Open Access   Article Go Back

Desktop Biometric: The Easy way for Biometric Authentication

Ravinder Kumar1 , Ramneek Kalra2

  1. Department of CSE, HMR Institute of Technology and Management (Affiliated with GGSIPU), Delhi, INDIA.
  2. Department of CSE, HMR Institute of Technology and Management (Affiliated with GGSIPU), Delhi, INDIA.

Correspondence should be addressed to: ravinder_y@yahoo.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 181-186, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i12.181186

Online published on Dec 31, 2017

Copyright © Ravinder Kumar, Ramneek Kalra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ravinder Kumar, Ramneek Kalra, “Desktop Biometric: The Easy way for Biometric Authentication,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.181-186, 2017.

MLA Style Citation: Ravinder Kumar, Ramneek Kalra "Desktop Biometric: The Easy way for Biometric Authentication." International Journal of Computer Sciences and Engineering 5.12 (2017): 181-186.

APA Style Citation: Ravinder Kumar, Ramneek Kalra, (2017). Desktop Biometric: The Easy way for Biometric Authentication. International Journal of Computer Sciences and Engineering, 5(12), 181-186.

BibTex Style Citation:
@article{Kumar_2017,
author = {Ravinder Kumar, Ramneek Kalra},
title = {Desktop Biometric: The Easy way for Biometric Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {181-186},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1600},
doi = {https://doi.org/10.26438/ijcse/v5i12.181186}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i12.181186}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1600
TI - Desktop Biometric: The Easy way for Biometric Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - Ravinder Kumar, Ramneek Kalra
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 181-186
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
834 545 downloads 184 downloads
  
  
           

Abstract

Biometric is widely used as proper authentication of a person in an organization, Institute and at much more places. This is considered as original identification of one by offering different biometric techniques which includes Hand Biometric, Fingerprint Biometric, Face Biometric, Signature Biometric, Ear Recognition and many more. Considerably, every technique of biometric includes one or other negative outcome that enables one to use more technique to develop pure authentication of person. This paper reflects the use of personal fingerprint scanning biometric that gives proper giveaway of features of person’s identification. The proposed research presents the content in very detailed way from introduction to biometric with specifically concentrated to fingerprint biometric and then integrating that real-time data with JAVA based software testing and developing innovative college student attendance system. The benefits of using proposed software give a new way to allot ids to professors and students with automation of sending attendance with customized options for need.

Key-Words / Index Term

Biometric, Real time Attendance, Fingerprint Matching, Person identification, Arduino UNO

References

[1] R. Kumar, "Hand Image Biometric Based Personal Authentication System", Intelligent Techniques in Signal Processing for Multimedia Security, Springer International Publishing, pp. 201-226. 2017.
[2] V. E. Sharapova, O. Ivanova, G. Denis and S. Yuliia, "Web-based application to collect and analyze users data for keystroke biometric authentication," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kyiv, Ukraine, pp. 917-922, 2017
[3] A. Ross, A. K. Jain, "Multimodal biometrics: An overview" Signal Processing Conference, 2004 12th European. IEEE, 2004.
[4] R Kumar, “Fingerprint matching using rotational invariant orientation local binary pattern descriptor and machine learning techniques”, International Journal of Computer Vision and Image Processing (IJCVIP), Vol. 7, No. 4, pp. 51-67, 2017.
[5] R. Kumar, P. Chandra, M. Hanmandlu, “A Robust Fingerprint Matching System Using Orientation Features”, Journal of information processing systems, Vol. 12, No. 1, pp. 83-99, 2016.
[6] N. K. Ratha, K. Karu, S. Chen, and A. K. Jain. "A real-time matching system for large fingerprint databases" Vol. 18, no. 8, 799-813, 1996.
[7] Barman, Subhas, et al. "An efficient fingerprint matching approach based on minutiae to minutiae distance using indexing with effectively lower time complexity." Information Technology (ICIT), 2014 International Conference on. IEEE, 2014.
[8] D. P. Lopresti, D. R. Jarret "The effectiveness of generative attacks on an online handwriting biometric." In AVBPA, pp. 1090-1099, 2005.
[9] K. Karl, C. Vielhauer, T. Scheidat, D. Franke, and J. Dittmann, "Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction" In Communications and Multimedia Security, pp. 178-190, 2010.
[10] P. Yan, K. W. Bowyer, "Biometric recognition using 3D ear shape." IEEE Transactions on pattern analysis and machine intelligence, Vol. 29, No. 8, pp. 1297-1308, 2007.
[11] J. Zuo, N. K. Ratha, J. H. Connell, " Cancelable iris biometric", In Pattern Recognition, 2008. ICPR 2008. 19th International Conference on, pp. 1-4, IEEE, 2008.
[12] H.Geoffrey, L. Deng, D. Yu, G. E. Dahl, A. Mohamed, N. Jaitly, A. Senior", Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups." IEEE Signal Processing Magazine, Vol. 29, No. 6, pp. 82-97, 2012.
[13] R. K. Das, , S. Jelil, S. R. M. Prasanna, "Development of multi-level speech based person authentication system", Journal of Signal Processing Systems, Vol. 88, No. 3, pp. 259-271, 2017.
[14] D. A. Kumar, T. U. Begum, "A Comparative Study on Fingerprint Matching Algorithms for EVM", Journal of Computer Sciences and Applications, Vol. 1, Issue 4, pp. 55-60, 2013.
[15] V. D. Bergh, B. T. Vermeulen, S. Pollin, "Analysis of Harmful Interference to and from Aerial IEEE 802.11 Systems", Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, ACM, pp. 15-19, 2015.
[16] H. H.Teng, S. C. Jo, "Compact optical fingerprint capturing and recognition system", U.S. Patent No. 6,870,946. 22 Mar. 2005.
[17] Y. A. Badamasi, "The working principle of an Arduino." Electronics, Computer and Computation (ICECCO), 2014 11th International Conference on. IEEE, 2014.
[18] A. Ijari, "An Approach of Automated class Attendance using face recognition-Based on haar cascade classifier feature." Imperial Journal of Interdisciplinary Research Vo. 3, No.5, 2017.