<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Biometric Authentication System For Access Control</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><roleName>Anubhav</roleName><forename type="first">Jaimit</forename><surname>Patel</surname></persName>
							<email>jaimitpatel.1432@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering</orgName>
								<orgName type="institution">Lovely Professional University Phagwara</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><roleName>Rachit</roleName><forename type="first">Ayush</forename><forename type="middle">Kumar</forename><surname>Singh</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering</orgName>
								<orgName type="institution">Lovely Professional University Phagwara</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kumar</forename><surname>Tiwari</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering</orgName>
								<orgName type="institution">Lovely Professional University Phagwara</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Abhi</forename><surname>Singh</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering</orgName>
								<orgName type="institution">Lovely Professional University Phagwara</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Bhupinder</forename><surname>Kaur</surname></persName>
							<email>bhupinder.23626@lpu.co.in</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering</orgName>
								<orgName type="institution">Lovely Professional University Phagwara</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Biometric Authentication System For Access Control</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">975B6744396DA2959131957B324A49C6</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:46+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Biometric Authentication</term>
					<term>Access Control</term>
					<term>Data Security</term>
					<term>Biometric Authentication</term>
					<term>Fingerprint Recognition</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Biometric Authentication System isacrucialneed in everyday security protocols, providing reliability through security and efficiency for identity verification. This paper introduces a comprehensive framework for fingerprint recognition within system addressing the critical challenges like rotation, scaling variations, noise, and distortions efficient in large datasets, accuracy, real-time performance, and reliability.Capitalizing on fingerprint scanner, captured templates are stored in database securely and matched with Python libraries. AES-256 encryption is applied to store templates and enhances protection against unauthorized access. Testing is conducted using various dataset sources like Kaggle, all-inclusive various fingerprint variation and noise levels. The proposed system demonstrates robustness, achieving the accuracy of 58% to 98% across different conditions. The efficiency of the algorithm ensures scalability even when processing the large dataset with real-time performance.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Physical access security to restrict areas is one of the topmost priorities for an business, organizations and personal space. Currently available methods like key cards, RFID cards and simple pin passwords are vulnerable to loss, theft, cloning and unauthorized sharing. Biometric authentication offers a secure alternative which utilizes biometric signatures and components like face recognition, fingerprint recognition, retinal scan etc. This research paper will talk about how we created a fingerprint scanner and a matching algorithm for security access control. The components which are used to create fingerprint scanner are, R307 Optical fingerprint reader which is utilized to extract and verify human fingerprint data. This data, along with other user information, was collected by the ESP8266 Wi-Fi Module and transmitted over the internet to a designated destination which can be a cloud or a drive with connected network. A 0.96" I2C OLED Display is used to display the data. The system uses the Python environment and libraries for real-time fingerprint matching to grant access. The images captured by scanner is compared with templates stored in the database. Access is granted only if a successful match is established with a good score and accuracy. Fingerprint templates stored within the database are encrypted using the latest and secured AES-256 bit encryption, safeguarding sensitive information against unauthorized access or potential breaches. It added an extra layer of security in database of fingerprint and protect the integrity of biometric data and the security of access control system. An open source algorithm is implement for the fingerprint matching algorithm on this biometric authentication for access control work which delivers quick and accurate results. This work utilizes SIFT (Scale Invariant Feature Transform) which is used to detect key points in images that are resistant to changes in size/scale, rotation, and brightness. Key points are just distinctive, or we can say unique location which are different from other points available in the image. It also utilizes Fast Library for Approximate Nearest Neighbours (FLANN) which is used to efficiently find the nearest neighbours between key points between images and for that it provides an accuracy rate about how much confident it is that images are the same or have the same key points. Upcoming sections of this paper will delve deeper into the system design, by outlining the fingerprint reader technology,fingerprint template creation process, and the Python-based fingerprint matching algorithm. Additionally, the paper will discuss the chosen encryption technique and its significance in securing the stored fingerprint data. Finally, the paper will present the results obtained from the system implementation and address potential limitations and future advancements. Several security and video based authentication techniques were proposed by the researchers in the recent years <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Common Challenges and General Issues</head><p>In this section, issues and challenges related to noisy fingerprints and its efficiency are mentioned.