207 multi model biometrics data retrieval through big-databiometrics devices typically used are hand...

5
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www Multi Model Biome Mr. Man Babumadhav Institut ABSTRACT This study is devoted to Big Data biometric technologies. Before th database were not capable to handle the of data, so we highlight the concept of u technology in solution of a wide range o by the national security, law enforceme defence authorities. The study provide about Big Data in the field of biometric Keyword: Biometrics, Big Data, Hadoop. INTRODUCTION Big Data Big data means really a big data; it is a large datasets that cannot be pro traditional computing techniques or it that are voluminous and complex da challenges include capturing data, data analysis, search, sharing, transfer, querying, updating, and information priv The main purpose of Big Data is efficiency for using the large volume o Big Data is used in proper manner than can pursue new business model and competitive advantages. It includes huge volume, high velocity, variety of data. The data in it can be of three types: 1. Structured data: It can be Relational 2. Semi Structured data: They are in data. 3. Unstructured data: It consists of Wo Media files. nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct etrics Data Retrieval Through: nish Vala 1 , Kajal Patel 2 , Harsh Lad 2 1 Assistant Professor, 2 Student te of Information Technology Bardoli, Gujarat, I problems in he traditional e large amount using Big Data of issues faced ent system and es information technology. Recognition, a collection of ocessed using is set of data ata. Big Data a storage, data visualization, vacy s to improve of data. If the n organizations d can achieve and extensible Data. form of XML ord, PDF, Text, Characteristics of Big Da Figure1. Characteristics 1. Volume: When talking about the Vo insanely large amount of data 2. Variety: It refers to the different structured, semi-structure and doesn’t fit easily into database 3. Velocity: It refers to the speed of data generated every second. Exam 4. Veracity: It refers to the trustworthiness accuracy. 5. Value: It means having large amount useless if it can’t be turned int Advantages of Big Data 1. Using the information kep the marketing agencies response for the campaign advertising medium. Ex:-In 2. Companies are allowed to data in digital format. 3. Using the data regarding history patients, hospital a quick service. evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 1273 : Big-Data India ata s of Big Data [13] olume, it refers to the or quantity of data. data types, degree of unstructured data which e application. a how fast the data are mple: Google, Facebook. s of the data in terms of of data is good, but it is to values. pt in the social network are learning about the ns, promotions, and other nstagram. store more transactional g the pervious medical are providing better and

Upload: others

Post on 08-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 207 Multi Model Biometrics Data Retrieval Through Big-Databiometrics devices typically used are hand geometry reader and fingerprint authentication. In Paper [8], discussed about the

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Multi Model Biometrics Data Retrieval Through: BigMr. Manish Vala

Babumadhav Institute

ABSTRACT This study is devoted to Big Data problems in biometric technologies. Before the traditional database were not capable to handle the large amount of data, so we highlight the concept of using Big Data technology in solution of a wide range of issues faced by the national security, law enforcement system and defence authorities. The study provides information about Big Data in the field of biometric technology. Keyword: Biometrics, Big Data, Recognition,Hadoop. INTRODUCTION � Big Data Big data means really a big data; it is a collection of large datasets that cannot be processed using traditional computing techniques or it is set of data that are voluminous and complex data. Big Data challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, and information privacy The main purpose of Big Data is to improve efficiency for using the large volume of data. If the Big Data is used in proper manner thancan pursue new business model and can achieve competitive advantages. It includes huge volume, high velocity, and extensible variety of data. The data in it can be of three types: 1. Structured data: It can be Relational Data.2. Semi Structured data: They are in form of XML

data. 3. Unstructured data: It consists of Word, PDF, Text,

Media files.

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Multi Model Biometrics Data Retrieval Through: Big

Manish Vala1, Kajal Patel2, Harsh Lad2 1Assistant Professor, 2Student

Institute of Information Technology Bardoli, Gujarat, India

Data problems in biometric technologies. Before the traditional database were not capable to handle the large amount of data, so we highlight the concept of using Big Data technology in solution of a wide range of issues faced

w enforcement system and defence authorities. The study provides information about Big Data in the field of biometric technology.

