ABSTRACT

Biometrics is increasingly gaining importance as security requirements become more demanding. Over the years, multiple fraudulent cases have come to the fore, making it imperative for informationsensitive systems to look for alternative protective measures. Accurate verification or identification of a person can be a major deterrent to crime. Physiological and behavioral characteristics are commonly used nowadays for establishing the identity of a person. For improved performance of an identification system relying on biometrics, multiple modalities are often used (Gudavalli et al. 2012). These may include fingerprints, palm prints, hand geometry, facial features, iris, voice, signature, etc. (Ross and Jain 2003). Each biometric has its strengths and drawbacks and no single biometric satisfies all the requirements of an application.