Open Access   Article Go Back

Enhanced PAD security Mechanism Using Fingerprint and Face Scanning

Surinder Pal Kaur1 , Anil Kumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 506-509, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.506509

Online published on Mar 31, 2019

Copyright © Surinder Pal Kaur, Anil Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Surinder Pal Kaur, Anil Kumar, “Enhanced PAD security Mechanism Using Fingerprint and Face Scanning,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.506-509, 2019.

MLA Style Citation: Surinder Pal Kaur, Anil Kumar "Enhanced PAD security Mechanism Using Fingerprint and Face Scanning." International Journal of Computer Sciences and Engineering 7.3 (2019): 506-509.

APA Style Citation: Surinder Pal Kaur, Anil Kumar, (2019). Enhanced PAD security Mechanism Using Fingerprint and Face Scanning. International Journal of Computer Sciences and Engineering, 7(3), 506-509.

BibTex Style Citation:
@article{Kaur_2019,
author = {Surinder Pal Kaur, Anil Kumar},
title = {Enhanced PAD security Mechanism Using Fingerprint and Face Scanning},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {506-509},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3870},
doi = {https://doi.org/10.26438/ijcse/v7i3.506509}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.506509}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3870
TI - Enhanced PAD security Mechanism Using Fingerprint and Face Scanning
T2 - International Journal of Computer Sciences and Engineering
AU - Surinder Pal Kaur, Anil Kumar
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 506-509
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
300 221 downloads 116 downloads
  
  
           

Abstract

Biometric techniques are utilized to provide authentication to prevent unauthorized access and it handle physical or behavioral that identifies the identity of a person. In our proposed paper the security mechanism named PAD is proposed that provides more accuracy than the existing system. In this technique first of all sensor capture the biometric images and then it is utilized to identify one or more characteristics of a person like face, fingerprint and other feature. Results section shows that it gives better accuracy and recognition rate utilizes various combination of biometric technique.

Key-Words / Index Term

Biometric, PAD security mechanism, Security, Sensors

References

[1] R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah, K. N. Qureshi, F. Computing, and J. Bahru, “Security Issues and Attacks in Wireless Sensor Network,” World Appl. Sci. J., vol. 30, no. 10, pp. 1224–1227, 2018.
[2] D. Karaboga, S. Aslan, and Ü. Ñ. Ò. Ö. Ò. Ü. Ñ. Ü. Ü. Ñ. Ò, “A New Emigrant Creation Strategy for Parallel Artificial Bee Colony Algorithm ØÒ ××,” pp. 689–694.
[3] M. A. Jabbar, B. L. Deekshatulu, and P. Chandra, “Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm,” Procedia Technol., vol. 10, pp. 85–94, 2013.
[4] X. Yang and A. Hossein Gandomi, “Bat algorithm: a novel approach for global engineering optimization,” Eng. Comput., vol. 29, no. 5, pp. 464–483, 2012.
[5] F. Tashtarian, M. H. Yaghmaee Moghaddam, K. Sohraby, and S. Effati, “On Maximizing the Lifetime of Wireless Sensor Networks in Event-Driven Applications With Mobile Sinks,” IEEE Trans. Veh. Technol., vol. 64, no. 7, pp. 3177–3189, 2015.
[6] “FaceRecognition.” .
[7] P. Anitha, K. N. Rao, V. Rajasekhar, and C. H. Krishna, “Security for Biometrics Protection between Watermarking and Visual Cryptography,” IEEE Access, no. March, pp. 64–71, 2017.
[8] W. Abdul, Z. Ali, S. Ghouzali, M. S. Hossain, and S. Member, “Biometric Security Through Visual Encryption for Fog Edge Computing,” IEEE Access, vol. 5, 2017.
[9] W. L. Woo, S. Member, and J. A. Chambers, “A Framework for Iris Biometrics Protection : A Marriage between Watermarking and Visual Cryptography,” vol. 3536, no. c, pp. 1–13, 2016.
[10] A. Jameer Basha, V. Palanisamy, and T. Purusothaman, “Efficient multimodal biometric authentication using fast fingerprint verification and enhanced iris features,” J. Comput. Sci., vol. 7, no. 5, pp. 698–706, 2011.
[11] L. R. Haddada, B. Dorizzi, and N. Essoukri Ben Amara, “Watermarking signal fusion in multimodal biometrics,” Int. Image Process. Appl. Syst. Conf. IPAS 2014, 2014.
[12] N. Dey, “Motion Detection and Tracking in Video Processing Applications ( Preface ),” IEEE Access, no. September, 2016.
[13] R. Snehkunj, A. N. Jani, and N. N. Jani, “Brain MRI / CT Images Feature Extraction to Enhance Abnormalities Quantification,” Springer Int. Publ., vol. 11, no. January, pp. 1–10, 2018.
[14] L. Best-Rowden, H. Han, C. Otto, B. F. Klare, and A. K. Jain, “Unconstrained face recognition: Identifying a person of interest from a media collection,” IEEE Trans. Inf. Forensics Secur., vol. 9, no. 12, pp. 2144–2157, 2014.
[15] P. Naraei, V. Street, V. Street, and V. Street, “Application of Multilayer Perceptron Neural Networks and Support Vector Machines in Classification of Healthcare Data,” IEEE Access, no. December, pp. 848–852, 2016.
[16] A. V. Flevaris, A. Martínez, and S. A. Hillyard, “Attending to global versus local stimulus features modulates neural processing of low versus high spatial frequencies: An analysis with event-related brain potentials,” Front. Psychol., vol. 5, no. APR, pp. 1–11, 2014.
[17] S. Africa, “From Local to Global Processing: The Development of Illusory Contour Perception,” vol. 4, no. 11, pp. 38–55, 2017.