Biometrics, Big Data, Recognition,

Big data means really a big data; it is a collection of large datasets that cannot be processed using traditional computing techniques or it is set of data that are voluminous and complex data. Big Data

ata, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, and information privacy

The main purpose of Big Data is to improve efficiency for using the large volume of data. If the Big Data is used in proper manner than organizations can pursue new business model and can achieve

It includes huge volume, high velocity, and extensible

Structured data: It can be Relational Data. Semi Structured data: They are in form of XML

Unstructured data: It consists of Word, PDF, Text,

� Characteristics of Big Data

Figure1. Characteristics of Big Data [13]1. Volume: When talking about the Volume, it refers to the insanely large amount of data or quantity of data.2. Variety: It refers to the different data types, degree of structured, semi-structure and unstructured data which doesn’t fit easily into database application.3. Velocity: It refers to the speed of data how fast the data are generated every second. Example: Google, Facebook.4. Veracity: It refers to the trustworthiness of the data in terms of accuracy. 5. Value: It means having large amount of data is good, but it is useless if it can’t be turned into values. � Advantages of Big Data 1. Using the information kept in the social network

the marketing agencies areresponse for the campaigns, promotions, and oadvertising medium. Ex:-Instagram.

2. Companies are allowed to store more transactional data in digital format.

3. Using the data regarding the pervious medical history patients, hospital are providing better and quick service.

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 1273

Multi Model Biometrics Data Retrieval Through: Big-Data

India

Characteristics of Big Data

cs of Big Data [13]

When talking about the Volume, it refers to the insanely large amount of data or quantity of data.

It refers to the different data types, degree of structure and unstructured data which

easily into database application.

It refers to the speed of data how fast the data are generated every second. Example: Google, Facebook.

It refers to the trustworthiness of the data in terms of

g large amount of data is good, but it is ’t be turned into values.

Using the information kept in the social network the marketing agencies are learning about the

for the campaigns, promotions, and other Instagram.

Companies are allowed to store more transactional

Using the data regarding the pervious medical patients, hospital are providing better and

Page 2: 207 Multi Model Biometrics Data Retrieval Through Big-Databiometrics devices typically used are hand geometry reader and fingerprint authentication. In Paper [8], discussed about the

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

4. Some grate benefits of Big Data are cost reduction, Real time website customization, swift – better decision making.

� Biometric Recognition It is a technology used to identify, analyze and measure an individual’s physical and behavioural characteristics. Those data are captuhuman body and are compared to the data that are stored in set of database. The common biometric authentication techniques used is Finger prints biometric authentication. Some other techniques which can be used are Face recognition, Iris Scan, voice Recognition. Today biometrics system have been implemented incommercial, civilian and forensic application as a means of establishing identity. Biometrics is used for authenticating and authorizing a person. Authentication of a person through biometric is highly challenging. It is used in forensics, secured access, prison security, medical, and robotics areas financial services, ecommerce, telecommunication, government, traffic and many more. New technology or technique can be used is ear recognition of individuals. Biometrics authentication has two types of Model for Authentication Process: 1. Unimodal Unimodal biometrics refers to the use of only onbiometrics modalities in an identification system.Example: Fingerprint recognition 2. Multimodal Multimodal biometrics refers to the use of a combination of two or more biometrics modalities in an identification system Example: Face recognition and Iris scan.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

f Big Data are cost reduction, Real time website customization, swift

It is a technology used to identify, analyze and physical and behavioural

characteristics. Those data are captured from the human body and are compared to the data that are

The common biometric authentication techniques authentication. Some

other techniques which can be used are Face an, voice Recognition. Today

biometrics system have been implemented in various commercial, civilian and forensic application as a

metrics is used for authenticating and authorizing a person. Authentication of a person through biometric is highly challenging. It is used in forensics, secured access, prison security, medical, and robotics areas financial services, ecommerce,

ication, government, traffic and many more. New technology or technique can be used is ear

Biometrics authentication has two types of Model for

Unimodal biometrics refers to the use of only one biometrics modalities in an identification system.

