WorldWideScience

Sample records for biometric values obtained

  1. Biometrics: libraries have begun to see the value of biometrics

    OpenAIRE

    Panneerselvam, Selvi, M. G.

    2007-01-01

    It explains the Biometric Technologies which are becoming the foundation of an extensive array of highly secure identification and personal verification solution. Biometric devices with special reference to finger print recognition is dealt in detail. The benefits of Biometrics in Libraries, its employees and members are highlighted.

  2. Comparison of the biometric values obtained by two different A-mode ultrasound devices (Eye Cubed vs. PalmScan): a transversal, descriptive, and comparative study.

    Science.gov (United States)

    Velez-Montoya, Raul; Shusterman, Eugene Mark; López-Miranda, Miriam Jessica; Mayorquin-Ruiz, Mariana; Salcedo-Villanueva, Guillermo; Quiroz-Mercado, Hugo; Morales-Cantón, Virgilio

    2010-03-24

    To assess the reliability of the measurements obtained with the PalmScan, when compared with another standardized A-mode ultrasound device, and assess the consistency and correlation between the two methods. Transversal, descriptive, and comparative study. We recorded the axial length (AL), anterior chamber depth (ACD) and lens thickness (LT) obtained with two A-mode ultrasounds (PalmScan A2000 and Eye Cubed) using an immersion technique. We compared the measurements with a two-sample t-test. Agreement between the two devices was assessed with Bland-Altman plots and 95% limits of agreement. 70 eyes of 70 patients were enrolled in this study. The measurements with the Eye Cubed of AL and ACD were shorter than the measurements taken by the PalmScan. The differences were not statistically significant regarding AL (p < 0.4) but significant regarding ACD (p < 0.001). The highest agreement between the two devices was obtained during LT measurement. The PalmScan measurements were shorter, but not statistically significantly (p < 0.2). The values of AL and LT, obtained with both devices are not identical, but within the limits of agreement. The agreement is not affected by the magnitude of the ocular dimensions (but only between range of 20 mm to 27 mm of AL and 3.5 mm to 5.7 mm of LT). A correction of about 0.5 D could be considered if an intraocular lens is being calculated. However due to the large variability of the results, the authors recommend discretion in using this conversion factor, and to adjust the power of the intraocular lenses based upon the personal experience of the surgeon.

  3. Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    Jinyu Lu

    2014-01-01

    Full Text Available A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the singular values of each host image's coefficients which are obtained through discrete cosine transform (DCT. Numerical results reveal that proposed method can extract the watermark effectively and illustrate its security and robustness.

  4. Prenatal magnetic resonance imaging: brain normal linear biometric values below 24 gestational weeks

    International Nuclear Information System (INIS)

    Parazzini, C.; Righini, A.; Triulzi, F.; Rustico, M.; Consonni, D.

    2008-01-01

    Prenatal magnetic resonance (MR) imaging is currently used to measure quantitative data concerning brain structural development. At present, morphometric MR imaging studies have been focused mostly on the third trimester of gestational age. However, in many countries, because of legal restriction on abortion timing, the majority of MR imaging fetal examination has to be carried out during the last part of the second trimester of pregnancy (i.e., before the 24th week of gestation). Accurate and reliable normative data of the brain between 20 and 24 weeks of gestation is not available. This report provides easy and practical parametric support to assess those normative data. From a database of 1,200 fetal MR imaging studies, we retrospectively selected 84 studies of the brain of fetuses aged 20-24 weeks of gestation that resulted normal on clinical and radiological follow-up. Fetuses with proved or suspected infections, twin pregnancy, and fetuses of mothers affected by pathology that might have influenced fetal growth were excluded. Linear biometrical measurements of the main cerebral structures were obtained by three experienced pediatric neuroradiologists. A substantial interobserver agreement for each measurements was reached, and normative data with median, maximum, and minimum value were obtained for brain structures. The knowledge of a range of normality and interindividual variability of linear biometrical values for the developing brain between 20th and 24th weeks of gestation may be valuable in assessing normal brain development in clinical settings. (orig.)

  5. Prenatal magnetic resonance imaging: brain normal linear biometric values below 24 gestational weeks

    Energy Technology Data Exchange (ETDEWEB)

    Parazzini, C.; Righini, A.; Triulzi, F. [Children' s Hospital ' ' V. Buzzi' ' , Department of Radiology and Neuroradiology, Milan (Italy); Rustico, M. [Children' s Hospital ' ' V. Buzzi' ' , Department of Obstetrics and Gynecology, Milan (Italy); Consonni, D. [Fondazione IRCCS Ospedale Maggiore Policlinico, Unit of Epidemiology, Milan (Italy)

    2008-10-15

    Prenatal magnetic resonance (MR) imaging is currently used to measure quantitative data concerning brain structural development. At present, morphometric MR imaging studies have been focused mostly on the third trimester of gestational age. However, in many countries, because of legal restriction on abortion timing, the majority of MR imaging fetal examination has to be carried out during the last part of the second trimester of pregnancy (i.e., before the 24th week of gestation). Accurate and reliable normative data of the brain between 20 and 24 weeks of gestation is not available. This report provides easy and practical parametric support to assess those normative data. From a database of 1,200 fetal MR imaging studies, we retrospectively selected 84 studies of the brain of fetuses aged 20-24 weeks of gestation that resulted normal on clinical and radiological follow-up. Fetuses with proved or suspected infections, twin pregnancy, and fetuses of mothers affected by pathology that might have influenced fetal growth were excluded. Linear biometrical measurements of the main cerebral structures were obtained by three experienced pediatric neuroradiologists. A substantial interobserver agreement for each measurements was reached, and normative data with median, maximum, and minimum value were obtained for brain structures. The knowledge of a range of normality and interindividual variability of linear biometrical values for the developing brain between 20th and 24th weeks of gestation may be valuable in assessing normal brain development in clinical settings. (orig.)

  6. Biometric values, C-reactive protein, and proteinogram of healthy blonde capuchin (Sapajus flavius) kept in northeast of Brazil.

    Science.gov (United States)

    Mota, Stéphanie Machado; Ferreira, Adriano Fernandes; Azevedo, Jair; Nery, Thiago Lopes; Zermiani, Fabiana; Queiroga, Felisbina Luisa

    2016-12-01

    Sapajus flavius is a species of capuchin monkey classified as critically endangered. Studies related to their biometric values are scarce with incomplete external measurement reports available from only four specimens. Moreover, information regarding proteinogram is limited with no reference to C-reactive protein (CRP) and globulin fractions for this species. Biometric values, CRP, and proteinogram were determined for 12 clinically healthy S. flavius, kept in captivity in João Pessoa, Brazil. The measured values in biometric parameters present a tendency to be higher in males. The CRP mean values from 12 S. flavius were 1.2±0.2 mg/dL. For albumin, alpha, beta, and gamma globulin fraction parameters, the reference interval was calculated. Authors believe that with certain limitations, results obtained can be helpful for the populations in the wild, which could be of great aid in detecting unhealthy individuals and therefore contributing to the conservation of this species. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. Identification performance of evidential value estimation for ridge-based biometrics

    NARCIS (Netherlands)

    Kotzerke, Johannes; Hao, Hao; Davis, Stephen A.; Hayes, Robert; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Horadam, K.J.

    2016-01-01

    Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (EV) in a court of law are recorded for further forensic analysis. Here, we test our

  8. Comparison of biometric measurements obtained by the Verion Image-Guided System versus the auto-refracto-keratometer.

    Science.gov (United States)

    Velasco-Barona, Cecilio; Cervantes-Coste, Guadalupe; Mendoza-Schuster, Erick; Corredor-Ortega, Claudia; Casillas-Chavarín, Nadia L; Silva-Moreno, Alejandro; Garza-León, Manuel; Gonzalez-Salinas, Roberto

    2018-06-01

    To compare the biometric measurements obtained from the Verion Image-Guided System to those obtained by auto-refracto-keratometer in normal eyes. This is a prospective, observational, comparative study conducted at the Asociación para Evitar la Ceguera en México I.A.P., Mexico. Three sets of keratometry measurements were obtained using the image-guided system to assess the coefficient of variation, the within-subject standard deviation and intraclass correlation coefficient (ICC). A paired Student t test was used to assess statistical significance between the Verion and the auto-refracto-keratometer. A Pearson's correlation coefficient (r) was obtained for all measurements, and the level of agreement was verified using Bland-Altman plots. The right eyes of 73 patients were evaluated by each platform. The Verion coefficient of variation was 0.3% for the flat and steep keratometry, with the ICC being greater than 0.9 for all parameters measured. Paired t test showed statistically significant differences between groups (P = 0.0001). A good correlation was evidenced for keratometry values between platforms (r = 0.903, P = 0.0001 for K1, and r = 0.890, P = 0.0001). Bland-Altman plots showed a wide data spread for all variables. The image-guided system provided highly repeatable corneal power and keratometry measurements. However, significant differences were evidenced between the two platforms, and although values were highly correlated, they showed a wide data spread for all analysed variables; therefore, their interchangeable use for biometry assessment is not advisable.

  9. Biometric template revocation

    Science.gov (United States)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  10. The Impact of User Privacy Concerns and Ethnic Cultural Values on Attitudes toward the Use of Biometric Technology

    Science.gov (United States)

    Carpenter, Darrell R.

    2011-01-01

    Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology have not been well received by employees. One reason for resistance may be perceived privacy issues associated with biometrics. This research draws on previous organizational information…

  11. Remarks on the low value obtained for the Hubble constant

    International Nuclear Information System (INIS)

    Jaakkola, Toivo

    1975-01-01

    Some remarks are made on the basis of the data given by Sandage and Tamman, suggesting that these authors have over-estimated the distances to the most luminous galaxies and obtained a value too low for the Hubble constant [fr

  12. Beyond Biometrics

    NARCIS (Netherlands)

    van den Broek, Egon

    Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including

  13. On Biometrics With Eye Movements.

    Science.gov (United States)

    Zhang, Youming; Juhola, Martti

    2017-09-01

    Eye movements are a relatively novel data source for biometric identification. When video cameras applied to eye tracking become smaller and more efficient, this data source could offer interesting opportunities for the development of eye movement biometrics. In this paper, we study primarily biometric identification as seen as a classification task of multiple classes, and secondarily biometric verification considered as binary classification. Our research is based on the saccadic eye movement signal measurements from 109 young subjects. In order to test the data measured, we use a procedure of biometric identification according to the one-versus-one (subject) principle. In a development from our previous research, which also involved biometric verification based on saccadic eye movements, we now apply another eye movement tracker device with a higher sampling frequency of 250 Hz. The results obtained are good, with correct identification rates at 80-90% at their best.

