An Empirical Investigation of Human Identity Verification Methods
DOI:
https://doi.org/10.32628/IJSRSET2310012Keywords:
Biometrics System, Recognition Techniques, Biometric Databases, Face Recognition, Fingerprint, Hand Gesture, Gait Recognition.Abstract
A recognition technique is essential in practically every industry in the current digital era. It has several advantages and may be used for security, identification, and authentication. The relevance of access control systems based on biometrics has grown in recent years since they have the ability to address the majority of the shortcomings of existing security systems. Automated biometric systems for human identification take a measurement of the body's "signature," compare it to a database, and make an application-specific determination. These biometric methods for personal verification and identification are based on physiological or behavioral traits that are usually recognizable, despite changing over time, such as fingerprints, hand geometry, the face, voice, lip movement, gait, and iris patterns. The purpose of this study is to conduct a thorough literature review in order to pinpoint the most well-known recognition techniques, applications, and obstacles.
References
- Y Tian, "Artificial Intelligence Image Recognition Method Based on Convolutional Neural Network Algorithm[J]", IEEE Access, vol. PP, no. 99, pp. 1-1, 2020
- Ali Mir Arif Mir Asif , Shaikh Abdul Hannan, Dr. Yusuf Perwej, Mane Arjun Vithalrao, “An Overview and Applications of Optical Character Recognition”, Journal of Advance Research In Science And Engineering (IJARSE), India, ISSN 2319-8346 (P), ISSN-2319-8354(E), Volume 3, Issue 7, Pages 261- 274, 2014
- Aparna Trivedi, Chandan Mani Tripathi, Dr. Yusuf Perwej, Ashish Kumar Srivastava, Neha Kulshrestha, “Face Recognition Based Automated Attendance Management System” , International Journal of Scientific Research in Science and Technology(IJSRST), Volume 9, Issue 1, Pages 261-268, 2022, DOI: 10.32628/IJSRST229147
- Sharkas, M. Abou Elenien, Eigenfaces vs. Fisherfaces vs. ICA for Face Recognition; A Comparative Study, 9th International Conference on Signal Processing, 2008, ICSP 2008., pp.914919, 2008
- F. Ozgul, C. Atzenbeck, A. Celik and Z. Erdem, "Incorporating data sources and methodologies for crime data mining", Intelligence and Security Informatics (ISI) 2011 IEEE International Conf., pp. 176-180, 2011
- Yusuf Perwej, Shaikh Abdul Hannan, Nikhat Akhtar, “The State-of-the-Art Handwritten Recognition of Arabic Script Using Simplified Fuzzy ARTMAP and Hidden Markov Models”, International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Issue 8, Pages 26 - 32, 2014
- Jung-Hoon Lee, Kyeongrok Kim, Jae-Hyun Kim, "Design of CycleGAN model for SAR image colorization", 2021 IEEE VTS 17th Asia Pacific Wireless Communications Symposium (APWCS), pp.1-5, 2021
- L. Ma, T. Tan, Y. Wang, and D. Zhang, “Efficient iris recognition by characterizing key local variations,” IEEE Trans. Image Process., vol. 13, pp. 739–750, 2004.
- Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “The Kingdom of Saudi Arabia Vehicle License Plate Recognition using Learning Vector Quantization Artificial Neural Network”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 98, No.11, Pages 32 – 38, July 2014, DOI: 10.5120/17230-7556
- Parwej D. 2013. The state of the art recognize in arabic script through combination of online and offline. International Journal of Computer Science and Telecommunications, 4(3): 60-66, 2013
- Parwej, F.: English sentence recognition using artificial neural network through mouse-based gestures. arXiv preprint arXiv:1301.4659 , 2013
- Dipietro, L.; Sabatini, A.M.; Member, S.; Dario, P. A survey of glove-based systems and their applic.. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev, 38, 461–482, 2008
- Yusuf Perwej, Firoj Parwej, “Perceptual Evolution of Playout Buffer Algorithm for Enhancing Perceived Quality of Voice Transmission over IP”, International Journal of Mobile Network Communications & Telematics (IJMNCT), Academy & Industry Research Collaboration Center (AIRCC), USA, Volume 2, No. 2, Pages 1- 19, 2012, DOI: 10.5121/ijmnct.2012.2201
- P. V. Benos, A. S. Lapedes and Gary D. Stormo, "Is there a code for protein-DNA recognition? Probab(ilistical)ly?", BioEssays, vol. 24, pp. 466-475, 2002
- K. Yanai and Y. Kawano, "Food image recognition using deep convolutional network with pre-training and fine-tuning", 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1-6, 2015
- Deshpande, N. T., & Ravishankar, S., Face Detection and Recognition using Viola-Jones algorithm and Fusion of PCA and ANN. Advances in Computational Sciences and Technology, 10(5), 1173- 1189, 2017
- Firoj P An empirical evaluation of off-line Arabic handwriting and printed characters recognition system. Int J Comput Sci, (9), 2012
- Bakhshi, Y., Kaur, S. and Verma, P.,. An Improvement in Face Recognition for Invariant Faces. 6(2), pp. 423-426, 2016
- Poon, B., Amin, M.A. and Yan, H., 2016. Improved Methods on PCA Based Human Face Recognition for Distorted Images. In Proceedings of the International MultiConference of Engineers and Computer Scientists (1).
