International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.5, No.2, Jan. 2013

Fingerprints, Iris and DNA Features based Multimodal Systems: A Review

Full Text (PDF, 1017KB), PP.88-111

Views:157   Downloads:5


Prakash Chandra Srivastava, Anupam Agrawal, Kamta Nath Mishra, P. K. Ojha, R. Garg

Index Terms

DNA Sequence, Fingerprint Patterns, Iris Pattern, Multimodal Systems, Palates


Biometric systems are alternates to the traditional identification systems. This paper provides an overview of single feature and multiple features based biometric systems, including the performance of physiological characteristics (such as fingerprint, hand geometry, head recognition, iris, retina, face recognition, DNA recognition, palm prints, heartbeat, finger veins, palates etc) and behavioral characteristics (such as body language, facial expression, signature verification, speech recognition, Gait Signature etc.).
The fingerprints, iris image, and DNA features based multimodal systems and their performances are analyzed in terms of security, reliability, accuracy, and long-term stability. The strengths and weaknesses of various multiple features based biometric approaches published so far are analyzed. The directions of future research work for robust personal identification is outlined.

Cite This Paper

Prakash Chandra Srivastava, Anupam Agrawal, Kamta Nath Mishra, P. K. Ojha, R. Garg,"Fingerprints, Iris and DNA Features based Multimodal Systems: A Review", International Journal of Information Technology and Computer Science(IJITCS), vol.5, no.2, pp.88-111, 2013.DOI: 10.5815/ijitcs.2013.02.10


[1]Abhyankar Aditya, Schuckers Stepanie. Integrating a wavlet based perspiration liveness check with fingerprint recognition. Pattern Recognition, Elsevier, 2009, 42: 452-464. 

[2]Anthonioz A., Egli N., Champod C., Neumann C., et al. Level 3 Details and their Role in Fingerprint Identification: A Survey among Practitioners. Journal of Forensic Identification, 2008, 58(5): 562-589.

[3]Apostolico Alberto, Lonardo Stefano. Compression of Biological Sequences By Greedy Off-Line Textual Substitution. In: Data Compression Conference, 2000, 143 – 150. 

[4]Azizi Amir, Pourreza Hamid Reza. Efficient Iris Recognition Through Improvement of Feature Extraction and subset Selection. International journal of computer science and information security, 2009, 2(1): 71 – 80.

[5]Baig Asim, Ahmed Bouridane, Fatih Kurugollu et al. Fingerprint - Iris fusion based identification system using a single Hamming Distance Matcher. International journal of Bio- science and Bio-Technology, 2009,1(1): 9 – 12.

[6]Bana Sangram, Kaur Davinder. Fingerprint Recognition using Image Segmentation. Journal of Advanced Engineering Science and Technology, 2011, 5(1): 12 – 23.

[7]Belkin M., Niyogi P. Laplace Eigen maps for Dimensionality Reduction and Data Representation. Neural Computation, MIT Press, 2003, 15: 1373-1396. 

[8]Benhammadi Farid, Kihal Nassima. Personal Authentication Based on Iris Texture Analysis. In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA, 2008, 537 – 543.

[9]Bhuyan Hussain Monowar, Saharia Sarat, Bhattacharyya K. An Effetcive Method for fingerprint Classification. International Arab Journal of e-Technology, 2010, 1(3): 89 – 97.

[10]Bohm Igor, Tester Florian. Biometric Systems: Report. Department of Telecooperation. University of Linz, Austria, 2004, 1-7.

[11]Bowyer Kevin W., Hollingsworth Karen, Flynn Partrick J. Image understanding for iris biometrics : A survey. Computer Vision and Image Understanding, Elsevier,2008, 110: 281-307. 

[12]Caldas I. M., Magathaes T., Afonso A. Establishing Identity Using Cheiloscopy and palatoscopy. Forensic Science International, 2007, 165: 1-9.

[13]CASIA. Iris Image Database—Iris Recognition Research Group of National Laboratory of Pattern Recognition (NLPR), Institute of Automation. Chinese Academy of Sciences, July 2010, [Online], Available:

[14]Chen Xin, Li Ming, Ma Bin et al. DNA Compress: Fast and Effective DNA Compression. Bioinformatics Applications Note, 2002, 18(12): 1696 – 1698.

[15]Chen Xinjian, Tian Jie, Yang Xin. A New Algorithm for Distorted Fingerprints Matching Based on Normalized Fuzzy Similarity Measure. IEEE Transactions on Image Processing, 2006, 15(3): 767-776.

