{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T09:09:00Z","timestamp":1769072940244,"version":"3.49.0"},"reference-count":23,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T00:00:00Z","timestamp":1495843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman\u2019s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user\u2019s face only or the serial acquisition of both the user\u2019s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions), possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent \u201cresponse behaviors\u201d according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&amp;T Face Database and the UBIRIS database.<\/jats:p>","DOI":"10.3390\/a10020061","type":"journal-article","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T04:35:42Z","timestamp":1496118942000},"page":"61","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Design and Implementation of a Multi-Modal Biometric System for Company Access Control"],"prefix":"10.3390","volume":"10","author":[{"given":"Elisabetta","family":"Stefani","sequence":"first","affiliation":[{"name":"Department of Information Engineering, The University of Padova, Via Gradenigo 6a, 35131 Padova PD, Italy"}]},{"given":"Carlo","family":"Ferrari","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, The University of Padova, Via Gradenigo 6a, 35131 Padova PD, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"key":"ref_1","unstructured":"Kisku, D.R., Gupta, P., and Sing, J.K. (2016). Advances in Biometrics for Secure Human Authentication and Recognition, CRC Press."},{"key":"ref_2","first-page":"4","article-title":"An introduction to biometric recognition","volume":"14","author":"Anil","year":"2014","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_3","first-page":"47","article-title":"Implementing a secure authentication system","volume":"2","author":"Carpentieri","year":"2017","journal-title":"Int. J. Comput."},{"key":"ref_4","unstructured":"Dhamala, P. (2012). Multibiometric Systems. [Master\u2019s Thesis, Department of Telematics, Norwegian University of Science and Technology]."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TIFS.2015.2402593","article-title":"A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_6","unstructured":"Somnath, D., and Debasis, S. (2014). Unimodal and Multimodal Biometric Data Indexing, De Gruyter."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Crouse, D., Han, H., Chandra, D., Barbello, B., and Jain, A. Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data. Proceedingns of the International Conference on Biometrics (ICB 2015).","DOI":"10.1109\/ICB.2015.7139043"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Wayman, J., Jain, A., Maltoni, D., and Maio, D. (2005). An introduction to biometric authentication systems. Biometric Systems: Technology, Design and Performance Evaluation, Springer.","DOI":"10.1007\/b138151"},{"key":"ref_9","first-page":"36","article-title":"A Survey of Multibiometric Systems","volume":"43","author":"AlMahafzah","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mhashe, V.D., and Patankar, A.J. (2013, January 26\u201328). Multimodal biometrics by integrating fingerpirnt and Palmprint for security. Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research, Enathi, Tamilnadu, India.","DOI":"10.1109\/ICCIC.2013.6724125"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., and Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Imran, M., Rao, A., and Kumar, H.G. (2011, January 15\u201317). A new hybrid approach for information fusion on multibiometric systems. Proceedings of the 2011 IEEE Third National Conference in Computer Vision, Pattern Recognition, Image Processing and Graphics, Hubli, Karnataka, India.","DOI":"10.1109\/NCVPRIPG.2011.57"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1016\/j.future.2012.02.003","article-title":"Fast computation of the performance evaluation of biometric systems: Application to multibiometrics","volume":"29","author":"Giot","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_14","first-page":"1","article-title":"Biometric Recognition in automated border control: A survey","volume":"49","author":"Genovese","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Deka, G.C., Siddesh, G.M., Srinivasa, K.G., and Patnaik, L.M. (2016). Face recognition: A tutorial on computational aspects. Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing, IGI Global.","DOI":"10.4018\/978-1-4666-8853-7"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1109\/5.628669","article-title":"Iris Regognition, an emerging biometric technology","volume":"85","author":"Wildes","year":"1997","journal-title":"Proc. IEEE"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Grauman, K., and Darrell, T. (2005, January 15\u201321). The pyramid match kernel: Discriminative classification with sets of image features. Proceedings of the Tenth IEEE International Conference on Computer Vision (ICCV\u201905), Beijing, China.","DOI":"10.1109\/ICCV.2005.239"},{"key":"ref_18","unstructured":"(2016, April 01). OpenCV Tutorials. Available online: http:\/\/docs.opencv.org\/2.4\/doc\/tutorials\/tutorials.html."},{"key":"ref_19","first-page":"177","article-title":"Daughman\u2019s algorithm method for iris recognition\u2014A biometric approach","volume":"2","author":"Verma","year":"2012","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wang, Y., Tan, T., and Jain, A.K. (2003, January 9\u201311). Combining face and iris biometrics for identity verification. Proceedings of the 4th International Conference on Audio- and Video-based Biometric Person Authentication, Guildford, UK.","DOI":"10.1007\/3-540-44887-X_93"},{"key":"ref_21","unstructured":"(2016, July 15). The Database of Faces. Available online: http:\/\/www.cl.cam.ac.uk\/research\/dtg\/attarchive\/base.html."},{"key":"ref_22","unstructured":"Hugo, P., and Alexandre, L.A. (2005, January 6\u20138). UBIRIS: A noisy iris image database. Proceedings of the 13th International Conference on Image Analysis and Processing\u2013ICIAP 2005, Cagliari, Italy."},{"key":"ref_23","unstructured":"(2016, July 15). Collection of Facial Images. Available online: http:\/\/cswww.essex.ac.uk\/mv\/allfaces\/index.html."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/2\/61\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:37:11Z","timestamp":1760207831000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/2\/61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,27]]},"references-count":23,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["a10020061"],"URL":"https:\/\/doi.org\/10.3390\/a10020061","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,27]]}}}