</p><p>• Rotation and Scaling Variations:Templates which are in database or capture can have rotation of some degree or the scale may be different for each template. • Noise and Distortions:Template may also contain noises like blurring, fuzziness due to some problems which capturing templates. • Large Dataset Matching Efficiency:When working with large dataset, if algorithm is not efficient it can make matching process highly computational. • Accuracy and Reliability: if algorithms are efficient in matching there can be an issue with accuracy and reliability of matching. • Real Time Performance: there is also an issue with how much time does the whole process takes which is an issue.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Review of Literature</head><p>In this section literature review is discussed authors have done the work by using different approaches. Leyu, Z. et.al. <ref type="bibr" target="#b4">[5]</ref> came with an idea to implement an RFID access control system, by utilizing both hardware and software components in the work. Biometric recognition technologies like fingerprint scanners and face recognition is used and highlighted as main aspect. This work integrates biometrics with IC cards while addressing pros and cons regarding data security and privacy. The architecture of work is composed of different modules where each module is designed to perform specific task like Card Issuing module, which is a software design, broken into components such as Face Recognition, Fingerprint Identification, and Windows client. The card reding and verifying uses modules like RFID Input-Output driver, and Voice broadcasting module which complements face and fingerprint recognition. The system employs AES-246 encryption and hardware based password authentication to strengthen data security and mitigating the risks.</p><p>Cheng, H. et.al. <ref type="bibr" target="#b5">[6]</ref> talked about a plan for getting data in cloud computing. It focuses on keeping things safe by using identity based encryption (IBE) and body measurement checks. It talks about worries on safety of getting data in cloud places and ways to use IBE with ECC and body checks for safety. IBE lets any set of letters be a public key, making it easy to pass keys around and keep things safe. The end point they came to shows that because of growth in wireless talks and body checks, the plan they came up with is doable. Plus, RBAC (Role Based Access Control) is used to show how well it keeps data safe from many dangers.</p><p>Anisha Poojary et al. <ref type="bibr" target="#b6">[7]</ref> presented a biometric authentication system using the unique vein patterns present in the dorsal hand. the paper shows the limitations of traditional authentication methods by showing enhanced security using hand vein recognition method. For this system authors have used cost effective scanning equipment such as No IR camera and NIR LEDs. These components have ability to capture high quality vein images without direct contact of hand. The paper shows the system's capability to accurately identify individuals based on the unique vein patterns. This feature makes it well suited for a wide range of uses which require strong security measures. In the end authors have given a detailed discussion of the implementation step of the system including camera initialization, image capture, pre-processing operations, and template matching procedures.</p><p>Natalya Kharina et al. <ref type="bibr" target="#b7">[8]</ref> presented an calculation for selecting palm vein pictures for biometric confirmation frameworks, especially centring on utilizing multidimensional Markov chains. The strategy includes approximating the biometric format picture through a discrete Markov handle and leveraging conditional Markov handle hypothesis. The algorithm follows a number of specified steps. Initially it will be based on the calculation of transition matrices, which analyses local configurations. As a result, for the purpose of determining transition matrix indices, state vectors are established in the neighbourhood. In addition to palm vein authentication, it suggests applications such as riverbed detection or ultrasound image processing. In addition, it points to the algorithms low computational resource requirements and its potential use of precalculated transition matrices in order to further reduce complexity.</p><p>Tanya Ignatenko et. al. <ref type="bibr" target="#b8">[9]</ref> presents the biometric privacy-authentication system was examined. The system utilized BHC code 13.5dB to introduce fuzzy commitment, but its limitations were attaining optimal privacy leakage. The paper's study recommends using turbo and convoluted codes to improve privacy control. The main emphasis of the practical coding method implementations is the use of vector quantization of the encoder for better trade-offs. Advanced coding techniques need to be implemented to increase privacy protection in biometric authentication systems. Many important elements are needed for needed for footprint recognition, including techniques for extraction, classification, matching, and data storing. It is emphasized that matching and classifying footprints is highly essential in obtaining a precise biometric identity. Nevertheless, face recognition also concentrates on issues related to face biometric including illumination, body posture, expressions, image quality and more. The paper focuses on the advancements, drawbacks, and applications of biometric recognition technology in various domains like access control systems.</p><p>Prashant Johri et al. <ref type="bibr" target="#b9">[10]</ref> described that in today's time, strong security measures are essential to tackle the emerging threats of cyber attackers. These attackers are looking for different ways to get into the system and access the data for malicious purpose. The authors also talked about various ideas such as using biometric authentication as a robust security mechanism. The tools such as ID cards, username credentials like password, pin numbers have been in use for a pretty long time now and have been proved to not enough as they can be easily stolen or abused hence we need better alternatives and that's where biometric authentication come into play. Biometric technology is generally based on the psychological or behavioural traits. They are generally used in the form of fingerprints, facial, and eye contour identification. It covers the evolution of biometric technology across time, from earliest used techniques for collecting fingerprints to the most recent deep learning based strategies as well as the integration of ai in this. It also further explores about the new developments happening in this field such as multimodal biometric, global cooperation, and passive biometric data collection. The paper highlights the potential and ongoing progress of biometric authentication system across sectors.