An Empirical Investigation of Human Identity Verification Methods

Authors

  • Bhavesh Kumar Jaisawal  Computer Science & Engineering, Ambalika Institute of Management & Technology, Lucknow, India
  • Dr. Yusuf Perwej  Professor, Department of Computer Science & Engineering, Ambalika Institute of Management & Technology, Lucknow, India
  • Sanjay Kumar Singh  Assistant Professor, Department of Computer Science & Engineering, Ambalika Institute of Management & Technology, Lucknow, India
  • Susheel Kumar  Assistant Professor, Department of Computer Science & Engineering, Ambalika Institute of Management & Technology, Lucknow, India
  • Jai Pratap Dixit  HoD (IT), Associate Professor, Ambalika Institute of Management & Technology, Lucknow, India
  • Niraj Kumar Singh  Assistant Professor, Department of Information Technology, Ambalika Institute of Management & Technology, Lucknow, India

DOI:

https://doi.org/10.32628/IJSRSET2310012

Keywords:

Biometrics System, Recognition Techniques, Biometric Databases, Face Recognition, Fingerprint, Hand Gesture, Gait Recognition.

Abstract

A recognition technique is essential in practically every industry in the current digital era. It has several advantages and may be used for security, identification, and authentication. The relevance of access control systems based on biometrics has grown in recent years since they have the ability to address the majority of the shortcomings of existing security systems. Automated biometric systems for human identification take a measurement of the body's "signature," compare it to a database, and make an application-specific determination. These biometric methods for personal verification and identification are based on physiological or behavioral traits that are usually recognizable, despite changing over time, such as fingerprints, hand geometry, the face, voice, lip movement, gait, and iris patterns. The purpose of this study is to conduct a thorough literature review in order to pinpoint the most well-known recognition techniques, applications, and obstacles.

