23/2016 21
Speaker Verification
 Text-dependent system : system knows text spoken by
user.
 Uses left to right Hidden Markov Model (HMM) of the
10th order linear prediction coefficients (LPC) of the
cepstrum to make a verification.
10/23/2016 22
Speaker Verification
𝐹3 Φ0
3, Φ 𝐼
3 = max
𝑖1……𝑖 𝐿
{
𝑘=1
𝐿
𝑞 𝑠𝑖𝑘|𝑡𝑖𝑘 𝑝 𝑡𝑖𝑘|𝑡𝑖𝑘−1 }
 L : feature vector length.
 𝑞 𝑠𝑖𝑘|𝑡𝑖𝑘 : probability of transition to visible state
depends on current hidden state.
 𝑝 𝑡𝑖𝑘|𝑡𝑖𝑘−1 : probability of a state for each time step
depend only on the previous state
10/23/2016 23
Decision Fusion
10/23/2016 24
Decision Fusion
 The final decision made by our system is based on the
integration of the decision made by the tree
biometrics.
 The output of each module is a similarity value.
 𝑋1, 𝑋2, 𝑋3 are variables used to indicate the similarity
between input and template.
10/23/2016 25
Decision Fusion
 Classification:
𝑋1
0
, 𝑋2
0
, 𝑋3
0
∈
𝑤1 , 𝑖𝑓
𝑝1 𝑋1
0
, 𝑋2
0
, 𝑋3
0
𝑤1)
𝑝2 𝑋1
0
, 𝑋2
0
, 𝑋3
0
𝑤2)
> λ
𝑤2 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
10/23/2016 26
Content
 Introduction.
 Multimodal Biometric System.
 Verification module.
 Fingerprint verification
 Face recognition
 Speaker verification
 Decision fusion.
 Performance Evaluation
 Databases
 Benchmarks
 Conclusions
10/23/2016 27
Database
 A training database of 50 users was collected.
 For each user :
o 10 fingerprint images using optical fingerprint scanner.
o 9 face images using Panasonic video camera.
o 12 speech samples using Laptec microphone.
10/23/2016 28
Benchmark
 In out test, a total of 36,796 impostor and 358 genuine
were generated and tested.
 We can conclude that the integration of fingerprint ,
face and speech leads to an improvement in
verification performance.
10/23/2016 29
Benchmark (ROC)
10/23/2016 30
false acceptance rate
authenticateacceptancerate
Content
 Introduction.
 Multimodal Biometric System.
 Verification module.
 Fingerprint verification
 Face recognition
 Speaker verification
 Decision fusion.
 Performance Evaluation
 Databases
 Benchmarks
 Conclusions
10/23/2016 31
Conclusion
 Multimodal biometric technique which combines multiple
biometrics in making a personal identification can be used to
overcome the limitations of individual biometrics.
 If a user can not provide a good fingerprint images ( due to dry
fingers , cuts, etc.) then face and voice may be better biometric
indicators.
 These biometrics indicators complement one another in their
advantages and strengths.
10/23/2016 32
10/23/2016 33

Mais conteúdo relacionado

Mais procurados

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Face detection ppt
Face detection pptFace detection ppt
Face detection pptPooja R
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 

Mais procurados (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 

Destaque

Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 

Destaque (9)

Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Semelhante a Paper multi-modal biometric system using fingerprint , face and speech

FPGA-Based Contact Lenses Try-On System
FPGA-Based Contact Lenses Try-On SystemFPGA-Based Contact Lenses Try-On System
FPGA-Based Contact Lenses Try-On Systemjournal ijrtem
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
How do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guideHow do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guideMarcus Botacin
 
IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...
IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...
IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...IRJET Journal
 
IRJET - Cognitive based Emotion Analysis of a Child Reading a Book
IRJET -  	  Cognitive based Emotion Analysis of a Child Reading a BookIRJET -  	  Cognitive based Emotion Analysis of a Child Reading a Book
IRJET - Cognitive based Emotion Analysis of a Child Reading a BookIRJET Journal
 
JiyongKim_HHMI report
JiyongKim_HHMI reportJiyongKim_HHMI report
JiyongKim_HHMI reportJiyong Kim
 
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...IRJET Journal
 
Voice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix FactorizationVoice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix FactorizationIRJET Journal
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
17 icos2019(2)
17 icos2019(2)17 icos2019(2)
17 icos2019(2)arafah78
 
Full biometric eye tracking
Full biometric eye trackingFull biometric eye tracking
Full biometric eye trackingVinoth Barithi
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...IRJET Journal
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...VijiPriya Jeyamani
 
Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...IJECEIAES
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
 
AN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMAN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMcseij
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)IRJET Journal
 

Semelhante a Paper multi-modal biometric system using fingerprint , face and speech (20)

Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
 
FPGA-Based Contact Lenses Try-On System
FPGA-Based Contact Lenses Try-On SystemFPGA-Based Contact Lenses Try-On System
FPGA-Based Contact Lenses Try-On System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
How do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guideHow do we detect malware? A step-by-step guide
How do we detect malware? A step-by-step guide
 
IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...
IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...
IRJET- Characteristics and Mood Prediction of Human by Signature and Facial E...
 