Multimodal biometrics refers to the use of a combination of two or more biometrics modalities in

s scan.

LITERATURE REVIEW: In Paper [6],It gives the importance of using big data in order to support decision for the strategies and they also chose to invest more in processing larger data sets than investing in algorithmsIt also states that working with large amount of data is a challenging work but it provides better output. The paper also provides the brief introduction to the Hadoop technology with its computing solutions. It also uses the concept of multiand its importance. It provides the concept of big data and the technologies involved to understand the new technology. In paper, it provide new different techniques to store the data. In Big Data provides three main characteristics high volume, high velocity & high variety. It is cost effective in storing the data and helps in better decision making. Now a day`s, it helps in securing lodata. It also represents the concept of multi model biometric data through big data. It also have an brief idea about the Unimodal biometric system. The

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 1274

6],It gives the importance of using big data in order to support decision for the strategies and they also chose to invest more in processing larger data sets than investing in algorithms which are expensive. It also states that working with large amount of data is a challenging work but it provides better output.

The paper also provides the brief introduction to the Hadoop technology with its computing solutions. It

t of multi-node Hadoop cluster and its importance. It provides the concept of big data and the technologies involved to understand the new

vide new different techniques to store the data. In Big Data provides three main characteristics high volume, high velocity & high variety. It is cost effective in storing the data and helps in better decision making.

Now a day`s, it helps in securing locations and other data. It also represents the concept of multi model biometric data through big data. It also have an brief idea about the Unimodal biometric system. The

Page 3: 207 Multi Model Biometrics Data Retrieval Through Big-Databiometrics devices typically used are hand geometry reader and fingerprint authentication. In Paper [8], discussed about the

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

biometrics devices typically used are hand geometry reader and fingerprint authentication. In Paper[8], discussed about the big data and big data challenges in biometrics. It highlights the use of big data technologies. It also provides characteristics of the big data and types of data which can bestructured, semi structured unstructured data. It provides the information about the biometrics and problems that are occurred in biometric technologies. Brief discussion about the cloud technologies regarding how the cloud technology can be used torecognize the person’s characteristics. They are working on developing advance big data capabilities to prevent from terrorism and criminal investigation. In Paper [9], Discussed about the Unimodal and multi-modal biometric system. Multi-modal provides the reasons for reducing the rates. Levels of Fusion used in multimodal biometric system. It also provides the comparison between the Unimodal and multimodal and limitations of Unimodal can be overcome by the multimodal. In paper [2], The discussion is done about the ear recognition system. It is the currently used technology in biometric identification of human and it is quite complex task. It also provides the brief information about the model used for biometric authenticationUnimodal and multimodal. It also provides discussion about the existing techniques of human Authentication and identification – fingerprints (overview of fingerprint recognition with its operation, limitation and area of application and what instruments are required to identify the fingerprints.) same for face recognition and Iris scan. Main it provides how the ear recognition is done and the usefulness of ear based biometric identification system. In Paper [10], Multimode biometrics is suitable for mobile, PDAs, smart phones. They are portable subject to loss and theft. The use of enhanced security mechanism as biometric authenticationteeth image and voice authentication. It is fact that the military deploys largest use of mobile devices of which are embedded system with tactics and military intelligence. Authentication to such by teeth image and voice, it will become difficult to the security of such device in the event of its loss or misplace.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

biometrics devices typically used are hand geometry

[8], discussed about the big data and big data challenges in biometrics. It highlights the use of big data technologies. It also provides characteristics of the big data and types of data which can be generated-

d unstructured data. It provides the information about the biometrics and problems that are occurred in biometric technologies.