References

  1. Y Tian, "Artificial Intelligence Image Recognition Method Based on Convolutional Neural Network Algorithm[J]", IEEE Access, vol. PP, no. 99, pp. 1-1, 2020
  2. Ali Mir Arif Mir Asif , Shaikh Abdul Hannan, Dr. Yusuf Perwej, Mane Arjun Vithalrao, “An Overview and Applications of Optical Character Recognition”, Journal of Advance Research In Science And Engineering (IJARSE), India, ISSN 2319-8346 (P), ISSN-2319-8354(E), Volume 3, Issue 7, Pages 261- 274, 2014
  3. Aparna Trivedi, Chandan Mani Tripathi, Dr. Yusuf Perwej, Ashish Kumar Srivastava, Neha Kulshrestha, “Face Recognition Based Automated Attendance Management System” ,  International Journal of Scientific Research in Science and Technology(IJSRST), Volume 9, Issue 1, Pages 261-268, 2022, DOI: 10.32628/IJSRST229147
  4. Sharkas, M. Abou Elenien, Eigenfaces vs. Fisherfaces vs. ICA for Face Recognition; A Comparative Study, 9th International Conference on Signal Processing, 2008, ICSP 2008., pp.914919, 2008
  5. F. Ozgul, C. Atzenbeck, A. Celik and Z. Erdem, "Incorporating data sources and methodologies for crime data mining", Intelligence and Security Informatics (ISI) 2011 IEEE International Conf., pp. 176-180, 2011
  6. Yusuf Perwej, Shaikh Abdul Hannan, Nikhat Akhtar, “The State-of-the-Art Handwritten Recognition of Arabic Script Using Simplified Fuzzy ARTMAP and Hidden Markov Models”, International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Issue 8, Pages 26 - 32, 2014
  7. Jung-Hoon Lee, Kyeongrok Kim, Jae-Hyun Kim, "Design of CycleGAN model for SAR image colorization", 2021 IEEE VTS 17th Asia Pacific Wireless Communications Symposium (APWCS), pp.1-5, 2021
  8. L. Ma, T. Tan, Y. Wang, and D. Zhang, “Efficient iris recognition by characterizing key local variations,” IEEE Trans. Image Process., vol. 13, pp. 739–750, 2004.
  9. Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “The Kingdom of Saudi Arabia Vehicle License Plate Recognition using Learning Vector Quantization Artificial Neural Network”,  International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 98, No.11, Pages 32 – 38, July 2014, DOI: 10.5120/17230-7556
  10. Parwej D. 2013. The state of the art recognize in arabic script through combination of online and offline. International Journal of Computer Science and Telecommunications, 4(3): 60-66, 2013
  11. Parwej, F.: English sentence recognition using artificial neural network through mouse-based gestures. arXiv preprint arXiv:1301.4659 , 2013
  12. Dipietro, L.; Sabatini, A.M.; Member, S.; Dario, P. A survey of glove-based systems and their applic.. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev, 38, 461–482, 2008
  13. Yusuf Perwej, Firoj Parwej, “Perceptual Evolution of Playout Buffer Algorithm for Enhancing Perceived Quality of Voice Transmission over IP”, International Journal of Mobile Network Communications & Telematics (IJMNCT), Academy & Industry Research Collaboration Center (AIRCC), USA, Volume 2, No. 2, Pages 1- 19, 2012, DOI: 10.5121/ijmnct.2012.2201
  14. P. V. Benos, A. S. Lapedes and Gary D. Stormo, "Is there a code for protein-DNA recognition? Probab(ilistical)ly?", BioEssays, vol. 24, pp. 466-475, 2002
  15. K. Yanai and Y. Kawano, "Food image recognition using deep convolutional network with pre-training and fine-tuning", 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1-6, 2015
  16. Deshpande, N. T., & Ravishankar, S., Face Detection and Recognition using Viola-Jones algorithm and Fusion of PCA and ANN. Advances in Computational Sciences and Technology, 10(5), 1173- 1189, 2017
  17. Firoj P An empirical evaluation of off-line Arabic handwriting and printed characters recognition system. Int J Comput Sci, (9), 2012
  18. Bakhshi, Y., Kaur, S. and Verma, P.,. An Improvement in Face Recognition for Invariant Faces. 6(2), pp. 423-426, 2016
  19. Poon, B., Amin, M.A. and Yan, H., 2016. Improved Methods on PCA Based Human Face Recognition for Distorted Images. In Proceedings of the International MultiConference of Engineers and Computer Scientists (1).
  20. Siswanto, Adrian Rhesa Septian, Anto Satriyo Nugroho, and Maulahikmah Galinium. "Implementation of face recognition algorithm for biometrics based time attendance system." 2014 International Conference on ICT For Smart Society (ICISS). IEEE, 2014.