</p><p>Diptadeep Addy et al. <ref type="bibr" target="#b10">[11]</ref> proposed a system of several layers of security to integrate biometrics and GSM communication in vaults. The proposal provides for a system whereby each layer of security is progressively transferred to access the vault, addressing growing concerns about security breaches. The four layers include account username/password matching, facial recognition, fingerprint matching, and One Time Password (OTP) verification through GSM communication. the system uses biometric data, a unique finger impression filter and remote communications. The paper examines the architecture of the framework, its equipment plan and usage, and analyses each organization of confirmation. Furthermore,to improve the accuracy and strength of the system, it recommends possible improvements and adjustments. R. T. Hans et al. <ref type="bibr" target="#b11">[12]</ref> explained about how biometric authentication system can be implemented from vehicle being theft. Due to this aid employment will also be created. This model diagram is important This diagram shows the benefit of implementing this model which Contributing to green computing, Cost effective, Better efficient and effective authentication of vehicle owner After implementing this model Shopping mall owners don't have to worry about vehicle theft, business opportunities will also be created which would develop and buy off-shelf systems. there is only one limitation to this model that is the approval of using such systems at the shopping mall because it deals with the usage of individual private sensitive information which should always be protected. So the usage of this approach should negotiate the perceived privacy.</p><p>Spanakis, E.G. et al. <ref type="bibr" target="#b12">[13]</ref> described that most of the user authentication in ICT service/systems in application identity tools are passkey/personal identification number(PINs).This idea focuses to overcome weakness and flaws under improved under authentication with high level security and privacy. Speech-Xray's implementation regarding e-Health provided and analyzed report which explores security and privacy issues which offers a comprehensive summary of biometrics technology applications pointing towards the e-Health security challenges. Biometrics authenticates or verifies a person's identity and sorts it in two categories, physiological namely fingerprints, palm print, face and iris recognition, and DNA behavioral namely typing rhythm or voice.These things are also used as supplementary ID cards and passkeys, like communicating an extra level of security like multi factor authentication.Data like these will be stored in template database, placed inside the hospital which will achieve all the required characteristics regarding security, privacy, usability &amp; cost-efficiency.</p><p>Z. Ishak et al. <ref type="bibr" target="#b13">[14]</ref> experimented about fingerprint biometric systems. These were categorized by small size, ease of use and less power consumption like Apple touch id. If this system is implemented, we can work upon multi-factor authentication plan and improve encryption algorithm. Other biometric system like retina and face recognition not enough researched in depths so there is less trust in uniqueness.This system implements position-based accesses control, develop stronger authentication mechanism. Long-term use will increase security of database and eliminate backdoor entry.There are 3 main problems with this system: first is identification of unauthorized user for access in the absence of any limitation in the security company, next is confidential data might slip out by any intruder since of weak security part, last up is security software to protect internal data which are not carefully unforced. The system reach is divided in two parts: user scope and system scope. In user scopes,users can optimize the data in Secure Biometric Lock System for Files and Applications. Simultaneously, the system scope consists of features in the Biometric Lock System namely login settings and enter control panel. Approaches are modern fingerprint readers, facial recognition, eigen face (black and white) <ref type="bibr" target="#b14">[15]</ref> and hand geometry <ref type="bibr" target="#b15">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Methodology</head><p>This Work is divided into six parts which explain about the hardware components which gives insight about the circuit connection, and algorithms which are used for encryption, decryption, and fingerprint matching. COmplete flow diagram of proposed work is shown in fig. <ref type="figure" target="#fig_0">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">First: Integration of Fingerprint Sensor Module:</head><p>The integration of a fingerprint sensor module is done with Transistor-Transistor Logic (TTL) Universal Asynchronous Receiver-Transmitter(UART) interface for direct connections to microcontroller UART or to a PC through MAX232 / USB-Serial adapter. Module diagram is shown in figure <ref type="figure" target="#fig_1">2</ref>. This module allows users to store fingerprint data and configure it in 1:1 or 1:N mode for identifying individuals. The fingerprint sensor is flexible and suitable for applications like marking attendance, safety boxes and securing devices like car doors and monitoring applications. It can interface directly with any microcontroller or Arduino board.The complete setup and module structure are shown in Fig. <ref type="figure" target="#fig_1">2</ref> and Fig. <ref type="figure" target="#fig_2">3</ref>. The fingerprint sensors used in the IoT setup have the following functions: A thin, multilayered organic film is positioned between an anode and a cathode to create the self-emitting OLED (Organic Light-Emitting Diode) technology. OLED is thought to be the next-generation technology for flat-panel displays since it doesn't require a backlight like LCD technology does. It also offers great application potential for a variety of display kinds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Second: Data Encryption:</head><p>This step involves encryption of the images which are being taken for the censors. The algorithm used for this is AES-256. By creating a key with random generation, we generate a secure key,  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Third : Database Access and Decryption</head><p>By using AES-256decryption we can access data from the database. It requires a stored and protected key which is used for both encryption and decryption.