- Siswanto, Adrian Rhesa Septian, Anto Satriyo Nugroho, and Maulahikmah Galinium. "Implementation of face recognition algorithm for biometrics based time attendance system." 2014 International Conference on ICT For Smart Society (ICISS). IEEE, 2014.
- Lukas, Samuel, et al. "Student attendance system in classroom using face recognition technique." 2016 Information and Communication Technology Convergence (ICTC). IEEE, 2016.
- Yusuf Perwej , Firoj Parwej, Asif Perwej, “Copyright Protection of Digital Images Using Robust Watermarking Based on Joint DLT and DWT ”, International Journal of Scientific & Engineering Research (IJSER), France, ISSN 2229-5518, Volume 3, Issue 6, Pages 1- 9, 2012
- Yusuf Perwej, Asif Perwej, Firoj Parwej, “An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, International journal of Multimedia & Its Applications (IJMA), Academy & Industry Research Collaboration Center (AIRCC) , USA , Volume 4, No.2, Pages 21- 38, 2012, DOI: 10.5121/ijma.2012.4202
- Asif Perwej, Dr. Yusuf Perwej, Nikhat Akhtar, and Firoj Parwej, “A FLANN and RBF with PSO Viewpoint to Identify a Model for Competent Forecasting Bombay Stock Exchange”, COMPUSOFT, SCOPUS, International Journal of Advanced Computer Technology, 4 (1), Volume-IV, Issue-I, Pages 1454-1461, 2015, DOI: 10.6084/ijact.v4i1.60
- A. Radman, K. Jumari, N. Zainal,’ Fast and reliable iris segmentation algorithm’, IET Image Process.,Vol.7, Iss. 1, pp. 42–49, 2013.
- E. Elfakhrany,Ben Bella S. Tawfik ‘IRIS Recognition using Conventional Approach’ IEEE 9th international colloquium on signal processing and its applications, pp-89-94,8 - 10 mac., Kuala Lumpur, Malaysia, 2013
- Adams Wai-Kin Kong ,’Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security Implications IEEE Transactions On Image Processing, Vol. 22, No. 3,pp- 1148-1160, March 2013.
- Claudio A. Perez, Vanel A. Lazcano, and Pablo A. Estevez, ’Real-Time Iris Detection on Coronal-Axis-Rotated Faces’, IEEE Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews,Pp-971-978, Vol. 37, No. 5, September 2007 .
- Krevelen, D. W. F. V., Poelman, R. A Survey of Augmented Reality Technologies, applications and limitation. The Int. Journal of Virtual Reality, vol. 9 9(2), 2010, pp. 1-20.
- Mitra, S., Acharya, T., Gesture Recognition: A survey. IEEE Transactions on Systems. Man and Cybernetics (SMC) - Part C: App. and Reviews, vol. 37(3), 2007, pp. 211-324.
- Chai, Xiujuan, Kongqiao Yikai, Wang, Fang. Robust hand gesture analysis and application in gallery browsing. In Proceeding of ICME, New York, 2009, pp. 938-94.
- Pavlovic, V., Sharma, R., Huang, T.S. Visual interpretation of hand gestures for human-computer interaction: A review. IEEE Trans. on Pattern Analysis and Machine Intelligence (PAMI), vol. 7(19), , 1997, pp. 677–695.
- M. Mohanty and W. Yaqub, "Seamless authentication for online teaching and meeting," 2020 IEEE Sixth International Conf.on Multimedia Big Data (BigMM), 2020, pp. 120-124.
- Xu, Z., Xiang, C., Wen-hui, W. Ji-hai,, Y., Lantz, V., Kong-qiao, W. Hand Gesture Recognition and Virtual Game Control Based on 3D Accelerometer and EMG Sensors. In Proceedings of IUI’09, , 2009, pp. 401-406.
- Lee, C. S., Ghyme, S. W., Park, C. J., Wohn. K. The Control of avatar motion using hand gesture. In Proc. of Virtual Reality Software and tech. (VRST), 1998, pp. 59-65.