  21. Lukas, Samuel, et al. "Student attendance system in classroom using face recognition technique." 2016    Information and Communication Technology Convergence (ICTC). IEEE, 2016.
  22. Yusuf Perwej , Firoj Parwej, Asif Perwej, “Copyright Protection of Digital Images Using Robust Watermarking Based on Joint DLT and DWT ”, International Journal of Scientific & Engineering Research (IJSER), France, ISSN 2229-5518, Volume 3, Issue 6,  Pages 1- 9, 2012                                                                                                                                                 
  23. Yusuf Perwej, Asif Perwej, Firoj Parwej, “An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, International  journal of Multimedia & Its Applications (IJMA), Academy & Industry Research Collaboration Center (AIRCC) , USA , Volume 4,  No.2, Pages 21- 38, 2012, DOI: 10.5121/ijma.2012.4202      
  24. Asif Perwej, Dr. Yusuf Perwej, Nikhat Akhtar, and Firoj Parwej, “A FLANN and RBF with PSO Viewpoint to Identify a Model for Competent Forecasting Bombay Stock Exchange”, COMPUSOFT, SCOPUS, International Journal of Advanced Computer Technology, 4 (1), Volume-IV, Issue-I, Pages 1454-1461, 2015, DOI: 10.6084/ijact.v4i1.60
  25. A. Radman, K. Jumari, N. Zainal,’ Fast and reliable iris segmentation algorithm’, IET Image Process.,Vol.7, Iss. 1, pp. 42–49, 2013.
  26. E. Elfakhrany,Ben Bella S. Tawfik ‘IRIS Recognition using Conventional Approach’ IEEE 9th international colloquium on signal processing and its applications, pp-89-94,8 - 10 mac., Kuala Lumpur, Malaysia, 2013
  27. Adams Wai-Kin Kong ,’Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security Implications IEEE Transactions On Image Processing, Vol. 22, No. 3,pp- 1148-1160, March 2013.
  28. Claudio A. Perez, Vanel A. Lazcano, and Pablo A. Estevez, ’Real-Time Iris Detection on Coronal-Axis-Rotated Faces’, IEEE Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews,Pp-971-978, Vol. 37, No. 5, September 2007 .
  29. Krevelen, D. W. F. V., Poelman, R. A Survey of Augmented Reality Technologies, applications and limitation. The Int. Journal of Virtual Reality, vol. 9 9(2), 2010, pp. 1-20.
  30. Mitra, S., Acharya, T., Gesture Recognition: A survey. IEEE Transactions on Systems. Man and Cybernetics (SMC) - Part C: App. and Reviews, vol. 37(3), 2007, pp. 211-324.
  31. Chai, Xiujuan, Kongqiao Yikai, Wang, Fang. Robust hand gesture analysis and application in gallery browsing. In Proceeding of ICME, New York, 2009, pp. 938-94.
  32. Pavlovic, V., Sharma, R., Huang, T.S. Visual interpretation of hand gestures for human-computer interaction: A review. IEEE Trans. on Pattern Analysis and Machine Intelligence (PAMI), vol. 7(19), , 1997, pp. 677–695.
  33. M. Mohanty and W. Yaqub, "Seamless authentication for online teaching and meeting," 2020 IEEE Sixth International Conf.on Multimedia Big Data (BigMM), 2020, pp. 120-124.
  34. Xu, Z., Xiang, C., Wen-hui, W. Ji-hai,, Y., Lantz, V., Kong-qiao, W. Hand Gesture Recognition and Virtual Game Control Based on 3D Accelerometer and EMG Sensors. In Proceedings of IUI’09, , 2009, pp. 401-406.
  35. Lee, C. S., Ghyme, S. W., Park, C. J., Wohn. K. The Control of avatar motion using hand gesture. In Proc. of Virtual Reality Software and tech. (VRST), 1998, pp. 59-65.
  36. S. Bengio and J. Mariethoz, Biometric Person Authentication IS A Multiple Classifier Problem, Google Inc, Mountain View, CA, USA, , IDIAP Research Institute, Martigny, Switzerland
  37. Biometric technology, Hand Geometry Identification Technology, www.biometricvision.com
  38. L. Yuan, Z. Mu, and Z. Xu, Using Ear Biometrics for Personal Recognition, School of Information Engineering, Univ. of Science and Technology Beijing. Beijing 100083
  39. Yusuf Perwej, Dr. Ashish Chaturvedi, “Machine Recognition of Hand Written Characters using Neural Networks”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 14, No. 2, Pages 6- 9, 2011, DOI: 10.5120/1819-2380
  40. K. L. Kabir et al., "Projection-based features: A superior domain for handwritten Bangla basic characters recognition", 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1-7, 2015
  41. Li, "An Iris Recognition Algorithm Based on Coarse and Fine Location", IEEE 2nd international conference on Big Data Analysis, 2017