[16]Chetty G., Wagner M. Robust Face-Voice Based Speaker Identity Verification Using Multilevel Fusion. Image and Vision Computing, Elsevier, 2009, 26: 1249-1260. 

[17]Choras Michal. Ear Biometrics Based on Geometrical Feature Extraction. Electronic Letters on Computer Vision and Image Analysis, 2005, 5(3), 84-95.

[18]Chowhan S. S., Shinde G. N. Iris Biometrics Recognition Application in Security Management. ICCES, 2008, 6(1):1-12.

[19]Danese G., Giachero M., Leporati F. et al. An embedded multi-core Biometric identification system. Microprocessors and Microsystems, Elsevier, 2011, 35(5): 1-12.

[20]Daugman John. Demodulation by complex-valued wavelets for stochastic pattern recognition. International Journal of Wavelets, Multi-resolution and Information Processing, World Scientific, 2003, 1(1): 1-17.

[21]Daugman John. How Iris Recognition works. IEEE Transaction on Circuits and Systems for Video Technology, 2004, 14(1): 21-30. 

[22]Daugman John. Probing the uniqueness and randomness of Iris Codes: Results from 200 billion iris pair comparisons. In: Proceedings of the IEEE, 2006, 94(11): 1927-1935.

[23]Daugman John. New methods in iris recognition. IEEE Trans. on Systems, Man, Cybernetics B, 2007, 37(5): 1167-1175.

[24]Doroteo T. Toledano Usability evaluation of multi-modal biometric verification systems. Interacting with Computers, Elsevier, 2006, 18: 1101–1122. 

[25]Etignu H., Erzin E., Yemez Y. et al. Multimodal Speaker/Speech Recognition Using Lip Motion Lip Texture and Audio. Signal Processing, Elsevier, 2006, 86(12): 3549–3558. 

[26]Fakhry Hussein H., Cardozo Benedict Bernard. Research and Development of Iris Based Recognition System For Identification and Secure Authentication, IT Emerging Commercial Capabilities and Terrorism. ProCon Ltd. Bulgaria, 2006, 39 – 57..

[27]Fakourfar Hourieh, Belongie Serge. Fingerprint Recognition System Performance in the maritime Environment. In: Workshop on Applications of Computer Vision, Snowbird, 2009, 1- 5.

[28]Feng J., Ouyang Z., Cai A. Fingerprint Matching Using Ridges. Pattern Recognition, 2006, 39(11): 2131-2140. 

[29]Feng J. Combining Minutiae Descriptors for Fingerprint Matching. Pattern Recognition, 2008, 41(1): 342-352.

[30]Ganeshan Balaji, Theckedath Dhananjay, Young Rupert et al. Biometric iris recognitions system using a fast and robust localization and alignment procedure. Optics and Lasers in Engineering, 2006, 44: 1-24.

[31]Gu J., Zhu J., Yang C. Fingerprint Recognition by Combining Global Structure and Local Cues. IEEE Trans. on Image Processing, 2006, 15(7): 1952-1964. 

[32]Hao Feng, Daugman John, Piotr Zielinski. A fast search algorithm for a large fuzzy database. IEEE transaction on information forensics and security , 2008, 3(2): 203 – 212.

[33]Hashiyada Masaki. DNA Biometrics. InTech publisher Japan, 2004, 139-154.

[34]Hashiyada Masaki. Development of biometric DNA ink for Authentication Security. Tohoky Journal of Exp. Med., 2004, 204(2): 109-117. 

[35]Heikki Ailisto, Elena Vildjiounaite, Mikko Lindholm et al. Soft Biometrics Combining Body Weight and Fat Measurements with Fingerprint Biometrics. Pattern Recognition Letters, Elsevier, 2006, 27(5): 325–334. 

[36]Ito Koichi, Morita Ayumi, Aoki Takafumi et al. A Fingerprint Recognition Algorithm Combining Phase-Based Image Matching and Feature-Based Matching. Lecture Notes in Computer Science, ICB2006, 316-325. 

[37]Jaam Jihad, Rebaiaia Mohamed, Hansah Ahamad. A Fingerprint Minutiae Recognition System Based on Genetic Algorithms. International Arab Journal of Information Technology, 2006, 3(3): 242 – 248. 

[38]Jain Anil. K., Hong Lin, Bolle Ruud. On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1997, 19(4): 302-314. 

[39]Jain Anil K., Hong Lin, Pankati Sharath et al. An Identity-Authentication System Using Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1997, 85(9): 1365-1388. 