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Fourth: Fingerprint Processing:</head><p>This step involves improving the quality of images, as in size formatting or removing some blurriness, and lastly applying grayscale conversion as shown in Fig. <ref type="figure" target="#fig_3">4</ref>.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5.">Fifth: Fingerprint Loading and Extracting Features:</head><p>By using Pythons OS module we will move to the directory where all the fingerprints are stored, and we will store location in a variable which will hold the paths. After this we will extract all the features using SIFT (Scale Invariant Feature Transformation) by using SIFT create() function, It will detect all the features like, Scale invariance: SIFT detects features at multiple scales within an image. Rotation invariance: SIFT descriptors are invariant to image rotation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.6.">Sixth: Matching Features:</head><p>By initializing a FLANN (Fast Library for Approximate Nearest Neighbours) matcher with proper parameters, the Matched fingerprint function will match by using Knn-Match method. This method finds the two nearest neighbours (key points) for each descriptor in the query image within the database descriptors, as shown in the Fig. <ref type="figure" target="#fig_4">5</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results</head><p>The Sift descriptors are used to determine accuracy of the system. These photos depict various fingerprints with different types of variations and noises as shown in fig. <ref type="figure" target="#fig_5">6</ref>, fig. <ref type="figure" target="#fig_6">7</ref> and fig. <ref type="figure" target="#fig_7">8</ref>. The   purpose of this study, which deal with both security aspects of fingerprint and noise cancellation. More than 17,000 photos are used in the testing process to ensure that it can withstand large dataset and gives good accuracy. The resultant accuracy varied from 58% to 98% according to level of noise present in the image. If the image is in perfect condition and without any noise the resultant accuracy comes in the range of 89% to 99% depending upon the level of noise in the fingerprint image.</p><p>By using OpenCV's Euclidean distance method we got different results when matching fingerprints. As shown in Fig. <ref type="figure" target="#fig_8">9</ref>. The time taken by Euclidean distance is much shorter when compared to SIFT+FLANN matching and as the number of templates increases this time of matching also increases.</p><p>SIFT+FLAAN based matching comes into highlight when we talk about accuracy as shown in Fig. <ref type="figure" target="#fig_9">10</ref>. Not only SIFT+FLAAN is good with accuracy as compared to others, but it also tackles  images with noises preset with it which makes this algorithm a little bit time consuming.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>The Fingerprint Scanner and Matching is a technique which is used by multiple organizations in their daily life for adding a layer of security. Increased number of crimes has made people more aware about security and risks associated with it. In this work, with low computational complexity, faster matching and with relatively good accuracy, this model can be helpful in security.With the help of image processing techniques which are available in open source helped this work to be more secure. The resultant product can detect images with rotation ( </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Flow Diagram</figDesc><graphic coords="5,89.29,84.19,416.71,136.81" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Module Diagram</figDesc><graphic coords="7,205.24,84.19,184.80,205.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Practical implementation</figDesc><graphic coords="7,198.43,328.67,198.43,135.22" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Grayscale and Resized Fingerprint</figDesc><graphic coords="8,157.84,218.51,279.60,157.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: FLANN based matching</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Fingerprint with Rotational Region</figDesc><graphic coords="9,205.24,84.19,184.80,103.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Fingerprint with Z-cut Region</figDesc><graphic coords="9,205.24,227.28,184.80,97.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Fingerprint with Faded Region</figDesc><graphic coords="9,205.24,364.36,184.80,103.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: Time Execution graph between Algorithms</figDesc><graphic coords="10,181.69,84.19,231.90,173.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Accuracy graph between Algorithms</figDesc><graphic coords="10,151.00,296.87,293.28,131.76" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head></head><label></label><figDesc>Fig 6), noises(Fig 7),blurriness(Fig 8) with good accuracy.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell>IoT Modules</cell><cell></cell></row><row><cell>Parameter</cell><cell>Value</cell></row><row><cell>Sensor Type</cell><cell>Optical</cell></row><row><cell>Sensor Lifespan</cell><cell>100 million scans</cell></row><row><cell>ESD Protection</cell><cell>15KV</cell></row><row><cell>Backlight</cell><cell>Bright green</cell></row><row><cell>Interface</cell><cell>USB1.1/UART (TTL Logical level), RS232</cell></row><row><cell cols="2">Communication Baud Rate 4800BPS 115200BPS (adjustable)</cell></row><row><cell>Dimensions</cell><cell>55 x 32 x 21.5mm</cell></row><row><cell>Image Capture Surface</cell><cell>15-18(mm)</cell></row><row><cell>Verification Speed</cell><cell>0.3 seconds</cell></row><row><cell>Scanning Speed</cell><cell>0.5 seconds</cell></row><row><cell>Character File Size</cell><cell>256 bytes</cell></row><row><cell>Template Size</cell><cell>512 bytes</cell></row><row><cell>Storage Capacity</cell><cell>250</cell></row><row><cell>Security Level</cell><cell>5 (ranging from 1 to 5, highest being 5)</cell></row><row><cell>False Acceptance Rate</cell><cell>0.0001%</cell></row><row><cell>False Rejection Rate</cell><cell>0.1%</cell></row><row><cell>Resolution</cell><cell>500 DPI</cell></row><row><cell>Voltage</cell><cell>3.6-6.0 VDC</cell></row><row><cell>Working Current</cell><cell>Typical: 90mA, Peak: 150mA</cell></row><row><cell>Matching Method</cell><cell>1: N</cell></row><row><cell>Operating Temperature</cell><cell>-20 to 45 degrees Celsius</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Optimisation of image fusion using feature matching based on sift and ransac</title>