  42. F. C. Soon, H. Y. Khaw, J. H. Chuah and J. Kanesan, "PCANet Based Convolutional Neural Network Architecture For Vehicle Model Recognition System", IEEE Tran. on Intelligent Transp. Systems, vol. PP, no. 99, pp. 1-11, 2018
  43. P. Jonathon Phillips, Alvin Martin and C.L. Wilson Mark Przybocki, An Introduction to Evaluating Biometric Systems, National Institute of Standards and Technology, 2000 IEEE.
  44. Ivor Simpson, biometrics: issues and applications, 6th Annual Multimedia Systems, Electronics and Computer Science, University of Southampton 2006.
  45. Yusuf Perwej, Dr. Ashish Chaturvedi, “Neural Networks for Handwritten English Alphabet Recognition”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 20, No. 7, Pages 1- 5, 2011, DOI: 10.5120/2449-2824
  46. Kai Cao and Anil K Jain, "Fingerprint indexing and matching: An integrated approach", 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 437-445, 2017
  47. Wang Yuan, Yao Lixiu and Zhou Fuqiang, "A real time fingerprint recognition system based on novel fingerprint matching strategy", 2007 8th International Conference on Electronic Measurement and Instruments, pp. 1-81, 2007
  48. S. Ribaric and I. Fratric, "A Biometric Identification System Based on Eigen Palm and Eigen Finger Features", IEEE Transaction on pattern analysis and machine intelligence, vol. 27, no. 11, pp. 1698-1709, 2005
  49. Yusuf Perwej, “Recurrent Neural Network Method in Arabic Words Recognition System”, for published in the International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Volume 3, Issue 11, Pages  43-48, November 2012
  50. Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE transactions on circuits and systems for video technology, vol. 14, no. 1, january 2004
  51. Betch, D. "DNA Fingerprint in Human Health and Society" Biotechnology Information Series (Bio-6)
  52. Kevin Daimi and Katherine Snyder, “Security Requirements forMultimodal Biometric Systems”, Department of Mathematics and Computer Science, University of Detroit Mercy, Detroit, Michigan 48219, USA
  53. Nikolaos V. Boulgouris, Dimitrios Hatzinakos and Konstantinos N. Plataniotis, "Gait Recognition: A challenging signal processing technology for biometric identification", IEEE signal processing magazine, 2005
  54. Yusuf Perwej, “Unsupervised Feature Learning for Text Pattern Analysis with Emotional Data Collection: A Novel System for Big Data Analytics”, IEEE International Conference on Advanced computing Technologies & Applications (ICACTA'22), SCOPUS, IEEE No: #54488 ISBN No Xplore: 978-1-6654-9515-8, Coimbatore, India, 4-5 March 2022, DOI: 10.1109/ICACTA54488.2022.9753501
  55. A.; Tripathi, C.M.; Perwej, Y.; Srivastava, A.K.; Kulshrestha, N. Face Recognition Based Automated Attendance Management System. Int. J. Sci. Res. Sci. Technol. 2022, 9, 261–268, 2022
  56. Y. Lei, N. Scheffer, L. Ferrer and M. McLaren, "A novel scheme for speaker recognition using a phonetically-aware deep neural network", 2014 IEEE Inte. Conf. on Acoustics Speech and Signal Proc. (ICASSP), pp. 1695-1699, 2014
  57. Yusuf Perwej, Firoj Parwej, “Perceptual Evolution of Playout Buffer Algorithm for Enhancing Perceived Quality of Voice Transmission over IP”, International Journal of  Mobile Network Communications & Telematics (IJMNCT), which is published by Academy & Industry Research Collaboration Center (AIRCC), USA, Volume 2, No. 2, Pages 1- 19, 2012 , DOI: 10.5121/ijmnct.2012.2201
  58. Yusuf Perwej,  Prof. (Dr.) Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security”, International Journal of Scientific Research and Management (IJSRM), ISSN (e): 2321-3418, Volume 9, Issue 12, Pages 669 - 710, 2021, DOI: 10.18535/ijsrm/v9i12.ec04    
  59. A. Loutfi and S. Coradeschi, "Forming Odour Categories Using an Electronic Nose", Proc. European Conf. Artificial Intelligence (ECAI 04), pp. 119-124, 2004
  60. A. Morales, M. Falanga, J. Fierrez, C. Sansone and J. Ortega-Garcia, "Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research", 2015 IEEE 7th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-6, 2015
  61. Yau Wei Yun, “The ‘123’ of Biometric Technology”, Synthesis Journal, Pages 83-95, 2002