[40]Jain Anil K., Hong Lin, Kulkarni Vatin. A Multimodal Biometric System Using Fingerprint, Face and Speech. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20(12): 1295 – 1307. 

[41]Jain Anil K., Chen Y., Demirkus M. Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features. IEEE Trans. Pattern Analysis and Machine Intelligence, 2007, 29(1): 15 – 27. 

[42]Jain Anil K. Evaluation of Latent Fingerprint Technologies. 2007, [Online], Available:

[43]Jain Anil K., Feng J., Nagar A. et al. On Matching Latent Fingerprints. In: Proc. of IEEE Computer Vision and Pattern Recognition Workshop on Biometrics, 2008, 1-8. 

[44]Jain Anil K., Feng Jianjiang. Latent Palm Print Matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009, 31(6): 1032 – 1047. 

[45]Jain Anil K., Feng Jiang. Latent Fingerprint Matching. IEEE transactions on Pattern Analysis And Machine Intelligence, 2011, 33(1): 88-100. 

[46]Jea T. Y., Govindaraju V. A Minutia-Based Partial Fingerprint Recognition System. Pattern Recognition, Elsevier, 2005, 38(10): 1672-1684. 

[47]Jhamb Mansi, Khera Vinod K. Iris based human recognition system. International Journal of Biometrics and Bioinformatics, 2011, 5(1): 1 – 9. 

[48]John Vacca. Biometric Technologies and Verification Systems. A book of Butterworth-Heinemann publisher, Elsevier, 2007, 1 – 625. 

[49]Jung Woon Ho. Fast fingerprint Recognition using Spiral. Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, 2011, 1–7, [online]. Available: 

[50]Kapali S, Townsend G., Richards L. et al. Palatal Rugae Patterns. Australian Aborigines and Caucasians. Australian Dental Journal, 1997, 42: 129-133. 

[51]Khan M. K., Xie Ling, Zhang Jiashu. Choas and NDFT based spread spectrum concealing of fingerprint-biometric data into audio signals. Digitla Signal Processing, Academic Press, 2010, 20(1): 179-190. 

[52]Komarinski P. Automated Fingerprint Identification Systems (AFIS). A book published by Academic Press, Elsevier, 2005, 1 – 249. 

[53]Ko T., Krishnan R. Fingerprint and Face Identification for Large User Population. Systematics Cybernetics and Informatics, 1(3): 87–92. 

[54]Korodi Gregely, Tabus Ioan. An Efficient Normal Maximum Likelihood Algorithm for DNA sequence compression. ACM Transactions on Information Systems, 2005, 23(1): 3 – 34. 

[55]Kumar Ajay, David C.M., Wong B. Et al. Personal authentication using hand images. Pattern Recognition Letters, Elsevier, 2006, 27(13): 1478–1486. 

[56]Kumar V.D. Ambeth, Ramkrishnan M. Footprint Recognition using Modified sequential Haar Energy Transform (HSHET). International Journal of Computer Science Issues, 2010, 7(5): 47-51. 

[57]Ma L., Yunhong, W., Tieniu, T. Iris Recognition Using Circular Symmetric Filters. In: Proceedings of International Conference on Pattern Recognition, 2002, 2: 414–417. 

[58]Ma L., Tieniu T., Yunhong W. et al. Efficient Iris Recognition by Characterizing Key Local Variations. IEEE Transactions on Image Processing, 2004, 13(6): 739 – 750. 

[59]Matey James R., Hanna K., Kolcyznski R. et al. Iris on the move: Acquisition of images for iris recognition in less constrained Environments. Proc. IEEE, 2006, 94(11): 1936 –1947. 

[60]Matey James R., Broussard Randy, Kennell Lauren. Iris image segmentation and sub-optimal images. Image and Vision Computing,Elsevier, 2010, 28(2): 215–222. 

[61]Micheloni Christian, Sergio Canazza, GianLucaForesti. Audio Video Biometric Recognition for Non-collaborative Access Granting. Journal of Visual Languages and Computing, Elsevier, 2009, 20: 353–367. 

[62]Mishra K. N., Agrawal A., Srivastava P.C., et al. An Efficient Horizontal and Vertical Method for Online DNA Sequence Compression. International Journal of Computer Applications, 2010, 3(1): 39-46. 

[63]Mishra K. N., Agrawal A., Srivastava P. C., et al. An Efficient Eigen Values Based Technique for Online Iris Image Compression and Identification. International Journal of Information Acquisition, World Scientific, 2011, 8(2): 133-152. 