- S. Bengio and J. Mariethoz, Biometric Person Authentication IS A Multiple Classifier Problem, Google Inc, Mountain View, CA, USA, , IDIAP Research Institute, Martigny, Switzerland
- Biometric technology, Hand Geometry Identification Technology, www.biometricvision.com
- L. Yuan, Z. Mu, and Z. Xu, Using Ear Biometrics for Personal Recognition, School of Information Engineering, Univ. of Science and Technology Beijing. Beijing 100083
- Yusuf Perwej, Dr. Ashish Chaturvedi, “Machine Recognition of Hand Written Characters using Neural Networks”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 14, No. 2, Pages 6- 9, 2011, DOI: 10.5120/1819-2380
- K. L. Kabir et al., "Projection-based features: A superior domain for handwritten Bangla basic characters recognition", 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1-7, 2015
- Li, "An Iris Recognition Algorithm Based on Coarse and Fine Location", IEEE 2nd international conference on Big Data Analysis, 2017
- F. C. Soon, H. Y. Khaw, J. H. Chuah and J. Kanesan, "PCANet Based Convolutional Neural Network Architecture For Vehicle Model Recognition System", IEEE Tran. on Intelligent Transp. Systems, vol. PP, no. 99, pp. 1-11, 2018
- P. Jonathon Phillips, Alvin Martin and C.L. Wilson Mark Przybocki, An Introduction to Evaluating Biometric Systems, National Institute of Standards and Technology, 2000 IEEE.
- Ivor Simpson, biometrics: issues and applications, 6th Annual Multimedia Systems, Electronics and Computer Science, University of Southampton 2006.
- Yusuf Perwej, Dr. Ashish Chaturvedi, “Neural Networks for Handwritten English Alphabet Recognition”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 20, No. 7, Pages 1- 5, 2011, DOI: 10.5120/2449-2824
- Kai Cao and Anil K Jain, "Fingerprint indexing and matching: An integrated approach", 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 437-445, 2017
- Wang Yuan, Yao Lixiu and Zhou Fuqiang, "A real time fingerprint recognition system based on novel fingerprint matching strategy", 2007 8th International Conference on Electronic Measurement and Instruments, pp. 1-81, 2007
- S. Ribaric and I. Fratric, "A Biometric Identification System Based on Eigen Palm and Eigen Finger Features", IEEE Transaction on pattern analysis and machine intelligence, vol. 27, no. 11, pp. 1698-1709, 2005
- Yusuf Perwej, “Recurrent Neural Network Method in Arabic Words Recognition System”, for published in the International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Volume 3, Issue 11, Pages 43-48, November 2012
- Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE transactions on circuits and systems for video technology, vol. 14, no. 1, january 2004
- Betch, D. "DNA Fingerprint in Human Health and Society" Biotechnology Information Series (Bio-6)
- Kevin Daimi and Katherine Snyder, “Security Requirements forMultimodal Biometric Systems”, Department of Mathematics and Computer Science, University of Detroit Mercy, Detroit, Michigan 48219, USA
- Nikolaos V. Boulgouris, Dimitrios Hatzinakos and Konstantinos N. Plataniotis, "Gait Recognition: A challenging signal processing technology for biometric identification", IEEE signal processing magazine, 2005
- Yusuf Perwej, “Unsupervised Feature Learning for Text Pattern Analysis with Emotional Data Collection: A Novel System for Big Data Analytics”, IEEE International Conference on Advanced computing Technologies & Applications (ICACTA'22), SCOPUS, IEEE No: #54488 ISBN No Xplore: 978-1-6654-9515-8, Coimbatore, India, 4-5 March 2022, DOI: 10.1109/ICACTA54488.2022.9753501
- A.; Tripathi, C.M.; Perwej, Y.; Srivastava, A.K.; Kulshrestha, N. Face Recognition Based Automated Attendance Management System. Int. J. Sci. Res. Sci. Technol. 2022, 9, 261–268, 2022
- Y. Lei, N. Scheffer, L. Ferrer and M. McLaren, "A novel scheme for speaker recognition using a phonetically-aware deep neural network", 2014 IEEE Inte. Conf. on Acoustics Speech and Signal Proc. (ICASSP), pp. 1695-1699, 2014
- Yusuf Perwej, Firoj Parwej, “Perceptual Evolution of Playout Buffer Algorithm for Enhancing Perceived Quality of Voice Transmission over IP”, International Journal of Mobile Network Communications & Telematics (IJMNCT), which is published by Academy & Industry Research Collaboration Center (AIRCC), USA, Volume 2, No. 2, Pages 1- 19, 2012 , DOI: 10.5121/ijmnct.2012.2201
- Yusuf Perwej, Prof. (Dr.) Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security”, International Journal of Scientific Research and Management (IJSRM), ISSN (e): 2321-3418, Volume 9, Issue 12, Pages 669 - 710, 2021, DOI: 10.18535/ijsrm/v9i12.ec04
