CFP last date
15 May 2024
Reseach Article

An Access Control System using Bimodal Biometrics

by A.S. Falohun, O.D. Fenwa, A.O. Oke
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 5
Year of Publication: 2016
Authors: A.S. Falohun, O.D. Fenwa, A.O. Oke
10.5120/ijais2016451510

A.S. Falohun, O.D. Fenwa, A.O. Oke . An Access Control System using Bimodal Biometrics. International Journal of Applied Information Systems. 10, 5 ( February 2016), 41-47. DOI=10.5120/ijais2016451510

@article{ 10.5120/ijais2016451510,
author = { A.S. Falohun, O.D. Fenwa, A.O. Oke },
title = { An Access Control System using Bimodal Biometrics },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2016 },
volume = { 10 },
number = { 5 },
month = { February },
year = { 2016 },
issn = { 2249-0868 },
pages = { 41-47 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number5/865-2016451510/ },
doi = { 10.5120/ijais2016451510 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:02:38.355440+05:30
%A A.S. Falohun
%A O.D. Fenwa
%A A.O. Oke
%T An Access Control System using Bimodal Biometrics
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 5
%P 41-47
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's society, advances in technology have made life easier by providing us with higher levels of knowledge through the invention of different devices. However, each technological innovation harbours the potential of hidden threats to its users. One major threat is theft of private or personal data, information and properties. As digital data become more prevalent, users try to secure their information with highly encrypted passwords and ID cards. However, the misuse and theft of these security measures are also on the rise, taking advantage of security flaws in ID cards result in cards being duplicated or counterfeited and being misused. This increasing battle with cyber security has led to the birth of biometric security systems. In this work, iris and fingerprint samples were acquired using the iris camera and Secugen pattern extracting sensor respectively. The pre-processing of the acquired images were done, after which templates were generated and stored. Verification of the acquired images was done and voting fusion techniques was used to fuse the information presented by individual modalities. A door prototype was constructed with electric circuit design and an iris and fingerprint recognition software development using MatLab. was interfaced with the door prototype. The developed system was tested widely with the pre-enrolled subjects as well as freshly introduced subjects. The red light indicator showed the hardware and software connection and door lock .With template match, the door opens ( green light indicator comes on accompanied with the buzzer), and with non-match, the door is not opened (red light remains and the buzzer is off).

References
  1. Anil J., Lin H., & Yatin K. "Multimodal Biometric System using Fingerprint, Face and Speech." Michigan State University MSU-CPS-98. 32. ps.
  2. Babak Ganji 2005. Civil–Military Relations, State Strategies and Presidential Elections in Iran, Camberley: Conflict Studies Research Centre, Defence Academy of the United Kingdom. 42. Ibid., pp. 75–76.
  3. Daugman J. 1993 “High Confidence Visual Recognition of persons by a test of Statistical independence”. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1148 – 1161.
  4. Falohun, A.S. 2012 "Development of a Feature Extraction Method for Iris Recognition using Enhanced Inverse Analytical Fourier-Mellin Transform". Unpublished Ph.D. Thesis. April 2012.
  5. Falohun, A.S., Omidiora, E.O., Fakolujo, O.A., Afolabi, O.A., Oke, A.O., Ajala, F.A. 2012. "Development of a Biometrically-Controlled Door System (Using Iris), with power Backup." American Journal of Scientific and Industrial Research., vol 3, No 4, pp 203-207.
  6. Gray Ross 2001 “Biometrics and Technologies and Economic Indications”, International Conference on image and graphics 12-18, Ohio, USA.
  7. http://findbiometrics.com/solutions/multimodal-biometrics/. 2014 Find biometrics retrieved on 14 january 2016.
  8. Jain A.K, Ross A, Prabhakar S 2004;"An introduction to biometric recognition", GVIP Journal 14(1): 4 – 20
  9. Jain A.K, Ross A, Pankanti S. 2006 "Biometrics: a tool for information security", Keesing Journal 1(2): 125 – 143
  10. Kresimir D. and Mislav. G. 2004. "A survey of biometric recognition methods."Proceedings of the 46th International Symposium Electronic in Marine (ELMAR). pp: 16-18.
  11. Lupu C and Lupu V. 2007 Car Access Using Multimodal Biometrics ‘Computational Computer Intelligence and Intelligent Informatics.368-377.
  12. Maestre, Sandra Sean Nichols 2009. "DNA Biometrics",
  13. NSTC subcommittee 2006. “Biometric Overview”, www. Biometricscatalog.org/NSTCSubcommitee
  14. Ramachandra A. C., Abhilash S. K., Raja K. B., Venugopal K. R., Patnaik L. M. 2012. Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques IOSR Journal of Computer Engineering (IOSRJCE) Vol 3, Issue 3 (July-Aug. 2012), PP 39-46
  15. Samad and Hussain. 2006 “Introduction to Fusion Techniques”, Rome Air development center, RACDC-TR-81-161 final technical report.
  16. Schuckers Michael E. 2001 "Some Statistical Aspects of Biometric Identification Device Performance" Some Statistical Aspects of Biometric Identification Device Performance Submitted to Stats Magazine Department of Statistics West Virginia University.
  17. Xie Mei 2006. “Iris Recognition Techniques” Journal on Electronic Science and Technology of China 4(3): 219-224.
Index Terms

Computer Science
Information Sciences

Keywords

Fourier-Mellin Transform Bimodal Multimodal Verification Authentication