IRJET - Cognitive based Emotion Analysis of a Child Reading a Book
IRJET -  	  Cognitive based Emotion Analysis of a Child Reading a BookIRJET -  	  Cognitive based Emotion Analysis of a Child Reading a Book
IRJET - Cognitive based Emotion Analysis of a Child Reading a Book
 
JiyongKim_HHMI report
JiyongKim_HHMI reportJiyongKim_HHMI report
JiyongKim_HHMI report
 
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
 
Voice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix FactorizationVoice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix Factorization
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
17 icos2019(2)
17 icos2019(2)17 icos2019(2)
17 icos2019(2)
 
Full biometric eye tracking
Full biometric eye trackingFull biometric eye tracking
Full biometric eye tracking
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
 
Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...Analysis of student sentiment during video class with multi-layer deep learni...
Analysis of student sentiment during video class with multi-layer deep learni...
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
AN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMAN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEM
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)
 

Mais de Aalaa Khattab

multi-view vehicle detection and tracking in
multi-view vehicle detection and tracking inmulti-view vehicle detection and tracking in
multi-view vehicle detection and tracking inAalaa Khattab
 
Multi view vehicle detection and tracking in crossroads
Multi view vehicle detection and tracking in crossroadsMulti view vehicle detection and tracking in crossroads
Multi view vehicle detection and tracking in crossroadsAalaa Khattab
 
A multi modal biometric system using fingerprint , face and speech
A multi modal biometric system using fingerprint , face and speechA multi modal biometric system using fingerprint , face and speech
A multi modal biometric system using fingerprint , face and speechAalaa Khattab
 
Low level feature extraction - chapter 4
Low level feature extraction - chapter 4Low level feature extraction - chapter 4
Low level feature extraction - chapter 4Aalaa Khattab
 
Multi spectral imaging
Multi spectral imagingMulti spectral imaging
Multi spectral imagingAalaa Khattab
 

Mais de Aalaa Khattab (6)

Vuzix i wear vr920
Vuzix i wear vr920Vuzix i wear vr920
Vuzix i wear vr920
 
multi-view vehicle detection and tracking in
multi-view vehicle detection and tracking inmulti-view vehicle detection and tracking in
multi-view vehicle detection and tracking in
 
Multi view vehicle detection and tracking in crossroads
Multi view vehicle detection and tracking in crossroadsMulti view vehicle detection and tracking in crossroads
Multi view vehicle detection and tracking in crossroads
 
A multi modal biometric system using fingerprint , face and speech
A multi modal biometric system using fingerprint , face and speechA multi modal biometric system using fingerprint , face and speech
A multi modal biometric system using fingerprint , face and speech
 
Low level feature extraction - chapter 4
Low level feature extraction - chapter 4Low level feature extraction - chapter 4
Low level feature extraction - chapter 4
 
Multi spectral imaging
Multi spectral imagingMulti spectral imaging
Multi spectral imaging
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Paper multi-modal biometric system using fingerprint , face and speech

