Enhanced PAD security Mechanism Using Fingerprint and Face Scanning
Surinder Pal Kaur1 , Anil Kumar2
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 506-509, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.506509
Online published on Mar 31, 2019
Copyright © Surinder Pal Kaur, Anil Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Surinder Pal Kaur, Anil Kumar, “Enhanced PAD security Mechanism Using Fingerprint and Face Scanning,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.506-509, 2019.
MLA Citation
MLA Style Citation: Surinder Pal Kaur, Anil Kumar "Enhanced PAD security Mechanism Using Fingerprint and Face Scanning." International Journal of Computer Sciences and Engineering 7.3 (2019): 506-509.
APA Citation
APA Style Citation: Surinder Pal Kaur, Anil Kumar, (2019). Enhanced PAD security Mechanism Using Fingerprint and Face Scanning. International Journal of Computer Sciences and Engineering, 7(3), 506-509.
BibTex Citation
BibTex Style Citation:
@article{Kaur_2019,
author = {Surinder Pal Kaur, Anil Kumar},
title = {Enhanced PAD security Mechanism Using Fingerprint and Face Scanning},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {506-509},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3870},
doi = {https://doi.org/10.26438/ijcse/v7i3.506509}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.506509}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3870
TI - Enhanced PAD security Mechanism Using Fingerprint and Face Scanning
T2 - International Journal of Computer Sciences and Engineering
AU - Surinder Pal Kaur, Anil Kumar
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 506-509
IS - 3
VL - 7
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
359 | 282 downloads | 155 downloads |




Abstract
Biometric techniques are utilized to provide authentication to prevent unauthorized access and it handle physical or behavioral that identifies the identity of a person. In our proposed paper the security mechanism named PAD is proposed that provides more accuracy than the existing system. In this technique first of all sensor capture the biometric images and then it is utilized to identify one or more characteristics of a person like face, fingerprint and other feature. Results section shows that it gives better accuracy and recognition rate utilizes various combination of biometric technique.
Key-Words / Index Term
Biometric, PAD security mechanism, Security, Sensors
References
[1] R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah, K. N. Qureshi, F. Computing, and J. Bahru, “Security Issues and Attacks in Wireless Sensor Network,” World Appl. Sci. J., vol. 30, no. 10, pp. 1224–1227, 2018.
[2] D. Karaboga, S. Aslan, and Ü. Ñ. Ò. Ö. Ò. Ü. Ñ. Ü. Ü. Ñ. Ò, “A New Emigrant Creation Strategy for Parallel Artificial Bee Colony Algorithm ØÒ ××,” pp. 689–694.
[3] M. A. Jabbar, B. L. Deekshatulu, and P. Chandra, “Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm,” Procedia Technol., vol. 10, pp. 85–94, 2013.
[4] X. Yang and A. Hossein Gandomi, “Bat algorithm: a novel approach for global engineering optimization,” Eng. Comput., vol. 29, no. 5, pp. 464–483, 2012.
[5] F. Tashtarian, M. H. Yaghmaee Moghaddam, K. Sohraby, and S. Effati, “On Maximizing the Lifetime of Wireless Sensor Networks in Event-Driven Applications With Mobile Sinks,” IEEE Trans. Veh. Technol., vol. 64, no. 7, pp. 3177–3189, 2015.
[6] “FaceRecognition.” .
[7] P. Anitha, K. N. Rao, V. Rajasekhar, and C. H. Krishna, “Security for Biometrics Protection between Watermarking and Visual Cryptography,” IEEE Access, no. March, pp. 64–71, 2017.
[8] W. Abdul, Z. Ali, S. Ghouzali, M. S. Hossain, and S. Member, “Biometric Security Through Visual Encryption for Fog Edge Computing,” IEEE Access, vol. 5, 2017.
[9] W. L. Woo, S. Member, and J. A. Chambers, “A Framework for Iris Biometrics Protection : A Marriage between Watermarking and Visual Cryptography,” vol. 3536, no. c, pp. 1–13, 2016.
[10] A. Jameer Basha, V. Palanisamy, and T. Purusothaman, “Efficient multimodal biometric authentication using fast fingerprint verification and enhanced iris features,” J. Comput. Sci., vol. 7, no. 5, pp. 698–706, 2011.
[11] L. R. Haddada, B. Dorizzi, and N. Essoukri Ben Amara, “Watermarking signal fusion in multimodal biometrics,” Int. Image Process. Appl. Syst. Conf. IPAS 2014, 2014.
[12] N. Dey, “Motion Detection and Tracking in Video Processing Applications ( Preface ),” IEEE Access, no. September, 2016.
[13] R. Snehkunj, A. N. Jani, and N. N. Jani, “Brain MRI / CT Images Feature Extraction to Enhance Abnormalities Quantification,” Springer Int. Publ., vol. 11, no. January, pp. 1–10, 2018.
[14] L. Best-Rowden, H. Han, C. Otto, B. F. Klare, and A. K. Jain, “Unconstrained face recognition: Identifying a person of interest from a media collection,” IEEE Trans. Inf. Forensics Secur., vol. 9, no. 12, pp. 2144–2157, 2014.
[15] P. Naraei, V. Street, V. Street, and V. Street, “Application of Multilayer Perceptron Neural Networks and Support Vector Machines in Classification of Healthcare Data,” IEEE Access, no. December, pp. 848–852, 2016.
[16] A. V. Flevaris, A. Martínez, and S. A. Hillyard, “Attending to global versus local stimulus features modulates neural processing of low versus high spatial frequencies: An analysis with event-related brain potentials,” Front. Psychol., vol. 5, no. APR, pp. 1–11, 2014.
[17] S. Africa, “From Local to Global Processing: The Development of Illusory Contour Perception,” vol. 4, no. 11, pp. 38–55, 2017.