  62. A. Dantcheva, P. Elia and A. Ross, "What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics", IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 441-467, Mar. 2016
  63. Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6, Issue 3, Pages 241-258, 2018, DOI: 10.21474/IJAR01/6672
  64. T. F. Cootes, C. J. Taylor, D. H. Cooper, and J. Graham, Active Shape Models  their Training and Application. Comput. Vis. Image Underst., 1995
  65. J. Matas, M. Hamouz, K. Jonsson, J. Kittler, Y. Li, C. Kotropoulos, A. Tefas, I. Pitas, T. Tan, H. Yan, F. Smeraldi, J. Begun, N. Capdevielle, W. Gerstner, S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz. Comparison of Face Verication Results on the XM2VTS Database. In Proc. 15th Int'l Conf. Pattern Recognition, volume 4, pages 858{863, Barcelona, 2000
  66. D. Stewart, R. Seymour, A. Pass and J. Ming, "Robust audio-visual speech recognition under noisy audio-video conditions", IEEE Transactions on Cybernetics, vol. 44, no. 2, pp. 175-184, 2014
  67. E. Şaykol, Web-based user interface for query specification in a video database system, M.S. thesis, Dept. of Computer Engg., Bilkent University, Ankara, Turkey, 2001. 
  68. E. Şaykol, U. Güdükbay and Ö. Ulusoy, A semi-automatic object extraction tool for querying in multimedia databases, MIS'01, Capri, Italy, pp. 11-20, 2001
  69. Al-Mushayt O., Haq Kashiful, Yusuf Perwej, “Electronic-Government in Saudi Arabia; a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, ISSN-0974-7273, Volume 1, Number 1, Pages 87-98, 2009
  70. E. Bailly-Bailliere, S. Bengio, F. Bimbot, M. Hamouz, J. Kittler, J. Mariethoz, J. Matas, K. Messer, V. Popovici, F. Poree, B. Ruiz, and J.-P. Thiran, BThe BANCA database and evaluation protocol,[ in Proc. Audio- and Video-Based Biometric Person Authentication, Guilford, pp. 625–638, 2003
  71. D. Ciresan, "Multicolumn Deep Neural Networks for Image Classification", Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) CVPR '12, pp. 3642-3649, 2012
  72. Aparna Trivedi, Chandan Mani Tripathi, Dr. Yusuf Perwej, Ashish Kumar Srivastava, Neha Kulshrestha, “Face Recognition Based Automated Attendance Management System” , International Journal of Scientific Research in Science and Technology(IJSRST), Volume 9, Issue 1, Pages 261-268, January 2022, DOI: 10.32628/IJSRST229147  
  73. Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), Volume 6, Issue 3, Pages 241-258, 2018, DOI: 10.21474/IJAR01/6672
  74. Y. Zhang, D.-w. Gong and J. Cheng, "Multi-objective particle swarm optimization approach for cost-based feature selection in classification", IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), vol. 14, no. 1, pp. 64-75, 2017
  75. Bhavya Singh Chauhan, Km Divya, Nikhat Akhtar, Vipin Rawat, Jitendra, “QR Code-based Real-Time Intelligent Attendance Covering System”,  International Journal of Computer Science Trends and Technology (IJCST), Volume 10, Issue 3, Pages 204-212, 2022, DOI: 10.33144/23478578/IJCST-V10I3P36
  76. Perwej, Y., Abbas, S.Q., Dixit, J.P., Akhtar, N. and Jaiswal, A.K. , “A systematic literature review on the cyber security”, International Journal of Scientific Research and Management (IJSRM), Vol. 9 No. 12, pp. 669-710,2021
  77. M. Golfarelli, D. Maio, and D. Maltoni, “On the error-reject tradeoff in biometric verification systems,” IEEE Trans. Pattern Anal. Machine Intell., vol. 19, pp. 786–796, July 1997
  78. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of artificial gummy fingers on fingerprint systems,” Proc. SPIE, vol. 4677, pp. 275–289, Feb. 2002
  79. E. d. Os, H. Jongebloed, A. Stijsiger, and L. Boves, “Speaker verification as a user-friendly access for the visually impaired,” in Proc. Eur. Conf. Speech Technology, Budapest, Hungary,  pp. 1263–1266, 1999
  80. Y. Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), Volume 9, Issue 11, (A), Pages 29472 – 29493, 2018, DOI: 10.24327/ijrsr.2018.0911.2869

Downloads

Published

2023-02-28

Issue

Section

Research Articles

How to Cite

[1]
Bhavesh Kumar Jaisawal, Dr. Yusuf Perwej, Sanjay Kumar Singh, Susheel Kumar, Jai Pratap Dixit, Niraj Kumar Singh "An Empirical Investigation of Human Identity Verification Methods" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 1, pp.16-38, January-February-2023. Available at doi : https://doi.org/10.32628/IJSRSET2310012