  14. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  15. Logistic Map for Cancellable Biometrics

    Science.gov (United States)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  16. New space value of the solar oblateness obtained with PICARD

    Energy Technology Data Exchange (ETDEWEB)

    Irbah, Abdanour; Meftah, Mustapha; Hauchecorne, Alain; Bocquier, Maxime; Cisse, E. Momar [Laboratoire Atmosphères, Milieux, Observations Spatiales (LATMOS), CNRS: UMR 8190-Université Paris VI-Pierre et Marie Curie-Université de Versailles Saint-Quentin-en-Yvelines-INSU, F-78280, Guyancourt (France); Djafer, Djelloul [Unité de Recherche Appliquée en Energies Renouvelables, URAER, Centre de Développement des Energies Renouvelables, CDER, 47133, Ghardaïa (Algeria); Corbard, Thierry, E-mail: Abdenour.Irbah@latmos.ipsl.fr [Laboratoire Lagrange, UMR7293, Université de Nice Sophia-Antipolis, CNRS, Observatoire de la Côte d' Azur, Bd. de l' Observatoire, F-06304 Nice (France)

    2014-04-20

    The PICARD spacecraft was launched on 2010 June 15 with the scientific objective of studying the geometry of the Sun. It is difficult to measure solar oblateness because images are affected by optical distortion. Rolling the satellite, as done in previous space missions, determines the contribution of the telescope by assuming that the geometry of the Sun is constant during the observations. The optical response of the telescope is considered to be time-invariant during the roll operations. This is not the case for PICARD because an orbital signature is clearly observed in the solar radius computed from its images. We take this effect into account and provide the new space value of solar oblateness from PICARD images recorded in the solar continuum at 535.7 nm on 2011 July 4-5. The equator-pole radius difference is 8.4 ± 0.5 mas, which corresponds to an absolute radius difference of 6.1 km. This coincides with the mean value of all solar oblateness measurements obtained during the last two decades from the ground, balloons, and space. It is also consistent with values determined from models using helioseismology data.

  17. Biometric identification based on novel frequency domain facial asymmetry measures

    Science.gov (United States)

    Mitra, Sinjini; Savvides, Marios; Vijaya Kumar, B. V. K.

    2005-03-01

    In the modern world, the ever-growing need to ensure a system's security has spurred the growth of the newly emerging technology of biometric identification. The present paper introduces a novel set of facial biometrics based on quantified facial asymmetry measures in the frequency domain. In particular, we show that these biometrics work well for face images showing expression variations and have the potential to do so in presence of illumination variations as well. A comparison of the recognition rates with those obtained from spatial domain asymmetry measures based on raw intensity values suggests that the frequency domain representation is more robust to intra-personal distortions and is a novel approach for performing biometric identification. In addition, some feature analysis based on statistical methods comparing the asymmetry measures across different individuals and across different expressions is presented.

  18. Soft biometrics in conjunction with optics based biohashing

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2011-02-01

    Biometric systems are gaining importance because of increased reliability for authentication and identification. A biometric recognition technique has been proposed earlier, in which biohashing code has been generated by using a joint transform correlator. The main drawback of the base biohashing method is the low performance of the technique when an "impostor" steals the pseudo-random numbers of the genuine and tries to authenticate as genuine. In the proposed technique, soft biometrics of the same person has been used to improve the discrimination between the genuine and the impostor populations. The soft biometrics are those characteristics that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate between any two individuals. In the enrolment process, biohash code of the target face images has been integrated with the different soft biometrics of the same person. The obtained code has been stored for verification. In the verification process, biohash code of the face image to be verified is again diffused with the soft biometric of the person. The obtained code is matched with the stored code of the target. The receiving operating characteristic (ROC) curve and the equal error rate (EER) have been used to evaluate the performance of the technique. A detailed study has been carried out to find out the optimum values of the weighting factor for the diffusion process.

  19. Clinical value of renal images obtained incidentally to bone scintigraphy

    International Nuclear Information System (INIS)

    Ohishi, Y.; Machida, T.; Miki, M.; Kido, A.; Tanaka, A.

    1982-01-01

    Various studies were made on 400 renal (including 325 clinical cases) observed during whole-body bone scintigraphy using 99mTc-MDP. Asymmetrical renal images in bone scintigrams were obtained from 40% of the urologic patients and 7.5% of the nonurologic patients. Out of the asymmetrical images of the urologic patients, 50% provided nonvisualized kidneys and 35% showed unilateral renal high accumulation. It can be said from the above that renal images incidentally obtained during whole-body bone scintigraphy should not be overlooked

  20. Obtaining uranium and/or vanadium values from solutions

    Energy Technology Data Exchange (ETDEWEB)

    Vojkovic, M

    1982-04-22

    A process for the recovery of at least one of uranium and vanadium from an aqueous liquor is claimed. It comprises: (a) treating the liquor with a low molecular weight completely water-miscible solvent selected from the group consisting of methanol, iso-propyl alcohol or acetone to form at least two phases; (b) separating the phases; (c) recovering the solvent from the first phase as the azeotropic solvent/water mixture by simple, non-fractional distillation and recycling the mixture to step (a); and (d) recovering metal values from a second one of the phases.

  1. Diagnostic value of sectional images obtained by emission tomography

    International Nuclear Information System (INIS)

    Roucayrol, J.C.

    1981-01-01

    It is now possible to obtain clear images of the various planes in and around a structure with ultra-sounds (echotomography), X-rays (computerized tomography) and recently, gamma-rays from radioactive substances (emission tomography). Axial transverse tomography, which is described here, is to conventional scintigraphy what CT scan is to radiography. It provides images of any structure capable of concentrating sufficiently a radioactive substance administered intravenously. These images are perpendicular to the longitudinal axis of the body. As shown by examples in the liver, lungs and myocardium, lesions which had passed unnoticed with other exploratory techniques can now be demonstrated, and the location, shape and extension of known lesions can be more accurately assessed. Emission tomography already has its place in modern diagnostic procedures side by side with echotomography and CT scan [fr

  2. Value for money: Defining and measuring 'value' in MoD's acquisition policy of obtaining best value for money

    OpenAIRE

    Weiss, A.

    2006-01-01

    Obtaining value for money is a keystone of UK Ministry of Defence (MoD) acquisition strategy embedded in its Smart Acquisition policy. This thesis examines how best to measure the relative value of competing tender submissions for major projects. There is a comprehensive discussion of a wide range of relevant definitions and over three dozen documents are scrutinised including just some sixteen published by the Government. Commercially available models, algorithms and software are examined as...

  3. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  4. Multi-biometrics based cryptographic key regeneration scheme

    OpenAIRE

    Kanade , Sanjay Ganesh; Petrovska-Delacrétaz , Dijana; Dorizzi , Bernadette

    2009-01-01

    International audience; Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose ...

  5. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Science.gov (United States)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  6. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  7. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  8. Cancelable Biometrics - A Survey

    OpenAIRE

    Indira Chakravarthy; VVSSS. Balaram; B. Eswara Reddy

    2011-01-01

    In recent times Biometrics has emerged as a reliable, convenient and effective method of user authentication. However, with the increasing use of biometrics in several diverse applications, concerns about the privacy and security of biometric data contained in the database systems has increased. It is therefore imperative that Biometric systems instill confidence in the general public, by demonstrating that, these systems are robust, have low error rates and are tamper proof. In this context,...

  9. The eye of the Barbary sheep or aoudad (Ammotragus lervia: Reference values for selected ophthalmic diagnostic tests, morphologic and biometric observations

    Directory of Open Access Journals (Sweden)

    G.A. Fornazari

    2016-06-01

    Full Text Available The purpose of this study was to describe the normal ocular anatomy and establish reference values for ophthalmic tests in the Barbary sheep or aoudad (Ammotragus lervia. Aoudad eyes are large and laterally positioned in the head with several specialized anatomic features attributed to evolutionary adaptations for grazing. Normal values for commonly used ophthalmic tests were established, Schirmer tear test (STT - 27.22 ± 3.6 mm/min; Predominant ocular surface bacterial microbiota - Staphylococcus sp.; Corneal esthesiometry- 1.3 ± 0.4 cm; Intraocular pressure by rebound tonometry- 19.47 ± 3.9 mmHg; Corneal thickness- 630.07 ± 20.67 μm, B-mode ultrasonography of the globe- axial eye globe length 29.94 ± 0.96 mm, anterior chamber depth 5.03 ± 0.17 mm, lens thickness 9.4 ± 0.33 mm, vitreous chamber depth 14.1 ± 0.53 mm; Corneal diameter- horizontal corneal diameter 25.05 ± 2.18 mm, vertical corneal diameter 17.95 ± 1.68 mm; Horizontal palpebral fissure length- 34.8 ± 3.12 mm. Knowledge of these normal anatomic variations, biometric findings and normal parameters for ocular diagnostic tests may assist veterinary ophthalmologists in the diagnosis of ocular diseases in this and other similar species.

  10. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  11. Investigating the biometric and physicochemical characteristics of freshly harvested Pacific white shrimp (Litopenaeus vannamei): a comparative approach.

    Science.gov (United States)

    Okpala, Charles Odilichukwu R; Bono, Gioacchino

    2016-03-15

    The practicality of biometrics of seafood cannot be overemphasized, particularly for competent authorities of the shrimp industry. However, there is a paucity of relevant literature on the relationship between biometric and physicochemical indices of freshly harvested shrimp. This work therefore investigated the relationship between biometric (standard length (SL), total weight (TW) and condition factor (CF)) and physicochemical (moisture content, pH, titratable acidity, water activity, water retention index, colour values and fracturability) characteristics of freshly harvested Pacific white shrimp (Litopenaeus vannamei) obtained from three different farms. The relationships between these parameters were determined using correlation and regression analyses. No significant correlation (P > 0.05) was found between the biometric and physicochemical indices of the sampled L. vannamei specimens. Possibly the lack of post-mortem and physical change(s) at day of harvest together with the absence of temporal variable may have collectively limited the degree of any significant correlation between biometric and physicochemical data points measured in this study. Although the TWs of freshly harvested L. vannamei shrimp resembled (P > 0.05), SL and CF differed significantly (P shrimp. Across the farms studied, however, the biometric data were comparable. To best knowledge, this is the first study to investigate the biometric and physicochemical properties of freshly harvested shrimp using a comparative approach, which is also applicable to other economically important aquaculture species. Overall, this work provides useful information for competent authorities/stakeholders of the fishery industry and serves as a baseline for preservative treatments. © 2015 Society of Chemical Industry.