Brief discussion about the cloud technologies regarding how the cloud technology can be used to

teristics. They are working on developing advance big data capabilities to prevent from terrorism and criminal investigation.

[9], Discussed about the Unimodal and modal provides

rates. Levels of Fusion used in multimodal biometric system. It also provides the comparison between the Unimodal and multimodal and limitations of Unimodal can be

[2], The discussion is done about the ear system. It is the currently used technology

in biometric identification of human and it is quite complex task. It also provides the brief information

authentication-

about the existing techniques of human Authentication and identification

fingerprints (overview of fingerprint recognition with its operation, limitation and area of application and what instruments are required to identify the

ace recognition and Iris scan. Main it provides how the ear recognition is done and the usefulness of ear based biometric identification

is suitable for mobile, PDAs, smart phones. They are portable

ss and theft. The use of enhanced security biometric authentication. The use of

teeth image and voice authentication. It is fact that the gest use of mobile devices of

which are embedded system with tactics and military intelligence. Authentication to such by teeth image and voice, it will become difficult to the security of such device in the event of its loss or misplace.

In Paper [11],Discussion about multimodal biometrics application and research area. It is used to combine two or more different sources of person sensed by different sensors. It include border management, interface for criminal and civil applications, and first responder verification. System can be improved by enhancing matching algorithms, integration of multiple sensor, and analysis of the scalability of biometrics system. Signature recognition requires little space to store the data. A disadvantage for signature recoindividuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification. Iris scan is believed to be highly stable over lifetime and uses an infrared imager to illuminate the eye very high-resolution image. Iris scan is difficult to capture for some individuals. In voice recognition sound sensations of a person iscompared to an existing dataset. Voice recognition Difficult to control sensor and chasignificantly impact. PROPOSED MODEL The multi model biometric data handling through big data framework is proposed. The multi model biometric framework first reads video, sound, etc.) data from user. Once the data collected from the user the data is been entered into application framework. It identifies the biometric type and converts those data into binary form, same procedure is followed for other biometric data. The converted data are been merged into single bdetail by using the algorithm. encrypted using the encryption algorithm. The authentication process, done when the user comes for biometric authentication, the multi model biometric framework reads the data of user than identify the type of biometric data and converts the data into binary data. Binary data is encrypted and those encrypted data is compared to the biometric data. If the compared data is matched with the data in database than it retrieves the binary data. Afterextracting binary data from big data Hadoopframework API, data will be decrypted and convert into original data form and user will get the real time authentication though multi model biometric framework.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 1275

scussion about multimodal biometrics application and research area. It is used to combine two or more different sources of person sensed by different sensors. It include border management, interface for criminal and civil applications, and first

verification. System can be improved by enhancing matching algorithms, integration of multiple sensor, and analysis of the scalability of

Signature recognition requires little space to store the disadvantage for signature recognition is that

individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification. Iris scan is believed to be highly stable over lifetime and uses an infrared imager to illuminate the eye and capture a

resolution image. Iris scan is difficult to capture for some individuals. In voice recognition sound sensations of a person is measured and compared to an existing dataset. Voice recognition Difficult to control sensor and channel variances that

The multi model biometric data handling through big data framework is proposed. The multi model biometric framework first reads biometric (image,

) data from user. Once the data is collected from the user the data is been entered into application framework. It identifies the biometric type and converts those data into binary form, same procedure is followed for other biometric data. The converted data are been merged into single biometric

The binary data are now encrypted using the encryption algorithm.