- A. Loutfi and S. Coradeschi, "Forming Odour Categories Using an Electronic Nose", Proc. European Conf. Artificial Intelligence (ECAI 04), pp. 119-124, 2004
- A. Morales, M. Falanga, J. Fierrez, C. Sansone and J. Ortega-Garcia, "Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research", 2015 IEEE 7th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-6, 2015
- Yau Wei Yun, “The ‘123’ of Biometric Technology”, Synthesis Journal, Pages 83-95, 2002
- A. Dantcheva, P. Elia and A. Ross, "What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics", IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 441-467, Mar. 2016
- Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6, Issue 3, Pages 241-258, 2018, DOI: 10.21474/IJAR01/6672
- T. F. Cootes, C. J. Taylor, D. H. Cooper, and J. Graham, Active Shape Models their Training and Application. Comput. Vis. Image Underst., 1995
- J. Matas, M. Hamouz, K. Jonsson, J. Kittler, Y. Li, C. Kotropoulos, A. Tefas, I. Pitas, T. Tan, H. Yan, F. Smeraldi, J. Begun, N. Capdevielle, W. Gerstner, S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz. Comparison of Face Verication Results on the XM2VTS Database. In Proc. 15th Int'l Conf. Pattern Recognition, volume 4, pages 858{863, Barcelona, 2000
- D. Stewart, R. Seymour, A. Pass and J. Ming, "Robust audio-visual speech recognition under noisy audio-video conditions", IEEE Transactions on Cybernetics, vol. 44, no. 2, pp. 175-184, 2014
- E. Şaykol, Web-based user interface for query specification in a video database system, M.S. thesis, Dept. of Computer Engg., Bilkent University, Ankara, Turkey, 2001.
- E. Şaykol, U. Güdükbay and Ö. Ulusoy, A semi-automatic object extraction tool for querying in multimedia databases, MIS'01, Capri, Italy, pp. 11-20, 2001
- Al-Mushayt O., Haq Kashiful, Yusuf Perwej, “Electronic-Government in Saudi Arabia; a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, ISSN-0974-7273, Volume 1, Number 1, Pages 87-98, 2009
- E. Bailly-Bailliere, S. Bengio, F. Bimbot, M. Hamouz, J. Kittler, J. Mariethoz, J. Matas, K. Messer, V. Popovici, F. Poree, B. Ruiz, and J.-P. Thiran, BThe BANCA database and evaluation protocol,[ in Proc. Audio- and Video-Based Biometric Person Authentication, Guilford, pp. 625–638, 2003
- D. Ciresan, "Multicolumn Deep Neural Networks for Image Classification", Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) CVPR '12, pp. 3642-3649, 2012
- Aparna Trivedi, Chandan Mani Tripathi, Dr. Yusuf Perwej, Ashish Kumar Srivastava, Neha Kulshrestha, “Face Recognition Based Automated Attendance Management System” , International Journal of Scientific Research in Science and Technology(IJSRST), Volume 9, Issue 1, Pages 261-268, January 2022, DOI: 10.32628/IJSRST229147
- Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), Volume 6, Issue 3, Pages 241-258, 2018, DOI: 10.21474/IJAR01/6672
- Y. Zhang, D.-w. Gong and J. Cheng, "Multi-objective particle swarm optimization approach for cost-based feature selection in classification", IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), vol. 14, no. 1, pp. 64-75, 2017
- Bhavya Singh Chauhan, Km Divya, Nikhat Akhtar, Vipin Rawat, Jitendra, “QR Code-based Real-Time Intelligent Attendance Covering System”, International Journal of Computer Science Trends and Technology (IJCST), Volume 10, Issue 3, Pages 204-212, 2022, DOI: 10.33144/23478578/IJCST-V10I3P36
- Perwej, Y., Abbas, S.Q., Dixit, J.P., Akhtar, N. and Jaiswal, A.K. , “A systematic literature review on the cyber security”, International Journal of Scientific Research and Management (IJSRM), Vol. 9 No. 12, pp. 669-710,2021
- M. Golfarelli, D. Maio, and D. Maltoni, “On the error-reject tradeoff in biometric verification systems,” IEEE Trans. Pattern Anal. Machine Intell., vol. 19, pp. 786–796, July 1997
- T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of artificial gummy fingers on fingerprint systems,” Proc. SPIE, vol. 4677, pp. 275–289, Feb. 2002
- E. d. Os, H. Jongebloed, A. Stijsiger, and L. Boves, “Speaker verification as a user-friendly access for the visually impaired,” in Proc. Eur. Conf. Speech Technology, Budapest, Hungary, pp. 1263–1266, 1999
- Y. Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), Volume 9, Issue 11, (A), Pages 29472 – 29493, 2018, DOI: 10.24327/ijrsr.2018.0911.2869
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.