  12. Soft Biometrics; Human Identification Using Comparative Descriptions.

    Science.gov (United States)

    Reid, Daniel A; Nixon, Mark S; Stevenage, Sarah V

    2014-06-01

    Soft biometrics are a new form of biometric identification which use physical or behavioral traits that can be naturally described by humans. Unlike other biometric approaches, this allows identification based solely on verbal descriptions, bridging the semantic gap between biometrics and human description. To permit soft biometric identification the description must be accurate, yet conventional human descriptions comprising of absolute labels and estimations are often unreliable. A novel method of obtaining human descriptions will be introduced which utilizes comparative categorical labels to describe differences between subjects. This innovative approach has been shown to address many problems associated with absolute categorical labels-most critically, the descriptions contain more objective information and have increased discriminatory capabilities. Relative measurements of the subjects' traits can be inferred from comparative human descriptions using the Elo rating system. The resulting soft biometric signatures have been demonstrated to be robust and allow accurate recognition of subjects. Relative measurements can also be obtained from other forms of human representation. This is demonstrated using a support vector machine to determine relative measurements from gait biometric signatures-allowing retrieval of subjects from video footage by using human comparisons, bridging the semantic gap.

  13. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  14. Biometric citizenship and alienage

    DEFF Research Database (Denmark)

    Stenum, Helle

    . This paper asks if and how biometric techniques are the basis of a re-structuring of management of migration and mobility: Is the suggestion of biometric identifiers reflecting the withdrawal from the principle of rights applied to human beings as an abstract of the universal individual all being equal......, to the (re)introduction the concept of rights being engraved in your body, depended first and foremost on one’s birth, kinship and geography ? The paper will discuss biometric technology in a historical context and explore the apparent biometric divide between citizens and migrants, the latter positioned......Biometric identifiers (finger prints, face scans, iris scans etc.) have increasingly become a key element in technology of EU border and migration management. SIS II, EURODAC and VIS are centralized systems that contain fingerprints of different groups of non-EU citizen, and the biometric...

  15. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  16. Biometric recognition via fixation density maps

    Science.gov (United States)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  17. Hand-Based Biometric Analysis

    Science.gov (United States)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  18. BIOMETRIC AUTHENTICATION USING NONPARAMETRIC METHODS

    OpenAIRE

    S V Sheela; K R Radhika

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determine...

  19. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  20. On Soft Biometrics

    DEFF Research Database (Denmark)

    Nixon, Mark; Correia, Paulo; Nasrollahi, Kamal

    2015-01-01

    Innovation has formed much of the rich history in biometrics. The field of soft biometrics was originally aimed to augment the recognition process by fusion of metrics that were sufficient to discriminate populations rather than individuals. This was later refined to use measures that could be us...

  1. Iris and periocular biometrics

    CERN Document Server

    Rathgeb, Christian

    2017-01-01

    This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.

  2. 3D Biometrics for Hindfoot Alignment Using Weightbearing CT.

    Science.gov (United States)

    Lintz, François; Welck, Matthew; Bernasconi, Alessio; Thornton, James; Cullen, Nicholas P; Singh, Dishan; Goldberg, Andy

    2017-06-01

    Hindfoot alignment on 2D radiographs can present anatomical and operator-related bias. In this study, software designed for weightbearing computed tomography (WBCT) was used to calculate a new 3D biometric tool: the Foot and Ankle Offset (FAO). We described the distribution of FAO in a series of data sets from clinically normal, varus, and valgus cases, hypothesizing that FAO values would be significantly different in the 3 groups. In this retrospective cohort study, 135 data sets (57 normal, 38 varus, 40 valgus) from WBCT (PedCAT; CurveBeam LLC, Warrington, PA) were obtained from a specialized foot and ankle unit. 3D coordinates of specific anatomical landmarks (weightbearing points of the calcaneus, of the first and fifth metatarsal heads and the highest and centermost point on the talar dome) were collected. These data were processed with the TALAS system (CurveBeam), which resulted in an FAO value for each case. Intraobserver and interobserver reliability were also assessed. In normal cases, the mean value for FAO was 2.3% ± 2.9%, whereas in varus and valgus cases, the mean was -11.6% ± 6.9% and 11.4% ± 5.7%, respectively, with a statistically significant difference among groups ( P biometrics. The present study introduces the concept of 3D biometrics and describes an efficient, semiautomatic tool for measuring hindfoot alignment. Level III, retrospective comparative study.

  3. Confidence limits for regional cerebral blood flow values obtained with circular positron system, using krypton-77

    International Nuclear Information System (INIS)

    Meyer, E.; Yamamoto, Y.L.; Thompson, C.J.

    1978-01-01

    The 90% confidence limits have been determined for regional cerebral blood flow (rCBF) values obtained in each cm 2 of a cross section of the human head after inhalation of radioactive krypton-77, using the MNI circular positron emission tomography system (Positome). CBF values for small brain tissue elements are calculated by linear regression analysis on the semi-logarithmically transformed clearance curve. A computer program displays CBF values and their estimated error in numeric and gray scale forms. The following typical results have been obtained on a control subject: mean CBF in the entire cross section of the head: 54.6 + - 5 ml/min/100 g tissue, rCBF for small area of frontal gray matter: 75.8 + - 9 ml/min/100 g tissue. Confidence intervals for individual rCBF values varied between + - 13 and + - 55% except for areas pertaining to the ventricular system where particularly poor statistics have been obtained. Knowledge of confidence limits for rCBF values improves their diagnostic significance, particularly with respect to the assessment of reduced rCBF in stroke patients. A nomogram for convenient determination of 90% confidence limits for slope values obtained in linear regression analysis has been designed with the number of fitted points (n) and the correlation coefficient (r) as parameters. (author)

  4. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  5. Biometric systems - possibilities and dangers

    OpenAIRE

    Petržilka, Jakub

    2013-01-01

    This bachelor thesis is focused on biometric methods, particularly on fingerprint recognition. First part of thesis places biometric into other methods of people's identification. Identification by token and by knowledge. It also describes the beginning and evolution of biometric. The theoretical part also closely clarify working with data and different view on the biometric systems. The following part of the thesis defines the basic principles of using biometric systems, counting FAR and FRR...

  6. A new look on anomalous thermal gradient values obtained in South Portugal

    Science.gov (United States)

    Duque, M. R.; Malico, I.

    2012-04-01

    A NEW LOOK ON THE ANOMALOUS THERMAL GRADIENT VALUES OBTAINED IN SOUTH PORTUGAL Duque, M. R. and Malico, I. M. Physics Department, University of Évora, Rua Romão Ramalho, 59,7000-671, Évora, Portugal It is well known that soil temperatures can be altered by water circulation. In this paper, we study numerically this effect by simulating some aquifers occurring in South Portugal. At this location, the thermal gradient values obtained in boreholes with depths less than 200 m, range between 22 and 30 °C km-1. However, there, it is easy to find places where temperatures are around 30 °C, at depths of 100 m. The obtained thermal gradient values show an increase one day after raining and a decrease during the dry season. Additionally, the curve of temperature as function of depth showed no hot water inlet in the hole. The region studied shows a smooth topography due to intensive erosion, but it was affected by alpine and hercinian orogenies. As a result, a high topography in depth, with folds and wrinkles is present. The space between adjacent folds is now filled by small sedimentary basins. Aquifers existing in this region can reach considerable depths and return to depths near the surface, but hot springs in the area are scarce. Water temperature rises in depth, and when the speed is high enough high temperatures near the surface, due to water circulation, can be found. The ability of the fluid to flow through the system depends on topography relief, rock permeability and basal heat flow. In this study, the steady-state fluid flow and heat transfer by conduction and advection are modeled. Fractures in the medium are simulated by an equivalent porous medium saturated with liquid. Thermal conductivity values for the water and the rocks can vary in space .Porosities used have high values in the region of the aquifer, low values in the lower region of the model and intermediate values in the upper regions. The results obtained show that temperature anomaly values

  7. Modular Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor)

    2017-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to control communication of data, via the bus, with each of the plurality of data acquisition modules.

  8. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  9. Comparing the rankings obtained from two biodiversity indices: the Fair Proportion Index and the Shapley Value.

    Science.gov (United States)

    Wicke, Kristina; Fischer, Mareike

    2017-10-07

    The Shapley Value and the Fair Proportion Index of phylogenetic trees have been frequently discussed as prioritization tools in conservation biology. Both indices rank species according to their contribution to total phylogenetic diversity, allowing for a simple conservation criterion. While both indices have their specific advantages and drawbacks, it has recently been shown that both values are closely related. However, as different authors use different definitions of the Shapley Value, the specific degree of relatedness depends on the specific version of the Shapley Value - it ranges from a high correlation index to equality of the indices. In this note, we first give an overview of the different indices. Then we turn our attention to the mere ranking order provided by either of the indices. We compare the rankings obtained from different versions of the Shapley Value for a phylogenetic tree of European amphibians and illustrate their differences. We then undertake further analyses on simulated data and show that even though the chance of two rankings being exactly identical (when obtained from different versions of the Shapley Value) decreases with an increasing number of taxa, the distance between the two rankings converges to zero, i.e., the rankings are becoming more and more alike. Moreover, we introduce our freely available software package FairShapley, which was implemented in Perl and with which all calculations have been performed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. The ocular biometric differences of diabetic patients.

    Science.gov (United States)

    Kocatürk, Tolga; Zengin, Mehmet Özgür; Cakmak, Harun; Evliçoglu, Gökhan Evren; Dündar, Sema Oruç; Omürlü, Imran Kurt; Unübol, Mustafa; Güney, Engin

    2014-01-01

    To investigate the differences in ocular biometric and keratometric characteristics in comparison with biometric measurements using the noncontact optical low coherence reflectometer (OLCR) (Lenstar LS 900, Haag-Streit) on diabetic patients. The eyes of 170 patients were included in this study, including 81 diabetic and 89 nondiabetic subjects. Optical biometric measurements of diabetic and nondiabetic patients (between the ages of 25 and 85 years) who applied to the ophthalmology clinic were noted from March to June 2013. Detailed ophthalmologic examinations were done for every subject. Biometric measurements were done using the noncontact OLCR device. Patient age ranged from 29 to 83 years. Subgroup analyses were done in diabetic patients according to their Hba1C levels. The minimum Hba1C value was 5.3, maximum was 12.4, and mean was 7.56 ± 1.48. The median duration of diabetes was 5 years (25th-75th percentile 3.00-11.75). Diabetic patients were found to have thicker lens and shallower anterior chamber in both eyes compared to nondiabetic control subjects. There were no statistical differences between the groups according to central corneal thickness, axial length, or keratometric values in both eyes. However, lens thicknesses were found to be thicker and anterior chamber depth values were found to be shallower in the diabetic group in both eyes. It may useful to determine eyeglasses prescription, refractive surgery calculation, lens selection, and previous cataract surgery according to biometric measurements after the regulation of blood glucose.