  • 2. Content  Introduction.  Multimodal Biometric System.  Verification module.  Fingerprint verification  Face recognition  Speaker verification  Decision fusion.  Performance Evaluation  Databases  Benchmarks  Conclusions 10/23/2016 2
  • 3. Introduction  Biometric system is often not able to meet the desired performance requirements.  In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.  In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification. 10/23/2016 3
  • 4. Introduction 10/23/2016 4 This system take the advantage of the capabilities of each individual biometrics
  • 5. Introduction  System consist of four components: 1. Acquisition module 2. Template database 3. Enrollment module 4. Verification module 10/23/2016 5
  • 6. 10/23/2016 6 Acquisition module Enrollment module Verification module Template Database
  • 7. Content  Introduction.  Multimodal Biometric System.  Verification module.  Fingerprint verification  Face recognition  Speaker verification  Decision fusion.  Performance Evaluation  Databases  Benchmarks  Conclusions 10/23/2016 7
  • 8. Formulation Database contain templates : Φ1 , Φ2 ,…., Φ 𝑁 Template of user 𝑖 : Φ𝑖 = {Φ𝑖 1 , Φ𝑖 2 , Φ𝑖 3} Input : Φ0 , 𝐼 10/23/2016 8 fingerprint face speech {Φ0 1 , Φ0 2 , Φ0 3} User identity
  • 9. Formulation 𝐼 ∈ 𝑤1 , 𝑖𝑓 𝐹 Φ0 , Φ 𝐼 > 𝜖 𝑤2 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐹 : is the a measuring similarity function I belong to 𝑤1 : if genuine (true) I belong to 𝑤2 : if imposter (false) 𝜖 : threshold 10/23/2016 9
  • 10. Content  Introduction.  Multimodal Biometric System.  Verification module.  Fingerprint verification  Face recognition  Speaker verification  Decision fusion.  Performance Evaluation  Databases  Benchmarks  Conclusions 10/23/2016 10
  • 11. Multimodal Biometric System  The verification process consists of four stages: 1. Fingerprint verification 2. Face recognition 3. Speaker verification 4. Decision fusion 10/23/2016 11
  • 13. Fingerprint Verification  Fingerprint is the pattern of ridges.  The two most prominent ridge characteristics, called minutiae features, are: Ridge ending and Ridge bifurcation. 10/23/2016 13 Ridge ending Bifurcation
  • 14. Fingerprint Verification Steps:  Minutiae extracting : extract minutiae from input finger print images.  Minutiae matching : determine the similarity of two minutiae patterns. 10/23/2016 14
  • 15. Fingerprint Verification 𝐹1 Φ0 1, Φ 𝐼 1 = 100𝐶2 𝑃𝑄  𝐶 : total number of corresponding minutiae pairs between Φ0 1, Φ 𝐼 1  𝑃 : total number of minutiae in Φ0 1  𝑄 : total number of minutiae in Φ 𝐼 1 10/23/2016 15
  • 17. Face Recognition There are two major tasks:  Face location : finds if there is a face in the input image.  Face recognition : finds the similarity between the located face and the stored templates. 10/23/2016 17
  • 18. Face Recognition  In our system : eigenface approach is used.  The eigenface-based face recognition method is divided into two stages: 1. Training stage. 2. Operational stage. 10/23/2016 18
  • 19. Face Recognition 1. Training stage :  set of orthonormal images that best describe the distribution of the training facial image in a lower dimensional subspace (eigenspace) is computed.  The training facial images are projected onto eigenspace to generate the representations of the facial images in the eigenspace. 10/23/2016 19
  • 20. Face Recognition 2. Operational stage : detected facial image is projected onto the same eigenspace , and the similarity between the input facial image and the template is computed in the eigenspace. 𝐹2 Φ0 2, Φ 𝐼 2 = − Φ 𝐼 2 − Φ0 2 10/23/2016 20
  • 22. Speaker Verification  Text-dependent system : system knows text spoken by user.  Uses left to right Hidden Markov Model (HMM) of the 10th order linear prediction coefficients (LPC) of the cepstrum to make a verification. 10/23/2016 22
  • 23. Speaker Verification 𝐹3 Φ0 3, Φ 𝐼 3 = max 𝑖1……𝑖 𝐿 { 𝑘=1 𝐿 𝑞 𝑠𝑖𝑘|𝑡𝑖𝑘 𝑝 𝑡𝑖𝑘|𝑡𝑖𝑘−1 }  L : feature vector length.  𝑞 𝑠𝑖𝑘|𝑡𝑖𝑘 : probability of transition to visible state depends on current hidden state.  𝑝 𝑡𝑖𝑘|𝑡𝑖𝑘−1 : probability of a state for each time step depend only on the previous state 10/23/2016 23
  • 25. Decision Fusion  The final decision made by our system is based on the integration of the decision made by the tree biometrics.  The output of each module is a similarity value.  𝑋1, 𝑋2, 𝑋3 are variables used to indicate the similarity between input and template. 10/23/2016 25
  • 26. Decision Fusion  Classification: 𝑋1 0 , 𝑋2 0 , 𝑋3 0 ∈ 𝑤1 , 𝑖𝑓 𝑝1 𝑋1 0 , 𝑋2 0 , 𝑋3 0 𝑤1) 𝑝2 𝑋1 0 , 𝑋2 0 , 𝑋3 0 𝑤2) > λ 𝑤2 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 10/23/2016 26
  • 27. Content  Introduction.  Multimodal Biometric System.  Verification module.  Fingerprint verification  Face recognition  Speaker verification  Decision fusion.  Performance Evaluation  Databases  Benchmarks  Conclusions 10/23/2016 27
  • 28. Database  A training database of 50 users was collected.  For each user : o 10 fingerprint images using optical fingerprint scanner. o 9 face images using Panasonic video camera. o 12 speech samples using Laptec microphone. 10/23/2016 28
  • 29. Benchmark  In out test, a total of 36,796 impostor and 358 genuine were generated and tested.  We can conclude that the integration of fingerprint , face and speech leads to an improvement in verification performance. 10/23/2016 29
  • 30. Benchmark (ROC) 10/23/2016 30 false acceptance rate authenticateacceptancerate
  • 31. Content  Introduction.  Multimodal Biometric System.  Verification module.  Fingerprint verification  Face recognition  Speaker verification  Decision fusion.  Performance Evaluation  Databases  Benchmarks  Conclusions 10/23/2016 31
  • 32. Conclusion  Multimodal biometric technique which combines multiple biometrics in making a personal identification can be used to overcome the limitations of individual biometrics.  If a user can not provide a good fingerprint images ( due to dry fingers , cuts, etc.) then face and voice may be better biometric indicators.  These biometrics indicators complement one another in their advantages and strengths. 10/23/2016 32