Suchetha N V, Anusha K S, Deekshitha P, Deepika P S, Pavitra Gopal Naik
{"title":"Survey on Face and Fingerprint based Person Identification System","authors":"Suchetha N V, Anusha K S, Deekshitha P, Deepika P S, Pavitra Gopal Naik","doi":"10.46610/jocses.2022.v08i02.005","DOIUrl":null,"url":null,"abstract":"Biometric technologies are commonly used to upgrade the system security by allowing people to be recognised. Multi-modal biometric system based on face and fingerprint biometric attributes are included in this survey report. A camera is used to capture the pictures of the faces in the system. The fingerprint obtained from the fingerprint dataset is cross-checked once the input face is recognised to authenticate the identification. The characteristics of the fingerprint and face are retrieved using haar transformation approach. Score level fusion with real-time datasets determines the final conclusion.","PeriodicalId":172546,"journal":{"name":"Journal of Computer Science Engineering and Software Testing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science Engineering and Software Testing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46610/jocses.2022.v08i02.005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Biometric technologies are commonly used to upgrade the system security by allowing people to be recognised. Multi-modal biometric system based on face and fingerprint biometric attributes are included in this survey report. A camera is used to capture the pictures of the faces in the system. The fingerprint obtained from the fingerprint dataset is cross-checked once the input face is recognised to authenticate the identification. The characteristics of the fingerprint and face are retrieved using haar transformation approach. Score level fusion with real-time datasets determines the final conclusion.