  11. Mobile biometric device (MBD) technology :

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  12. Security analysis for biometric data in ID documents

    NARCIS (Netherlands)

    Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, A.A.C.M.

    2005-01-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents

  13. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  14. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    Human recognition is required for certain ... automated systems is that some can be stolen, passwords and PIN ... WORKS. A biometric system can be viewed as a simple diagram in figure 1. ... Feature extraction is done with the help of some.

  15. Biometrics Technology Review 2002

    National Research Council Canada - National Science Library

    Blackburn, T

    2003-01-01

    .... The report characterizes the main categories of biometric techniques, with a focus on face recognition, which is the least intrusive but most effective means of applying filters at access points to the country...

  16. Left ventricle ejection fraction obtained by radioisotopic angiocardiography. Correlation between the values of the conventional ventriclegraphy

    International Nuclear Information System (INIS)

    Ascer, E.; Pimentel Filho, W.A.; Martins, L.R.F.; Marioni Filho, H.; Queiroga Filho, A.F.; Alonso, G.; Germek, O.A.; Thom, A.F.; Souza, J.E.M.R.

    1983-01-01

    Forty-two patients with clinical signs of coronary insuficiency underwent cineangiographic and radioisotopic examinations with the purpose of analysing the correlation between the values of left ventricle ejection fraction (LVEF) obtained by both methods. The values of EF obtained by the hemodynamic method (HEMO) ranged from 0.14 to 0.85 (x-bar = 0.566) and by radioisotopic method (RM) from 0.22 to 0.89 (x-bar = 0.573). The Student T test did not demonstrate statistically significant differences between the two methods (mean of differences = 0.007; t = 0.38 and p ≥ 0.353). A regression equation was obtained in order to estimate the EF by HEMO deriving from results obtained by RM (y = 0.11 + 0.80x) and to estimate the EF through RN from the results obtained by HEMO (x = 0.08 + 0.86y), where y = hemodynamic method and x = radioisotopic method. The authors conclude that the calculation of the EF by the methods used showed a good correlation and that this fact is evidenced by the elevated Pearson's correlation coefficient (r = 0.833). (author) [pt

  17. Evaluation of Biometric Systems

    OpenAIRE

    El-Abed , Mohamad; Charrier , Christophe

    2012-01-01

    International audience; Biometrics is considered as a promising solution among traditional methods based on "what we own" (such as a key) or "what we know" (such as a password). It is based on "what we are" and "how we behave". Few people know that biometrics have been used for ages for identification or signature purposes. In 1928 for example, fingerprints were used for women clerical employees of Los Angeles police department as depicted in Figure 1. Fingerprints were also already used as a...

  18. Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images

    Directory of Open Access Journals (Sweden)

    R. Youmaran

    2012-01-01

    Full Text Available This paper develops an approach to measure the information content in a biometric feature representation of iris images. In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. The collected data is regularized using a Gaussian model of the feature covariances in order to practically measure the biometric information with limited data samples. An example of this method is shown for iris templates processed using Principal-Component Analysis- (PCA- and Independent-Component Analysis- (ICA- based feature decomposition schemes. From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. This value approximately matches previous estimates of iris information content.

  19. Biometric and Emotion Identification: An ECG Compression Based Method

    Directory of Open Access Journals (Sweden)

    Susana Brás

    2018-04-01

    Full Text Available We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG. The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1 conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2 conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3 identification of the ECG record class, using a 1-NN (nearest neighbor classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  20. Biometric and Emotion Identification: An ECG Compression Based Method.

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H T; Soares, Sandra C; Pinho, Armando J

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  1. Biometric and Emotion Identification: An ECG Compression Based Method

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H. T.; Soares, Sandra C.; Pinho, Armando J.

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model. PMID:29670564

  2. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  3. Biometrics Theory, Methods, and Applications

    CERN Document Server

    Boulgouris, N V; Micheli-Tzanakou, Evangelia

    2009-01-01

    An in-depth examination of the cutting edge of biometrics. This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:. Multilinear discriminant analysis for biometric signal recognition;. Biometric identity authentication techniques based on neural networks;. Multimodal biometrics and design of classifiers for biometric fusion;. Feature selection and facial aging modeling for face recognition;. Geometrical and

  4. Correlations between different tonometries and ocular biometric parameters in patients with primary congenital glaucoma.

    Science.gov (United States)

    Mendes, Marcio Henrique; Betinjane, Alberto Jorge; Quiroga, Veronica Andrea

    2013-01-01

    To identify the correlation between the difference of intraocular pressure measurements (IOP) obtained using the Goldmann applanation tonometer (GAT) and three others tonometers (Handheld applanation tonometer - HAT, Dynamic contour tonometer - DCT and Tono-Pen®) with biometric characteristics (corneal diameter, pachymetry, keratometry and axial length) in patients with congenital glaucoma. A cross-sectional study was performed on 46 eyes from 46 patients with congenital glaucoma. IOP measurements were obtained in all patients using GAT, HAT, DCT and Tono-Pen®. Keratometry, pachymetry, biometry and corneal diameter measurements were performed after the IOP measurement. The order of the tonometries was randomized. The correlations between the differences of IOP values of GAT and the other tonometers (Delta-IOP), and the different biometric parameters were studied. Tono-Pen® Delta IOP revealed moderate positive correlation to keratometry (r=0.41, p=0.004). The other Delta-IOPs showed no correlation with any of the biometric characteristics evaluated. IOP differences between GAT (gold standard) and GAT, HAT, DCT or Tono-Pen tonometers seem not to correlate with majority of ocular biometric characteristics. The only exception was the keratometry, which correlated in a positive and moderate way with Tono-Pen® Delta-IOP. This result suggests that the differences of IOP values of Tono-Pen® and GAT increase with the steepness of the cornea.

  5. On the Design of Forgiving Biometric Security Systems

    Science.gov (United States)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  6. Biometric measurements in highly myopic eyes.

    Science.gov (United States)

    Shen, Peiyang; Zheng, Yingfeng; Ding, Xiaohu; Liu, Bin; Congdon, Nathan; Morgan, Ian; He, Mingguang

    2013-02-01

    To assess the repeatability and accuracy of optical biometry (Lenstar LS900 optical low-coherence reflectometry [OLCR] and IOLMaster partial coherence interferometry [PCI]) and applanation ultrasound biometry in highly myopic eyes. Division of Preventive Ophthalmology, Zhongshan Ophthalmic Center, Guangzhou, China. Comparative evaluation of diagnostic technology. Biometric measurements were taken in highly myopic subjects with a spherical equivalent (SE) of -6.00 diopters (D) or higher and an axial length (AL) longer than 25.0 mm. Measurements of AL and anterior chamber depth (ACD) obtained by OLCR were compared with those obtained by PCI and applanation A-scan ultrasound. Right eyes were analyzed. Repeatability was evaluated using the coefficient of variation (CoV) and agreement, using Bland-Altman analyses. The mean SE was -11.20 D ± 4.65 (SD). The CoVs for repeated AL measurements using OLCR, PCI, and applanation ultrasound were 0.06%, 0.07%, and 0.20%, respectively. The limits of agreement (LoA) for AL were 0.11 mm between OLCR and PCI, 1.01 mm between OLCR and applanation ultrasound, and 1.03 mm between PCI and ultrasound. The ACD values were 0.29 mm, 0.53 mm, and 0.51 mm, respectively. These repeatability and agreement results were comparable in eyes with extreme myopia (AL ≥ 27.0 mm) or posterior staphyloma. The mean radius of corneal curvature was similar between OLCR and PCI (7.66 ± 0.24 mm versus 7.64 ± 0.25 mm), with an LoA of 0.12 mm. Optical biometry provided more repeatable and precise measurements of biometric parameters, including AL and ACD, than applanation ultrasound biometry in highly myopic eyes. No author has a financial or proprietary interest in any material or method mentioned. Copyright © 2012 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  7. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  8. Entropy Measurement for Biometric Verification Systems.

    Science.gov (United States)

    Lim, Meng-Hui; Yuen, Pong C

    2016-05-01

    Biometric verification systems are designed to accept multiple similar biometric measurements per user due to inherent intrauser variations in the biometric data. This is important to preserve reasonable acceptance rate of genuine queries and the overall feasibility of the recognition system. However, such acceptance of multiple similar measurements decreases the imposter's difficulty of obtaining a system-acceptable measurement, thus resulting in a degraded security level. This deteriorated security needs to be measurable to provide truthful security assurance to the users. Entropy is a standard measure of security. However, the entropy formula is applicable only when there is a single acceptable possibility. In this paper, we develop an entropy-measuring model for biometric systems that accepts multiple similar measurements per user. Based on the idea of guessing entropy, the proposed model quantifies biometric system security in terms of adversarial guessing effort for two practical attacks. Excellent agreement between analytic and experimental simulation-based measurement results on a synthetic and a benchmark face dataset justify the correctness of our model and thus the feasibility of the proposed entropy-measuring approach.

  9. Obtaining Approximate Values of Exterior Orientation Elements of Multi-Intersection Images Using Particle Swarm Optimization

    Science.gov (United States)

    Li, X.; Li, S. W.