		<author>
			<persName><forename type="first">G</forename><surname>Kaur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Indian Journal of Science and Technology</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page">47</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Public network security by bluffing the intruders through encryption over encryption using public key cryptography method</title>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sethi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kaur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Informatics for Computing Research: First International Conference, ICAICR 2017</title>
				<meeting><address><addrLine>Jalandhar, India; Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">March 17-18, 2017. 2017</date>
			<biblScope unit="page" from="249" to="257" />
		</imprint>
	</monogr>
	<note>Revised Selected Papers</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">E-gardener: building a plant caretaker robot using computer vision</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chauhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2018 4th International Conference on Computing Sciences (ICCS), IEEE</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="137" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Smart border surveillance system using wireless sensor network and computer vision</title>
		<author>
			<persName><forename type="first">N</forename><surname>Bhadwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shukla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kakran</surname></persName>
		</author>
		<ptr target="https://ieeexplore.ieee.org/document/8776749" />
	</analytic>
	<monogr>
		<title level="m">International Conference on Automation, Computational and Technology Management (ICACTM -2019</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="183" to="190" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Design and implementation of rfid access control system based on multiple biometric features</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Leyu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xinyou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yunjia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shuyao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Jun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xijia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="570" to="575" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Identity based encryption and biometric authentication scheme for secure data access in cloud computing</title>
		<author>
			<persName><forename type="first">H</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zeng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Chinese Journal of Electronics</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="254" to="259" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Biometric authentication system using dorsal hand vein pattern</title>
		<author>
			<persName><forename type="first">A</forename><surname>Poojary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chourasiya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Jha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ranbhise</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2020 International Conference on Convergence to Digital World-Quo Vadis (ICCDW), IEEE</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="3" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Algorithm of palm vein image selection for biometric authentication systems based on multidimensional markov chain</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kharina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zemtsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chernyadyev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">25th International Conference on Digital Signal Processing and its Applications (DSPA), IEEE</title>
				<imprint>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Privacy-leakage codes for biometric authentication systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Ignatenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Willems</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="1601" to="1605" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Review of the issues and a thorough investigation of biometric authentication systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Johri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Arora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), IEEE</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="892" to="897" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Physical access control based on biometrics and gsm</title>
		<author>