[64]Mishra K. N., Srivastava P. C., Agrawal A. et al. A Framework towards Using Eigen Iris, Minutia Thumb and DNA Sequence Features for Personal Identification. International Journal of Information Acquisition, World Scientific, 2011, 8(3): 197-225. 

[65]Minoru Asogawa. DNA-based personal identification and its technologies. Nec Technical Journal, 2010, 5(3): 34-38. 

[66]Mueller Robert, Sanchez-Reillo Raul. An Approach to Biometric Identity Management Using Low-Cost Equipment. In: Proceedings of IEEE Conference on IIH-MSP, 2009, 1096 – 1100. 

[67]Nicolae Duta. A Survey of Biometric Technology Based on Hand Shape. Pattern Recognition, Elsevier, 2009, 42(11): 2797 – 2806. 

[68]“NIST Mated Fingerprint Card Pairs 2 (MFCP2),” NIST Special Database 14, 2010, [Online], Available: 

[69]Parra Philippe. Fingerprint minutiae extraction and matching for identification procedure. Department of CS&E, University of California, 2011, 1 – 8, [Online], Avaliable: 

[70]Pathak Preeti. Image Compression Algorithms for Fingerprint System. International Journal of Computer Science Issues, 2010, 7(3): 45 – 50. 

[71]Phua Koksoon, Chen Jianfen, Dat Tran Huy et al. Heart sound as a biometric. Pattern Recognition, Elsevier, 2008, 41(3): 906 – 919. 

[72]Ramali Mohamad, Akmar Nurul Kamrudin, Saufi Muhammad et al. Iris Recognition for personal Identification. In: International Conference on Electrical Engineering, Okinawa, Japan, No. 0-099, 2008, 1 – 5. 

[73]Ravi J, Raja K. B., Venugopal.K.R Fingerprint Recognition using minutia score matching. International Journal of Engineering Science & Technology, 2009, 1(2): 35-42. 

[74]Reuter Martin, Wolter Franz-Erich, Peinecke Niklas. Laplace-Beltrami Spectra as Shape DNA of surface and solids. Computer Aided Design(CAD), Elsevier, 2009, 41(10): 739 – 755. 

[75]Sarasvati K., Jayram B., Balasubramanian R. Iris Biometrics Based Authentication and Key Exchange System. International Journal of Engineering and Technology,2011, 3(1): 102-108. 

[76]Septimiu Crisan, Ioan Gavril T. et al. Radiation optimization and image processing algorithms in the identification of hand vein patterns. Computer Standards and Interfaces, Elsevier, 2010, 32: 132 – 140. 

[77]Shen Qiang, Jensen Richard. Rough Sets Their Extensions and Applications. International Journal of Automation and Computing, Springer, 2007, 4(3): 217 – 228. 

[78]Shetty Mahabalesh, Premalatha K. Study of Palatal Rugae Pattern Among the Student Population in Mangalore. Journal of Indian Academy of Forensic Medicine, 2011, 33(2): 112 – 115. 

[79]Singh Mini, Chabra Sumit. A Survey of Multimodal Biometrics. International Journal of Computer Sc. & its Applications, 2011, 157 – 160. [Online], Available:

[80]Soltane Mohamed, Doghmane Noureddine, Guersi Noureddine. Face and Speech Based Multi-Modal Biometric Authentication. International Journal of Advanced Science and Technology, 2010, 21: 41 – 56. 

[81]Soram Ranbir, Khomdram Memeta. Biometric DNA and ECDLP- based personal Authentication System: A Superior Posse of Security. International Journal of Computer Science and Network Security, 2010, 10(1): 1–9. 

[82]Su Ching-Liang. Finger extraction, finger image automatic registration, and finger identification by image phase matching. Applied Mathematics and Computation, 2007, 188(1): 912-923. 

[83]Su Ching-Liang. Hand image recognition by the techniques of hand shape scaling and image weight scaling. Expert Systems with Applications, Elsevier, 2008, 34(4): 2976 – 2987. 

[84]Sugiura Atsushi, Koseki Yoshiyukin. A user Interface Using Fingerprint Recognition Holding Commands and Data Objects on Fingers. In: Proceedings of the 11th annual ACM symposium on UIST, 1998, 71 – 79. 

[85]Tahi Fariza, Grumbach Stephen. A New Challenge for Compression Algorithms: Genetic Sequence. Information Processing and Management, Elsevier, 1994, 30(6): 875 – 886. 

[86]Tahi Fariza, Grumbach Stephen. Compression of DNA Sequences: Extended Abstract, 1994, 1 – 11.