    2012-07-01

    In this paper, an efficient global optimization algorithm in the field of artificial intelligence, named Particle Swarm Optimization (PSO), is introduced into close range photogrammetric data processing. PSO can be applied to obtain the approximate values of exterior orientation elements under the condition that multi-intersection photography and a small portable plane control frame are used. PSO, put forward by an American social psychologist J. Kennedy and an electrical engineer R.C. Eberhart, is a stochastic global optimization method based on swarm intelligence, which was inspired by social behavior of bird flocking or fish schooling. The strategy of obtaining the approximate values of exterior orientation elements using PSO is as follows: in terms of image coordinate observed values and space coordinates of few control points, the equations of calculating the image coordinate residual errors can be given. The sum of absolute value of each image coordinate is minimized to be the objective function. The difference between image coordinate observed value and the image coordinate computed through collinear condition equation is defined as the image coordinate residual error. Firstly a gross area of exterior orientation elements is given, and then the adjustment of other parameters is made to get the particles fly in the gross area. After iterative computation for certain times, the satisfied approximate values of exterior orientation elements are obtained. By doing so, the procedures like positioning and measuring space control points in close range photogrammetry can be avoided. Obviously, this method can improve the surveying efficiency greatly and at the same time can decrease the surveying cost. And during such a process, only one small portable control frame with a couple of control points is employed, and there are no strict requirements for the space distribution of control points. In order to verify the effectiveness of this algorithm, two experiments are

  10. OBTAINING APPROXIMATE VALUES OF EXTERIOR ORIENTATION ELEMENTS OF MULTI-INTERSECTION IMAGES USING PARTICLE SWARM OPTIMIZATION

    Directory of Open Access Journals (Sweden)

    X. Li

    2012-07-01

    Full Text Available In this paper, an efficient global optimization algorithm in the field of artificial intelligence, named Particle Swarm Optimization (PSO, is introduced into close range photogrammetric data processing. PSO can be applied to obtain the approximate values of exterior orientation elements under the condition that multi-intersection photography and a small portable plane control frame are used. PSO, put forward by an American social psychologist J. Kennedy and an electrical engineer R.C. Eberhart, is a stochastic global optimization method based on swarm intelligence, which was inspired by social behavior of bird flocking or fish schooling. The strategy of obtaining the approximate values of exterior orientation elements using PSO is as follows: in terms of image coordinate observed values and space coordinates of few control points, the equations of calculating the image coordinate residual errors can be given. The sum of absolute value of each image coordinate is minimized to be the objective function. The difference between image coordinate observed value and the image coordinate computed through collinear condition equation is defined as the image coordinate residual error. Firstly a gross area of exterior orientation elements is given, and then the adjustment of other parameters is made to get the particles fly in the gross area. After iterative computation for certain times, the satisfied approximate values of exterior orientation elements are obtained. By doing so, the procedures like positioning and measuring space control points in close range photogrammetry can be avoided. Obviously, this method can improve the surveying efficiency greatly and at the same time can decrease the surveying cost. And during such a process, only one small portable control frame with a couple of control points is employed, and there are no strict requirements for the space distribution of control points. In order to verify the effectiveness of this algorithm

  11. Obtaining S values for rectangular--solid tumors inside rectangular--solid host organs

    International Nuclear Information System (INIS)

    Stinchcomb, T.G.; Durham, J.S.; Fisher, D.R.

    1991-01-01

    A method is described for obtaining S values between a tumor and its host organ for use with the MIRD formalism. It applies the point-source specific absorbed fractions for an infinite water medium, tabulated by Berger, to a rectangular solid of arbitrary dimensions which contains a rectangular tumor of arbitrary dimensions. Contributions from pairs of source and target volume elements are summed for the S values between the tumor and itself, between the remaining healthy host organ and itself, and between the tumor and the remaining healthy host organ, with the reciprocity theorem assumed for the last. This method labeled MTUMOR, is interfaced with the widely used MIRDOSE program which incorporates the MIRD formalism. An example is calculated

  12. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  13. SOME COMPARATIVE BIOMETRIC ASPECTS IN ARISTICHTHYS NOBILIS AND HYPOPHTHALMICHTHYS MOLITRIX

    Directory of Open Access Journals (Sweden)

    GABRIELA VASILE

    2008-10-01

    Full Text Available The paper performs a comparative analysis of some biometric (total length, standard length, head length and caudal footstalks length in two cultured cyprinids species grown in a controlled system, namely: Aristichthys nobilis (bighead carp and Hypophthalmichthys molitrix (silver carp, of various ages (starting with the first up to the fourth growth summer. The results obtained evidenced that, along the four growing stages, the representatives of Hypophthalmichthys molitrix show slightly higher values than those of Aristichthys genus for the total and standard bodily length, while for the head length the situation is reversed.

  14. 41 CFR 102-75.305 - What type of appraisal value must be obtained for real property disposal transactions?

    Science.gov (United States)

    2010-07-01

    ... either the fair market value or the fair annual rental value of the property available for disposal. ... value must be obtained for real property disposal transactions? 102-75.305 Section 102-75.305 Public...-75.305 What type of appraisal value must be obtained for real property disposal transactions? For all...

  15. Anatomy of Biometric Passports

    Directory of Open Access Journals (Sweden)

    Dominik Malčík

    2012-01-01

    Full Text Available Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification technology and biometrics, especially (but not only in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation; moreover, specific security mechanisms are optional and can be omitted.

  16. Anatomy of Biometric Passports

    Science.gov (United States)

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  17. Anatomy of biometric passports.

    Science.gov (United States)

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted).

  18. Modular biometric system

    Science.gov (United States)

    Hsu, Charles; Viazanko, Michael; O'Looney, Jimmy; Szu, Harold

    2009-04-01

    Modularity Biometric System (MBS) is an approach to support AiTR of the cooperated and/or non-cooperated standoff biometric in an area persistent surveillance. Advanced active and passive EOIR and RF sensor suite is not considered here. Neither will we consider the ROC, PD vs. FAR, versus the standoff POT in this paper. Our goal is to catch the "most wanted (MW)" two dozens, separately furthermore ad hoc woman MW class from man MW class, given their archrivals sparse front face data basis, by means of various new instantaneous input called probing faces. We present an advanced algorithm: mini-Max classifier, a sparse sample realization of Cramer-Rao Fisher bound of the Maximum Likelihood classifier that minimize the dispersions among the same woman classes and maximize the separation among different man-woman classes, based on the simple feature space of MIT Petland eigen-faces. The original aspect consists of a modular structured design approach at the system-level with multi-level architectures, multiple computing paradigms, and adaptable/evolvable techniques to allow for achieving a scalable structure in terms of biometric algorithms, identification quality, sensors, database complexity, database integration, and component heterogenity. MBS consist of a number of biometric technologies including fingerprints, vein maps, voice and face recognitions with innovative DSP algorithm, and their hardware implementations such as using Field Programmable Gate arrays (FPGAs). Biometric technologies and the composed modularity biometric system are significant for governmental agencies, enterprises, banks and all other organizations to protect people or control access to critical resources.

  19. Towards Biometric Assessment of Audience Affect

    DEFF Research Database (Denmark)

    Lyng Wieland, Jakob; Larsen, Lars Bo; Laursen, Jeanette Kølbæk

    2016-01-01

    This paper investigates how reliable affective responses can be obtained using objective biometric measures for media audience research. We use Galvanic Skin Response (GSR) to detect sixteen respondents’ arousal levels and as an objective measure to show how self- reporting disrupts the experience...

  20. Body, biometrics and identity.

    Science.gov (United States)

    Mordini, Emilio; Massari, Sonia

    2008-11-01

    According to a popular aphorism, biometrics are turning the human body into a passport or a password. As usual, aphorisms say more than they intend. Taking the dictum seriously, we would be two: ourself and our body. Who are we, if we are not our body? And what is our body without us? The endless history of identification systems teaches that identification is not a trivial fact but always involves a web of economic interests, political relations, symbolic networks, narratives and meanings. Certainly there are reasons for the ethical and political concerns surrounding biometrics but these reasons are probably quite different from those usually alleged.

  1. Biometrics Foundation Documents

    Science.gov (United States)

    2009-01-01

    adjudication ( legal ) process. Forensics usually requires days of processing (versus seconds for biometrics) and are held to much higher accuracy...Living Body,” Medicina Philosophica, 11:620-629, 1992. 2 K. Shimizu and K. Yamomoto,“Imaging of Physiological Functions By Laser Transillumination

  2. Biometric Borders and Counterterrorism

    Science.gov (United States)

    2010-12-01

    licenses, credit cards, online retailers , and even military installations all rely on various methods to identify and authenticate individuals in... Malaysia ..................................................................................92 2. 2004—Pakistan and Belgium...first state to establish a national biometric screening program was Malaysia in 1998 with several others that followed suit in 2004–2006, many of which

  3. Differences in liver stiffness values obtained with new ultrasound elastography machines and Fibroscan: A comparative study.

    Science.gov (United States)

    Piscaglia, Fabio; Salvatore, Veronica; Mulazzani, Lorenzo; Cantisani, Vito; Colecchia, Antonio; Di Donato, Roberto; Felicani, Cristina; Ferrarini, Alessia; Gamal, Nesrine; Grasso, Valentina; Marasco, Giovanni; Mazzotta, Elena; Ravaioli, Federico; Ruggieri, Giacomo; Serio, Ilaria; Sitouok Nkamgho, Joules Fabrice; Serra, Carla; Festi, Davide; Schiavone, Cosima; Bolondi, Luigi

    2017-07-01

    Whether Fibroscan thresholds can be immediately adopted for none, some or all other shear wave elastography techniques has not been tested. The aim of the present study was to test the concordance of the findings obtained from 7 of the most recent ultrasound elastography machines with respect to Fibroscan. Sixteen hepatitis C virus-related patients with fibrosis ≥2 and having reliable results at Fibroscan were investigated in two intercostal spaces using 7 different elastography machines. Coefficients of both precision (an index of data dispersion) and accuracy (an index of bias correction factors expressing different magnitudes of changes in comparison to the reference) were calculated. Median stiffness values differed among the different machines as did coefficients of both precision (range 0.54-0.72) and accuracy (range 0.28-0.87). When the average of the measurements of two intercostal spaces was considered, coefficients of precision significantly increased with all machines (range 0.72-0.90) whereas of accuracy improved more scatteredly and by a smaller degree (range 0.40-0.99). The present results showed only moderate concordance of the majority of elastography machines with the Fibroscan results, preventing the possibility of the immediate universal adoption of Fibroscan thresholds for defining liver fibrosis staging for all new machines. Copyright © 2017 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  4. Biometric Analysis – A Reliable Indicator for Diagnosing Taurodontism using Panoramic Radiographs

    Science.gov (United States)

    Hegde, Veda; Anegundi, Rajesh Trayambhak; Pravinchandra, K.R.