			<persName><forename type="first">D</forename><surname>Addy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1995" to="2001" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Using a biometric system to control access and exit of vehicles at shopping malls in south africa</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Hans</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), IEEE</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="148" to="151" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Secure access to patient&apos;s health records using speechxrays a mutli-channel biometrics platform for user authentication</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">G</forename><surname>Spanakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Spanakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Karantanas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Marias</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="2541" to="2544" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Secure biometric lock system for files and applications: a review</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Ishak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Rajendran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">I</forename><surname>Al-Sanjary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A M</forename><surname>Razali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">16th IEEE International Colloquium on Signal Processing &amp; Its Applications (CSPA)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="23" to="28" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Moving object detection and recognition using optical flow and eigen face using low resolution video</title>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kaur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Babu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sethi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science)</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="1180" to="1187" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Expar: A fuzzy rule based expert system for palmistry</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Madaan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dhiman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="5207" to="5214" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">An insight into content-based image retrieval techniques, datasets, and evaluation metrics</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">I</forename><surname>Bhat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yousuf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Jeelani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bhat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Signal Processing and RF Energy Harvesting for State of art 5G and B5G Networks</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="127" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Using a biometric system to control access and exit of vehicles at shopping malls in south africa</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Hans</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), IEEE</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="148" to="151" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Biometric authentication using cnn features of dorsal vein pattern extracted from nir image</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Tazim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M M</forename><surname>Miah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Surma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Islam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Shahnaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Fattah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">TENCON 2018-2018 IEEE Region 10 Conference</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1923" to="1927" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A rotation invariant algorithm for bimodal hand vein recognition system</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Estacio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">B</forename><surname>Linsangan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), IEEE</title>
				<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A comparative study of vein pattern recognition for biometrie authentication</title>
		<author>
			<persName><forename type="first">H</forename><surname>Thakuria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dutta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sarkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ghosal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Saha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pramanik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mitra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Mukherjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><forename type="middle">N</forename><surname>Thakur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mukherjee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEEE</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="689" to="694" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Biometric authentication using convolutional neural networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Oleshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chernov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bagmut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Smirnova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conference on Mathematical Control Theory</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="85" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Palm vein recognition method based on fusion of local gabor histograms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Xin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xiaojun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of China Universities of Posts and Telecommunications</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="55" to="66" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Various biometric authentication techniques: a review</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kalyani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Biometrics &amp; Biostatistics</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">371</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Palmprint and palmvein recognition based on dcnn and a new large-scale contactless palmvein dataset</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">78</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Investigating palm vein pattern recognition methods</title>
		<author>
			<persName><forename type="first">E</forename><surname>Kurbatova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kharina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zemtsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Plyaskin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2022 24th International Conference on Digital Signal Processing and its Applications (DSPA), IEEE</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