The authentication process, done when the user comes for biometric authentication, the multi model biometric framework reads the data of user than

ntify the type of biometric data and converts the data into binary data. Binary data is encrypted and those encrypted data is compared to the biometric data. If the compared data is matched with the data in database than it retrieves the binary data. After extracting binary data from big data Hadoop framework API, data will be decrypted and convert into original data form and user will get the real time

h multi model biometric

Page 4: 207 Multi Model Biometrics Data Retrieval Through Big-Databiometrics devices typically used are hand geometry reader and fingerprint authentication. In Paper [8], discussed about the

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Figure 7 Proposed Model of Hadoop [20] PROPOSED ALGORITHM: � K-means clustering algorithm: This algorithm is used for creating and analyzing clusters. ‘N’ number of data points are divided into ‘k’ cl uster. Results generated from the algorithm is dependent on choosing the initial cluster centroid. The main feature, if data is arranged into a matrix, with row representing data points and column representing attributes of each data points, than matrix might not have defined values at many places. Algorithm: All data points have maximum M dimension which can be represented as row of M values (v1, v2….,vM).Select any m dimension from the data points. Arrange them in descending order of priority as, (dd2…, dm).The first dimension is known as primary dimension and others are called secondary dimension. Number of cluster is pre-decided-‘k’ which is an input to the algorithm. Step 1: the variation of each dimension is

considered as, (max-min)/k, 1where max is the maximum value of i dimension and the min is the minimum value of i dimension.

Step 2: Initial cluster are formed using following conditions for data point, if min1 + j * $1 <= val1 <mi1 + (j+1) * $1, the data point belongs to cluster j.

Step 3: Centroid of each cluster is computed means of all cluster points.

Step 4: Every secondary dimension, 2the same.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Proposed Model of Hadoop [20]

This algorithm is used for creating and analyzing the number of data points are divided into

uster. Results generated from the algorithm is dependent on choosing the initial cluster centroid.

The main feature, if data is arranged into a matrix, with row representing data points and column representing attributes of each data points, than matrix might not have defined values at many places.

All data points have maximum M dimension which can be represented as row of M values (v1, v2…., vM).Select any m dimension from the data points. Arrange them in descending order of priority as, (d1, d2…, dm).The first dimension is known as primary dimension and others are called secondary dimension.

’ which is an input

the variation of each dimension is min)/k, 1<= i<=m.

where max is the maximum value of i dimension and the min is the minimum value

Initial cluster are formed using following conditions for data point, if min1 + j * $1 <= val1 <mi1 + (j+1) * $1, the data point

Centroid of each cluster is computed means

Every secondary dimension, 2≤j≤m,repeat

3.2 Map – Reduce Algorithm:It is a distributed data processing algorithm, useful for processing huge amount ofenvironment. This algorithm uses the concept of divide and conquer algorithm to process large amount of data. The input is divided into smaller and manageable subtasks to execute them parallel. This algorithm uses three main steps:1. Map Function 2. Shuffle Function 3. Reduce Function Algorithm: Map function: In this step, it takesdivide the task into smaller subsub-steps: 1. Splitting: takes input and divide into smaller sub

datasets. 2. Mapping: takes smaller sub

action on each sub-datasets. Shuffle function: In this step, alsophase. It performs two sub-steps:1. Merging: combines all key

same key. 2. Sorting: takes the input from merging step and

sort all key-value pair by using keys. Reduce function: In this step, it takessorted key-value pairs from shuffle function and perform reduce operation.

Figure8. Architecture of Map Conclusion and Future work:The literature survey done in this paper provides a new insight in different technique to store data into big data in the field of biometrics recognition. Big data provides high volume, high velocity and high variety of information. Big data provides the cost effective framework to store data. The scale of the biometric data to ensuring the integrity of biometric data by elimination duplicate records.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 1276

Reduce Algorithm: It is a distributed data processing algorithm, useful for processing huge amount of data in cluster

This algorithm uses the concept of divide and conquer algorithm to process large amount of data.

The input is divided into smaller and manageable sub-tasks to execute them parallel.

This algorithm uses three main steps:

In this step, it takes input tasks and divide the task into smaller sub-tasks. It follows two

Splitting: takes input and divide into smaller sub-

Mapping: takes smaller sub-datasets and perform datasets.