    2013-01-01

    Background: Taurodontism is a clinical entity with a morpho–anatomical change in the shape of the tooth, which was thought to be absent in modern man. Taurodontism is mostly observed as an isolated trait or a component of a syndrome. Various techniques have been devised to diagnose taurodontism. Aim: The aim of this study was to analyze whether a biometric analysis was useful in diagnosing taurodontism, in radiographs which appeared to be normal on cursory observations. Setting and Design: This study was carried out in our institution by using radiographs which were taken for routine procedures. Material and Methods: In this retrospective study, panoramic radiographs were obtained from dental records of children who were aged between 9–14 years, who did not have any abnormality on cursory observations. Biometric analyses were carried out on permanent mandibular first molar(s) by using a novel biometric method. The values were tabulated and analysed. Statistics: Fischer exact probability test, Chi square test and Chi-square test with Yates correction were used for statistical analysis of the data. Results: Cursory observation did not yield us any case of taurodontism. In contrast, the biometric analysis yielded us a statistically significant number of cases of taurodontism. However, there was no statistically significant difference in the number of cases with taurodontism, which was obtained between the genders and the age group which was considered. Conclusion: Thus, taurodontism was diagnosed on a biometric analysis, which was otherwise missed on a cursory observation. It is therefore necessary from the clinical point of view, to diagnose even the mildest form of taurodontism by using metric analysis rather than just relying on a visual radiographic assessment, as its occurrence has many clinical implications and a diagnostic importance. PMID:24086912

  5. Biometric Analysis - A Reliable Indicator for Diagnosing Taurodontism using Panoramic Radiographs.

    Science.gov (United States)

    Hegde, Veda; Anegundi, Rajesh Trayambhak; Pravinchandra, K R

    2013-08-01

    Taurodontism is a clinical entity with a morpho-anatomical change in the shape of the tooth, which was thought to be absent in modern man. Taurodontism is mostly observed as an isolated trait or a component of a syndrome. Various techniques have been devised to diagnose taurodontism. The aim of this study was to analyze whether a biometric analysis was useful in diagnosing taurodontism, in radiographs which appeared to be normal on cursory observations. This study was carried out in our institution by using radiographs which were taken for routine procedures. In this retrospective study, panoramic radiographs were obtained from dental records of children who were aged between 9-14 years, who did not have any abnormality on cursory observations. Biometric analyses were carried out on permanent mandibular first molar(s) by using a novel biometric method. The values were tabulated and analysed. Fischer exact probability test, Chi square test and Chi-square test with Yates correction were used for statistical analysis of the data. Cursory observation did not yield us any case of taurodontism. In contrast, the biometric analysis yielded us a statistically significant number of cases of taurodontism. However, there was no statistically significant difference in the number of cases with taurodontism, which was obtained between the genders and the age group which was considered. Thus, taurodontism was diagnosed on a biometric analysis, which was otherwise missed on a cursory observation. It is therefore necessary from the clinical point of view, to diagnose even the mildest form of taurodontism by using metric analysis rather than just relying on a visual radiographic assessment, as its occurrence has many clinical implications and a diagnostic importance.

  6. Performance of biometric quality measures.

    Science.gov (United States)

    Grother, Patrick; Tabassi, Elham

    2007-04-01

    We document methods for the quantitative evaluation of systems that produce a scalar summary of a biometric sample's quality. We are motivated by a need to test claims that quality measures are predictive of matching performance. We regard a quality measurement algorithm as a black box that converts an input sample to an output scalar. We evaluate it by quantifying the association between those values and observed matching results. We advance detection error trade-off and error versus reject characteristics as metrics for the comparative evaluation of sample quality measurement algorithms. We proceed this with a definition of sample quality, a description of the operational use of quality measures. We emphasize the performance goal by including a procedure for annotating the samples of a reference corpus with quality values derived from empirical recognition scores.

  7. Geochemical porosity values obtained in core samples from different clay-rocks

    International Nuclear Information System (INIS)

    Fernandez, A.M.

    2010-01-01

    . The Cl porosity is lower than the total physical porosity, because clays have different types of water (interlayer water, adsorbed water and free water), and ions can be affected by anionic exclusion processes. The geochemical porosity includes only the free water and some of the diffuse layer and surface-sorbed water; while the total physical porosity includes both the external and interlayer water. In order to calculate the Cl or geochemical porosity (n cl ), a relationship was used, which relates leaching data and the chloride content of the pore water extracted by the squeezing technique. Aqueous leaching tests were performed at anoxic conditions in order to obtain the chloride inventory in different core samples from each argillaceous formation. Besides, the chemical composition of the pore water was obtained by squeezing at high pressures. Taking into account the measured physical properties of the rock samples, such as water content, dry density, total porosity and degree of saturation; the geochemical porosity was calculated by using the above relationship. For Boom Clay core samples, the mean Cl porosity/water loss porosity ratio is 0.81. In the case of Opalinus Clay, the mean Cl porosity/water loss porosity ratio is 0.59. In Mont Terri core samples, this ratio ranges from 0.5 to 0.7, although a value of 0.55 is frequently used. As conclusion, for indurated mud-rock formations (Callovo-Oxfordian and Opalinus Clay), the mean geochemical porosity obtained was around 8-10 %vol. (0.5-0.6 porosity ratio), whereas in the plastic Boom Clay the geochemical porosity was around 29 %vol. (0.8 porosity ratio)

  8. Obtaining and application of increased food and biological value iodinated products from lentils sprouted grain

    Directory of Open Access Journals (Sweden)

    L. V. Antipova

    2017-01-01

    Full Text Available The choice of research direction is related to the actual problem of production and distribution of functional purpose food products due to the spread of nutritional diseases and the lack of micronutrients in ordinary people and athletes diet. As an object for enrichment with iodine, it was suggested to use lentils, which is famous for its high protein content, low lipid and oligosaccharide content, and low inhibitory effect. The iodine accumulation occurs during germination, due to the use of a nutrient solution of the iodine inorganic form. In addition, the biochemical composition of the grain and the biological value of lentils are significantly improved: an increase in the content of total amino acids and vitamins is found to be 1.5-2.0 times, a mass fraction of the oligosaccharide fraction is observed. To determine the effect of technological processing on the degree of iodine conservation in lentils the grains were exposed to the following impact: grinding, extrusion, frying. An insignificant decrease in the amount of iodine during extrusion was noted and more significant one - during grinding. The obtained results of the determination of biological safety by the method of studying the effect of the investigated product on the growth response of ciliates allowed to confirm the safety of both fresh and dried sprouted grain of lentils. When studying the microbiology of grain by sowing on agarized selective diagnostic environments with subsequent identification of the qualitative and quantitative composition of microflora, including colony-forming units, deviations from the normative indices were not revealed. Experimental production of the extrudate was carried out, possible ways of its use in meat systems for improving the functional and technological properties of minced meat, as well as for independent use as snacks for the nutrition of athletes were suggested.

  9. Quantum Biometrics with Retinal Photon Counting

    Science.gov (United States)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  10. A systematic review of the angular values obtained by computerized photogrammetry in sagittal plane: a proposal for reference values.

    Science.gov (United States)

    Krawczky, Bruna; Pacheco, Antonio G; Mainenti, Míriam R M

    2014-05-01

    Reference values for postural alignment in the coronal plane, as measured by computerized photogrammetry, have been established but not for the sagittal plane. The objective of this study is to propose reference values for angular measurements used for postural analysis in the sagittal plane for healthy adults. Electronic databases (PubMed, BVS, Cochrane, Scielo, and Science Direct) were searched using the following key words: evaluation, posture, photogrammetry, and software. Articles published between 2006 and 2012 that used the PAS/SAPO (postural assessment software) were selected. Another inclusion criterion was the presentation of, at least, one of the following measurements: head horizontal alignment, pelvic horizontal alignment, hip angle, vertical alignment of the body, thoracic kyphosis, and lumbar lordosis. Angle samples of the selected articles were grouped 2 by 2 in relation to an overall average, which made possible total average, variance, and SD calculations. Six articles were included, and the following average angular values were found: 51.42° ± 4.87° (head horizontal alignment), -12.26° ± 5.81° (pelvic horizontal alignment), -6.40° ± 3.86° (hip angle), and 1.73° ± 0.94° (vertical alignment of the body). None of the articles contained the measurements for thoracic kyphosis and lumbar lordosis. The reference values can be adopted as reference for postural assessment in future researches if the same anatomical points are considered. Copyright © 2014 National University of Health Sciences. Published by Mosby, Inc. All rights reserved.

  11. Environmental Testing Methodology in Biometrics

    OpenAIRE

    Fernández Saavedra, Belén; Sánchez Reíllo, Raúl; Alonso Moreno, Raúl; Miguel Hurtado, Óscar

    2010-01-01

    8 pages document + 5-slide presentation.-- Contributed to: 1st International Biometric Performance Conference (IBPC 2010, NIST, Gaithersburg, MD, US, Mar 1-5, 2010). Recently, biometrics is used in many security systems and these systems can be located in different environments. As many experts claim and previous works have demonstrated, environmental conditions influence biometric performance. Nevertheless, there is not a specific methodology for testing this influence at the moment...

  12. Biometrics Go Mainstream

    Science.gov (United States)

    Gale, Doug

    2006-01-01

    Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…

  13. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  14. Analysis and comparison of biometric methods

    OpenAIRE

    Zatloukal, Filip

    2011-01-01

    The thesis deals with biometrics and biometric systems and the possibility to use these systems in the enterprise. Aim of this study is an analysis and description of selected types of biometric identification methods and their advantages and shortcomings. The work is divided into two parts. The first part is theoretical, describes the basic concepts of biometrics, biometric identification criteria, currently used identification systems, the ways of biometric systems use, performance measurem...

  15. Applying intelligent statistical methods on biometric systems

    OpenAIRE

    Betschart, Willie

    2005-01-01

    This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The l...

  16. Age factors in biometric processing

    CERN Document Server

    Fairhurst, Michael

    2013-01-01

    As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction. In Age Factors in Biometric Processing an in

  17. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations

    Science.gov (United States)

    2016-05-01

    Biometrics in Support of Operations Biometrics -at-Sea: Business Rules for South Florida United States...Intelligence Activities Biometrics -Enabled Intelligence USCG Biometrics -at-Sea: Business Rules for...Defense Biometrics United States Intelligence Activities Active Army,

  18. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  19. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

    OpenAIRE

    Jin, Zhe; Lai, Yen-Lung; Hwang, Jung-Yeon; Kim, Soohyung; Teoh, Andrew Beng Jin

    2017-01-01

    In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code. We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. The disc...