[87]Tico M., Kuosmanen P. Fingerprint Matching Using an Orientation-Based Minutia Descriptor. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2003, 25(8): 1009-1014. 

[88]Tieniu T., Zhaofeng H., Zhenan H. Efficient and Robust Segmentation of Noisy Iris Images for Non-cooperative Iris Recognition, Image and Vision Computing, Elsevier, 2010, 28: 223 – 230. 

[89]Tisse C. L. Person Identification Technique Using Human Iris Recognition. Journal of System Research, 2003, 4: 67-75. 

[90]Tsutsumi Hirofumi, Komuro Toshinobu, Rei Mukoyama et al. A case of personal identification due to detection of rare DNA types from seminal stain. Journal of Oral Science ,2009, 51(4): 645-650. 

[91]Vajna Z. K. A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping. IEEE Trans. Pattern Analysis and Machine Intelligence, 2000, 22(11): 1266- 1276. 

[92]Virginia Espinosa-Duro. Minutiae Detection Algorithm for Fingerprint Recognition. In: IEEE AESS Systems Magazine, 2002, 7-10. 

[93]Viriri Serestina, Jules R Tapamo. Improving iris-based personal identification using maximum recatanguler region detection. In: International Conference on Digital Image Processing, IEEE computer society, 2009, 421 – 425. 

[94]Wahab A., Chin S. H., Tan E.C. Novel approach to automated fingerprint recognition. IEEE Proceedings on Vision Image Signal Process, 1998, 145(3): 160-166. 

[95]Wan D., Zhou J. Fingerprint Recognition Using Model-Based Density Map. IEEE Trans. on Image Processing, 2006, 15(6): 1690-1696. 

[96]Wang P.S.P., Yanushkevich S.N. Biometric technologies and applications. In: Proc. of IASTED AIA (Artificial Intelligence Applications), Innsbruck, Austria, 2007, 226-231. 

[97]Wildes R. P. Iris Recognition: An Emerging Biometric Technology. Proceedings of IEEE, 1997, 85(9): 1348 – 1363. 

[98]Woodard Damon L., Flynn Patrick J. Finger Surface as biometric identifier. Computer Vision and Image Understanding, Elsevier, 2005, 100(3): 357-384. 

[99][Online], Available: , November 2011. 

[100]Xue Zhen-Kuang, Li Shao-Yuan A multimodal identification algorithm based on weighted cost function and application in thermal process. Acta Automatica Sinica Journal, 2005, 31(3): 470 – 474. 

[101]Yang Jinfeng, Shi Yihua, Yang Jinli. Personal identification based on finger-vein features. Computers in Human Behavior, Elsevier, 2011, 27(5): 1565 – 1570. 

[102]Yang Shengling, Verbauwhede Ingrid. A Real time, Memeory Efficient Fingerprint Verification system. In: Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, 2004, 5: 189 – 192. 

[103]Yoruk Erdem, Dutagaci, Helin, Sankur Bulent. Hand biometrics. Image and Vision Computing, Elsevier, 2006, 24(5): 483 – 487. 

[104]Zhang David, Wai Kin Kong. Online Palm Print Identification. IEEE Transaction on Pattern Analysis and Machine Intelligence, 2003, 25(9): 1041-1050. 

[105]Zhaofeng H., Tieniu T., Zhenan S. et al. Toward Accurate and Fast Iris Segmentation for Iris Biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009, 31(9): 1670 – 1684. 

[106]Zhao Qijun, Zhang Lei, Zhang David et al. Direct Pore Matching for fingerprint Recognition. In: Proc. of Third International Conf. on Advances in Biometrics, Springer-Verlog, 2009, 797 – 606. 

[107]Zhou Shang-Ming, Can John Q, Xu Li et al. Interactive Image Enhancement by Fuzzy Relaxation. International Journal of Automation and Computing, Springer,2007, 4(3): 229 – 235. 

[108]Zhu Le-ging, Zhang San-yuan. Multimodal Biometric Identification System Based on Finger Geometry. Pattern Recognition Letters, Elsevier, 2010, 31(12): 1641 – 1649. 

[109]Zhu Yong, Tan Tienuiu, Wang Yunhong. Biometric Personal Identification Based on Iris patterns. In: Proc. of IEEE fifteenth International Conf. on Pattern Recognition, 2000, 2: 801 – 804. 

[110]Ziv J., Lempel A. A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 1977, 23(3): 337-343. 

[111]Ziv J., Lempel A. Compression of Individual Sequences via Variable Rate Coding. IEEE Transactions on Information Theory, 1978, 24(5): 530-536.