In this step, also known as combine steps:

nes all key-value pairs which have

Sorting: takes the input from merging step and value pair by using keys.

In this step, it takes the list of value pairs from shuffle function and

8. Architecture of Map – Reduce [18]

Conclusion and Future work: The literature survey done in this paper provides a new insight in different technique to store data into big data in the field of biometrics recognition. Big ata provides high volume, high velocity and high

variety of information. Big data provides the cost effective framework to store data. The scale of the biometric data to ensuring the integrity of biometric data by elimination duplicate records.

Page 5: 207 Multi Model Biometrics Data Retrieval Through Big-Databiometrics devices typically used are hand geometry reader and fingerprint authentication. In Paper [8], discussed about the

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Today, the primary application of biometrics is in physical security: to control access to secure locations (rooms or buildings). Biometric system which rely on the evidence of multiple sources of information for establishing identity are called Multimodal biometrisystem. This paper presents an overview of multimodal biometrics data handling through big data. It also discuss their applications to develop the security system for high security areas. A lot of research work is still need in this area. In near future multi model biometric data handling can apply to enhance the security, real time response and cost cutting approach of our system. References: Research Paper 1. Taruna Panchal, Dr. AjitSingh, s

Biometric System", International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 5, May 2013.

2. Sukhdeep Singh, Dr. Sunil KumarReview on Biometrics and Ear RecognTechniques” , International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3 , Issue 6 , June 2013.

3. Khalid Adam Ismail Hammad ,Adam Ibrahim Fakharaldien , Jasni Mohamed Zain , Mazlina Abdul Majid , “Big Data Analysis and Storage” , Proceedings of the 2015 International Conference on Operations Excellence and Service Engineering Orlando, September 10-11, 2015.

4. Amir Gandomi, MurtazaHaider, hype: Big data concepts, methods, and analyticsInternational Journal of Information ManagementElsevier (2015), Pg no. 137–144.

5. Stephen J. Elliott, Kevin O’ConnorBartlow, Joshua J. Robertson andGuest “Expanding the Human-BiometricInteraction Model to Identity Claim ScenariosResearch gate - Conference Paper · March 2015.

6. Elena Geanina ULARU, Florina Camelia PUICAN, Anca APOSTU, Manole VELICANU, “Perspectives on Big Data and Big Data Analytics”, Database Systems Journal vol. III, no. 4/2012.

7. Ravi Subban and Dattatreya P. MankameStudy of Biometric Approach UsingRecognition” Lecture Notes onEngineering, Vol. 1, No. 2, May 2013.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

e primary application of biometrics is in physical security: to control access to secure locations (rooms or buildings). Biometric system which rely on the evidence of multiple sources of information for establishing identity are called Multimodal biometric system. This paper presents an overview of multimodal biometrics data handling through big data. It also discuss their applications to develop the

A lot of research work is still need in this area. In near e multi model biometric data handling can apply

to enhance the security, real time response and cost

s “Multimodal International Journal of

Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 5, May

Sukhdeep Singh, Dr. Sunil Kumar Singla , “A Review on Biometrics and Ear Recognition

International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3 , Issue 6 , June 2013. Khalid Adam Ismail Hammad , Mohammed Adam Ibrahim Fakharaldien , Jasni Mohamed

ig Data Analysis ” , Proceedings of the 2015

International Conference on Operations Excellence and Service Engineering Orlando,

“Beyond the hype: Big data concepts, methods, and analytics”, International Journal of Information Management-

’Connor, Eric and Richard M. Biometric Sensor

Claim Scenarios”, Conference Paper · March 2015.

Elena Geanina ULARU, Florina Camelia Manole VELICANU,

“Perspectives on Big Data and Big Data Database Systems Journal vol. III, no.

Subban and Dattatreya P. Mankame, “A Using Fingerprint

on Software Engineering, Vol. 1, No. 2, May 2013.