  20. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  1. Obtaining the Iodine Value of Various Oils via Bromination with Pyridinium Tribromide

    Science.gov (United States)

    Simurdiak, Michael; Olukoga, Olushola; Hedberg, Kirk

    2016-01-01

    A laboratory exercise was devised that allows students to rapidly and fairly accurately determine the iodine value of oleic acid. This method utilizes the addition of elemental bromine to the unsaturated bonds in oleic acid, due to bromine's relatively fast reaction rate compared to that of the traditional Wijs solution method. This method also…

  2. Biometrics — Developments and Potential

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond N.J.

    2014-01-01

    This article describes the use of biometric technology in forensic science, for the development of new methods and tools, improving the current forensic biometric applications, and allowing for the creation of new ones. The article begins with a definition and a summary of the development of this

  3. Biometric Communication Research for Television.

    Science.gov (United States)

    Malik, M. F.

    Biometric communication research is defined as research dealing with the information impact of a film or television show, photographic picture, painting, exhibition, display, or any literary or functional texts or verbal stimuli on human beings, both as individuals and in groups (mass audiences). Biometric communication research consists of a…

  4. Biometric Authentication Using the PPG: A Long-Term Feasibility Study

    Directory of Open Access Journals (Sweden)

    Jorge Sancho

    2018-05-01

    Full Text Available The photoplethysmogram (PPG is a biomedical signal that can be used to estimate volumetric blood flow changes in the peripheral circulation. During the past few years, several works have been published in order to assess the potential for PPGs to be used in biometric authentication systems, but results are inconclusive. In this paper we perform an analysis of the feasibility of using the PPG as a realistic biometric alternative in the long term. Several feature extractors (based on the time domain and the Karhunen–Loève transform and matching metrics (Manhattan and Euclidean distances have been tested using four different PPG databases (PRRB, MIMIC-II, Berry, and Nonin. We show that the false match rate (FMR and false non-match rate (FNMR values remain constant in different time instances for a selected threshold, which is essential for using the PPG for biometric authentication purposes. On the other hand, obtained equal error rate (EER values for signals recorded during the same session range from 1.0% for high-quality signals recorded in controlled conditions to 8% for those recorded in conditions closer to real-world scenarios. Moreover, in certain scenarios, EER values rise up to 23.2% for signals recorded over different days, signaling that performance degradation could take place with time.

  5. Biometric Authentication Using the PPG: A Long-Term Feasibility Study.

    Science.gov (United States)

    Sancho, Jorge; Alesanco, Álvaro; García, José

    2018-05-11

    The photoplethysmogram (PPG) is a biomedical signal that can be used to estimate volumetric blood flow changes in the peripheral circulation. During the past few years, several works have been published in order to assess the potential for PPGs to be used in biometric authentication systems, but results are inconclusive. In this paper we perform an analysis of the feasibility of using the PPG as a realistic biometric alternative in the long term. Several feature extractors (based on the time domain and the Karhunen⁻Loève transform) and matching metrics (Manhattan and Euclidean distances) have been tested using four different PPG databases (PRRB, MIMIC-II, Berry, and Nonin). We show that the false match rate ( FMR ) and false non-match rate ( FNMR ) values remain constant in different time instances for a selected threshold, which is essential for using the PPG for biometric authentication purposes. On the other hand, obtained equal error rate (EER) values for signals recorded during the same session range from 1.0% for high-quality signals recorded in controlled conditions to 8% for those recorded in conditions closer to real-world scenarios. Moreover, in certain scenarios, EER values rise up to 23.2% for signals recorded over different days, signaling that performance degradation could take place with time.

  6. Combining Cryptography with EEG Biometrics.

    Science.gov (United States)

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  7. A bimodal biometric identification system

    Science.gov (United States)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  8. Obtaining value prior to pulping with diethyl oxalate and oxalic acid

    Science.gov (United States)

    W.R. Kenealy; E. Horn; C.J. Houtman; J. Laplaza; T.W. Jeffries

    2007-01-01

    Pulp and paper are converted to paper products with yields of paper dependent on the wood and the process used. Even with high yield pulps there are conversion losses and with chemical pulps the yields approach 50%. The portions of the wood that do not provide product are either combusted to generate power and steam or incur a cost in waste water treatment. Value prior...

  9. Normal Values of Tissue-Muscle Perfusion Indexes of Lower Limbs Obtained with a Scintigraphic Method.

    Science.gov (United States)

    Manevska, Nevena; Stojanoski, Sinisa; Pop Gjorceva, Daniela; Todorovska, Lidija; Miladinova, Daniela; Zafirova, Beti

    2017-09-01

    Introduction Muscle perfusion is a physiologic process that can undergo quantitative assessment and thus define the range of normal values of perfusion indexes and perfusion reserve. The investigation of the microcirculation has a crucial role in determining the muscle perfusion. Materials and method The study included 30 examinees, 24-74 years of age, without a history of confirmed peripheral artery disease and all had normal findings on Doppler ultrasonography and pedo-brachial index of lower extremity (PBI). 99mTc-MIBI tissue muscle perfusion scintigraphy of lower limbs evaluates tissue perfusion in resting condition "rest study" and after workload "stress study", through quantitative parameters: Inter-extremity index (for both studies), left thigh/right thigh (LT/RT) left calf/right calf (LC/RC) and perfusion reserve (PR) for both thighs and calves. Results In our investigated group we assessed the normal values of quantitative parameters of perfusion indexes. Indexes ranged for LT/RT in rest study 0.91-1.05, in stress study 0.92-1.04. LC/RC in rest 0.93-1.07 and in stress study 0.93-1.09. The examinees older than 50 years had insignificantly lower perfusion reserve of these parameters compared with those younger than 50, LC (p=0.98), and RC (p=0.6). Conclusion This non-invasive scintigraphic method allows in individuals without peripheral artery disease to determine the range of normal values of muscle perfusion at rest and stress condition and to clinically implement them in evaluation of patients with peripheral artery disease for differentiating patients with normal from those with impaired lower limbs circulation.

  10. Evolutionary Algorithms Application Analysis in Biometric Systems

    OpenAIRE

    N. Goranin; A. Cenys

    2010-01-01

    Wide usage of biometric information for person identity verification purposes, terrorist acts prevention measures and authenticationprocess simplification in computer systems has raised significant attention to reliability and efficiency of biometricsystems. Modern biometric systems still face many reliability and efficiency related issues such as reference databasesearch speed, errors while recognizing of biometric information or automating biometric feature extraction. Current scientificinv...

  11. INVESTIGATION OF THE POSSIBILITY OF OBTAINING DRY BASES FROM PROCESSED FISH PRODUCTS OF LITTLE VALUE

    Directory of Open Access Journals (Sweden)

    O. P. Dvoryaninova

    2014-01-01

    Full Text Available Summary. Competitive advantages of this direction of researches are in justification of actions and offers on a technical provision of production of a dry fish basis from meat- and bone residue of pond fishes that will allow to produce fast foods of high quality and biological value (broths, soups, sauces, to expand the assortment taking into account market demand, to introduce the new forms of food convenient in storage and use at home and outside as well as for special food. The first courses on dry fish broth are easily digestible, with the high contents of micro and macro elements in the quantity of them they surpass meat broths. Their other advantage is the content of the polynonsaturated fatty acids neutralizing negative impact of substances, destroying tendons, ligaments and cartilage in the human body, thereby eliminating joint pains that is especially important for the determined groups of the population, for example, the military personnel, sportsmen, etc. In addition, this technology includes sparing modes of processing of raw materials, keeping thereby native properties of useful substances (protein, fat as much as possible. Researches on selection of an optimum ratio of the heads and the bones providing high organoleptic rates of broths on their basis were carried out to produce dry fish bases. Conditions and parameters of convective drying of little value products of cutting of silver carp and cod are determined. The results allow to draw a preliminary conclusion on the possibility of creation a new technology of powdery products for broths fast preparation. The developed technology is of great importance in the creation of waste-free and low-waste production at the enterprises of fishery industry of the Russian Federation.

  12. Multimodal biometric system using rank-level fusion approach.

    Science.gov (United States)

    Monwar, Md Maruf; Gavrilova, Marina L

    2009-08-01

    In many real-world applications, unimodal biometric systems often face significant limitations due to sensitivity to noise, intraclass variability, data quality, nonuniversality, and other factors. Attempting to improve the performance of individual matchers in such situations may not prove to be highly effective. Multibiometric systems seek to alleviate some of these problems by providing multiple pieces of evidence of the same identity. These systems help achieve an increase in performance that may not be possible using a single-biometric indicator. This paper presents an effective fusion scheme that combines information presented by multiple domain experts based on the rank-level fusion integration method. The developed multimodal biometric system possesses a number of unique qualities, starting from utilizing principal component analysis and Fisher's linear discriminant methods for individual matchers (face, ear, and signature) identity authentication and utilizing the novel rank-level fusion method in order to consolidate the results obtained from different biometric matchers. The ranks of individual matchers are combined using the highest rank, Borda count, and logistic regression approaches. The results indicate that fusion of individual modalities can improve the overall performance of the biometric system, even in the presence of low quality data. Insights on multibiometric design using rank-level fusion and its performance on a variety of biometric databases are discussed in the concluding section.

  13. Biometric micromixer design

    Energy Technology Data Exchange (ETDEWEB)

    Wang, C.T.; Hu, Z.Y. [National I-Lan Univ., Taiwan (China). Dept. of Mechanical and Electromechanical Engineering; Shaw, C.K. [California Univ., Los Angeles, CA (United States). Dept. of Mechanical and Aerospace Engineering

    2008-07-01

    Fluid mixing in microchannels has many applications, and is particularly important in microfluidic systems for biochemistry and biomedical analysis, or for the production or organic compounds in microreactors. Micromixer development should take into consideration a simple system design with a high mixing efficiency and effective techniques for examining mixing efficiency. Mechanical stirring methods are not suitable for fluid mixing in microchannels because the flow inside microchannels is predominantly laminar and the Reynolds numbers are usually lower than 10. Improving the flexibility and performance of microfluidic systems by incorporating different processes such as fluid handling and fluid motion that cause rapid mixing on micro scale can be challenging. To achieve optimal mixing, an efficient micromixer usually involves complex 3-dimensional geometries which are used to enhance the fluid lamination, stretching and folding. In this study, a biometric concept imitated from distribution of human blood vessel was applied to passive micromixers to promote mixing efficiency. Microchannels of different widths were used to construct the biometric structure. The main advantages of the new design were a high mixing performance and lower pressure drop. Mixing performance was evaluated using a mixing index. The mixing efficiencies in the micromixer under different Reynolds numbers ranging from 1 to 10 were evaluated with a 370 {mu}m device. The main mixing mechanics in this type of passive micromixer was the convection effect. The 2D numerical results revealed that the mixing efficiency of the mixer was 0.876 at Reynolds ratio of 0.85. 9 refs., 3 tabs., 4 figs.

