{"title":"采用不同技术的多层次生物识别认证","authors":"S.S. Gundecha, M. Naidu","doi":"10.1109/ICAECCT.2016.7942554","DOIUrl":null,"url":null,"abstract":"A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"49 1","pages":"50-54"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Multilevel biometric authentication by using different techniques\",\"authors\":\"S.S. Gundecha, M. Naidu\",\"doi\":\"10.1109/ICAECCT.2016.7942554\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.\",\"PeriodicalId\":6629,\"journal\":{\"name\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"volume\":\"49 1\",\"pages\":\"50-54\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECCT.2016.7942554\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multilevel biometric authentication by using different techniques
A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.