Thermal Imaging As A Biometrics Approach To Facial Signature Authentication

Authors: Kannadasan.R; Nandhini.B
DIN
IJOER-MAY-2015-2
Abstract

In this paper biometrics is used for the authentication purpose. In biometrics specially, Face recognition is used for this paper. We are collecting some faces stored in the databases used for authentication purpose. Suppose one human got mark in faces it will not allow for authentication for that reason .thermal infrared template algorithm is used to handle the critical situation. Collect the faces by using MWIR Camera after stored in the databases and register the faces using linear image registration tool .using image morphology it generate superficial blood vessels. The extracted vascular network wills procedure contour shape which is characteristic to each individual’s .finally it matches original image. Gabor filter is used for future extraction.

Keywords
biometrics face recognition biometrics authentication facial signature MWIR image.
Introduction

Classification of scheme with the three key basic they are 1) characteristic identifiers 2) biographical identifiers 3) biometrics identifiers. Characteristic identifiers and biographical identifiers can be fake identifiers but biometrics can’t be fake identifiers because it only depends on the physiological personality it is difficult to alter. Face recognition are used in the area of entertainment, smart card information security, law enforcement, medicine, and security. Various methods have been created for the face detection used by camera with the seen able spectrum. Machine recognition of human faces has experienced great stride but remained challenged difficult issues of light variability and also difficult in detected facial mask.

Conclusion

Finally we concluded that facial recognition is very secure for authentication purpose. Faces are stored in the database using MWIR camera in the database. Faces is register using linear image register tool .after register the faces , anisotropic filter is used remove noise .choose the better image for the matching .match with the original image .if its authentication user can access otherwise user fails .Gobar filter is best filter when compare to existing algorithm modular kernel Eigen spaces approach

Article Preview