8. ShafagatMahmudova, “Big DataBiometric Technology”, Management Engineering, 2016, 5, 15

9. Ms. Priya N. Ghotkar1, Prof. Vikas G. Bhowate2,10. Julius N. Obidinnu, Ayei E. Ibor,

“Improving the Security of MANETs Oriented Military Intelligence using BiometricsAuthentication TechnologiesJournal (SCIRJ), Volume 2, Issue 1, January 2014.

11. Prof. Vijay M. Mane, Prof. (Dr.)Jadhav, “Review of Multimodal Biometrics: Applications, challenges and Research AreasInternational Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5.

12. Mugdhajain, ChakradharVermameans for Clustering in Big DataJournal of Computer Applications (0975 Volume 101– No.1, September 2014.

13. https://www.pinkelephantasia.ccontent/uploads/2017/10/Five

14. https://www.google.co.in/searcdata&dcr=0&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjd8qjMvZPZAhXKuY8KHVbbBt8Q_AUICigB&biw=1366&bih=626#imgroKBgB1M:

15. https://disruptionhub.com/10recognition-technology/

16. https://www.dreamstime.com/seye-biometrics-retina-scanverification-identity-conceptmodern-contemporary-technologyimage73611262

17. https://www.dreamstime.com/seye-biometrics-retina-scanverification-identity-conceptmodern-contemporary-technologyimage73611262

18. https://www.google.co.in/searcon&hl=en&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjRwoKD5ZraAhXDLI8KHSQyCOsQ_AUICigB&biw=1366&bih=626#imgrOe9XkTsWM:

19. https://www.google.co.in/searcognition&source=lnms&tbm=isch&sa=X&ved=0ahUKE wiTpbCo5JraAhXLvI8KHfvMD1wQ_AUICigB&biw=1366&bih=675#imgrc=bv5hNlYM:

20. https://www.google.co.in/?gfe_rYKKDPHy8AeOzYKQC

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 1277

“Big Data Challenges in I. J. Education and

Engineering, 2016, 5, 15-23. Prof. Vikas G. Bhowate2,

Julius N. Obidinnu, Ayei E. Ibor, S. O. O. Duke, “Improving the Security of MANETs Oriented Military Intelligence using Biometrics Authentication Technologies”, Scientific Research Journal (SCIRJ), Volume 2, Issue 1, January

Prof. Vijay M. Mane, Prof. (Dr.) Dattatray V. Multimodal Biometrics:

Applications, challenges and Research Areas”, International Journal of Biometrics and

tics (IJBB), Volume 3, Issue 5. Mugdhajain, ChakradharVerma,” Adapting k-

Big Data”, International Computer Applications (0975 – 8887)

No.1, September 2014. https://www.pinkelephantasia.com/wp-content/uploads/2017/10/Five-Vs-Big-Data.png https://www.google.co.in/search?q=5+vs+of+big+

e=lnms&tbm=isch&sa=X&vedKEwjd8qjMvZPZAhXKuY8KHVbbBt8Q

_AUICigB&biw=1366&bih=626#imgrc=tLYr07e

https://disruptionhub.com/10-uses-facial-

https://www.dreamstime.com/s tock-illustration-scan-emblem-virtual-

concept-scanning-biometry-technology-

https://www.dreamstime.com/s tock-illustration-scan-emblem-virtual-

concept-scanning-biometry-technology-

e.co.in/search?q=face+recognitie=lnms&tbm=isch&sa=X&ved=

KEwjRwoKD5ZraAhXDLI8KHSQyCOsQ _AUICigB&biw=1366&bih=626#imgrc=wO2UT

le.co.in/search?q=Signature+recnms&tbm=isch&sa=X&ved=0

wiTpbCo5JraAhXLvI8KHfvMD1wQ_A UICigB&biw=1366&bih=675#imgrc=boGW3Xo

https://www.google.co.in/?gfe_rd=cr&ei=7xIGW A