  14. Partial Adaptation of Obtained and Observed Value Signals Preserves Information about Gains and Losses.

    Science.gov (United States)

    Burke, Christopher J; Baddeley, Michelle; Tobler, Philippe N; Schultz, Wolfram

    2016-09-28

    Given that the range of rewarding and punishing outcomes of actions is large but neural coding capacity is limited, efficient processing of outcomes by the brain is necessary. One mechanism to increase efficiency is to rescale neural output to the range of outcomes expected in the current context, and process only experienced deviations from this expectation. However, this mechanism comes at the cost of not being able to discriminate between unexpectedly low losses when times are bad versus unexpectedly high gains when times are good. Thus, too much adaptation would result in disregarding information about the nature and absolute magnitude of outcomes, preventing learning about the longer-term value structure of the environment. Here we investigate the degree of adaptation in outcome coding brain regions in humans, for directly experienced outcomes and observed outcomes. We scanned participants while they performed a social learning task in gain and loss blocks. Multivariate pattern analysis showed two distinct networks of brain regions adapt to the most likely outcomes within a block. Frontostriatal areas adapted to directly experienced outcomes, whereas lateral frontal and temporoparietal regions adapted to observed social outcomes. Critically, in both cases, adaptation was incomplete and information about whether the outcomes arose in a gain block or a loss block was retained. Univariate analysis confirmed incomplete adaptive coding in these regions but also detected nonadapting outcome signals. Thus, although neural areas rescale their responses to outcomes for efficient coding, they adapt incompletely and keep track of the longer-term incentives available in the environment. Optimal value-based choice requires that the brain precisely and efficiently represents positive and negative outcomes. One way to increase efficiency is to adapt responding to the most likely outcomes in a given context. However, too strong adaptation would result in loss of precise

  15. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  16. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  17. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  18. Comparative and Analysis of Biometric Systems

    OpenAIRE

    Manivannan,; Padma

    2011-01-01

    Biometric as the science of recognizing an individual based on his or her physical or behavioral traits, it is beginning to gain acceptance as a legitimate method for determining an individual identity.Biometric have now been deployed in various commercial, civilian, and national security applications. Biometric described overview of various biometric techniques and the need to be addressed form making biometric technology an effective tool for providing information security.

  19. [Correlation and interconversion between erythrocyte cholinesterase values obtained by the Michel and the EQM techniques].

    Science.gov (United States)

    Carmona-Fonseca, Jaime

    2006-12-01

    Several techniques are available to measure red cell cholinesterase; therefore, evaluations with several methods provide a measure of concordance. An equation was formulated to transform native data of reference values to reference units of cholinesterase activity as measured by Michel and EQM tests. The experimental design was descriptive, transversal and prospective. The group sampled was a representative adult working population, aged 18-75, without previous exposure to cholinesterase inhibitors pesticides. The individuals were affiliated to the Social Security System and resided in Valle de Aburrá and Cercano Oriente Antioqueño (Antioquia Province, northwestern Colombia). Of 827 individuals, quantitative erythrocytes (Michel y EQM) tests exhibited "r" coefficients between 0.67 and R2 coefficient of 44%.,This indicated that one test explained the results in other test in 44% of the cases. The corelation was higher in Aburrá than in Oriente. The linear model for the 827 individuals was as follows: EQM U/g oxy-hemoglobin = 9.575 U/ g oxy-hemoglobin + 29.791 (Michel delta pH/hour). Michel delta pH/hr = 0.3312 delta pH/hour + 0.0149 (EQM U/g oxy-hemoglobin), where EQM was expressed in U/g oxy-hemoglobin and Michel pH change/hr. Inter-sections (coefficient a) and inclines (coefficient b) were significant in this model. In the adjusted equations, after exclusion of 12 extreme data (1.5% of 827), the r coefficient increased from 0.67 to 0.72 The adjusted equations were as follows: EQM U/g oxy-hemoglobin = 8.1884 U/g oxy-hemoglobin + 31.3920 (Michel delta pH/hour); Michel delta pH/hr = 0.2925 delta pH/hr + 0.0161 (EQM U/g oxy-hemoglobin). This system of linear equations permitted the transformation of Michel (delta PH/ hr) units to EQM (U/g oxy-hemoglobin) units and vice versa. This will facilitate data comparisons by clinicians and epidemiologists who are using these methods of cholinesterase measurement.

  20. Multimodal Biometric System- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

    OpenAIRE

    Grace Wangari Mwaura; Prof. Waweru Mwangi; Dr. Calvins Otieno

    2017-01-01

    Biometrics has developed to be one of the most relevant technologies used in Information Technology IT security. Unimodal biometric systems have a variety of problems which decreases the performance and accuracy of these system. One way to overcome the limitations of the unimodal biometric systems is through fusion to form a multimodal biometric system. Generally biometric fusion is defined as the use of multiple types of biometric data or ways of processing the data to improve the performanc...

  1. Biometric parameters in different stages of primary angle closure using low-coherence interferometry.

    Science.gov (United States)

    Yazdani, Shahin; Akbarian, Shadi; Pakravan, Mohammad; Doozandeh, Azadeh; Afrouzifar, Mohsen

    2015-03-01

    To compare ocular biometric parameters using low-coherence interferometry among siblings affected with different degrees of primary angle closure (PAC). In this cross-sectional comparative study, a total of 170 eyes of 86 siblings from 47 families underwent low-coherence interferometry (LenStar 900; Haag-Streit, Koeniz, Switzerland) to determine central corneal thickness, anterior chamber depth (ACD), aqueous depth (AD), lens thickness (LT), vitreous depth, and axial length (AL). Regression coefficients were applied to show the trend of the measured variables in different stages of angle closure. To evaluate the discriminative power of the parameters, receiver operating characteristic curves were used. Best cutoff points were selected based on the Youden index. Sensitivity, specificity, positive and negative predicative values, positive and negative likelihood ratios, and diagnostic accuracy were determined for each variable. All biometric parameters changed significantly from normal eyes to PAC suspects, PAC, and PAC glaucoma; there was a significant stepwise decrease in central corneal thickness, ACD, AD, vitreous depth, and AL, and an increase in LT and LT/AL. Anterior chamber depth and AD had the best diagnostic power for detecting angle closure; best levels of sensitivity and specificity were obtained with cutoff values of 3.11 mm for ACD and 2.57 mm for AD. Biometric parameters measured by low-coherence interferometry demonstrated a significant and stepwise change among eyes affected with various degrees of angle closure. Although the current classification scheme for angle closure is based on anatomical features, it has excellent correlation with biometric parameters.

  2. Cross Disciplinary Biometric Systems

    CERN Document Server

    Liu, Chengjun

    2012-01-01

    Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance.  Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their face publicly every day. Face recognition systems display superb performance when they capitalize on the innovative ideas across color science, mathematics, and computer science (e.g., pattern recognition, machine learning, and image processing). The novel ideas lead to the development of new color models and effective ...

  3. Biometrics Research and Engineering Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — As the Department of Defense moves forward in its pursuit of integrating biometrics technology into facility access control, the Global War on Terrorism and weapon...

  4. NIST biometric evaluations and developments

    Science.gov (United States)

    Garris, Michael D.; Wilson, Charles L.

    2005-05-01

    This paper presents an R&D framework used by the National Institute of Standards and Technology (NIST) for biometric technology testing and evaluation. The focus of this paper is on fingerprint-based verification and identification. Since 9-11 the NIST Image Group has been mandated by Congress to run a program for biometric technology assessment and biometric systems certification. Four essential areas of activity are discussed: 1) developing test datasets, 2) conducting performance assessment; 3) technology development; and 4) standards participation. A description of activities and accomplishments are provided for each of these areas. In the process, methods of performance testing are described and results from specific biometric technology evaluations are presented. This framework is anticipated to have broad applicability to other technology and application domains.

  5. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  6. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  7. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique; Ahmad, Qutbuddin S.

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009

  8. Signal and image processing for biometrics

    CERN Document Server

    Proença, Hugo; Du, Eliza

    2014-01-01

    This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

  9. BIOMETRIC AUTHENTICATION SYSTEM USING RPI

    OpenAIRE

    Fatema A. Shaikh*; Prof.S.O.Rajankar

    2016-01-01

    A biometric authentication system acquires biometric sample such as fingerprint. The fingerprint signifies physiological features of an individual.This is a system which maintains the attendance records of students automatically. In this designing of an efficient module that comprises of a fingerprint sensor to manage the attendance records of students. This module enrolls the student’s as well as staff’s fingerprints. This enrolling is a onetime process and their fingerprints will be stored...

  10. Experimentally obtained values of electric field of an atmospheric pressure plasma jet impinging on a dielectric surface

    NARCIS (Netherlands)

    Sobota, A.; Guaitella, O.; Garcia-Caurel, E.

    2013-01-01

    We report on experimentally obtained values of the electric field magnitude on a dielectric surface induced by an impinging atmospheric pressure plasma jet. The plasma plume was striking the dielectric surface at an angle of 45¿, at 5mm from the surface measured at the axis of the jet. The results

  11. Cephalometric analysis for the diagnosis of sleep apnea: a comparative study between reference values and measurements obtained for Brazilian subjects

    Directory of Open Access Journals (Sweden)

    Patrícia Superbi Lemos Maschtakow

    2013-06-01

    Full Text Available OBJECTIVE: To verify if the reference values of Sleep Apnea cephalometric analysis of North American individuals are similar to the ones of Brazilian individuals presenting no craniofacial anomalies. The study also aimed to identify craniofacial alterations in Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS patients in relation to individuals without clinical characteristics of the disease through this cephalometric analysis. METHOD: It were used 55 lateral cephalograms consisting of 29 for the control group of adult individuals without clinical characteristics of OSAHS and 26 apneic adults. All radiographs were submitted to Sleep Apnea cephalometric analysis through Radiocef Studio 2.0. The standard values of this analysis were compared, by means of z test, to the ones obtained from the control group and these were compared to values from apneic group through Student's t test. RESULTS: There were no significant differences between values obtained from control group and standard values. On the group of OSAHS patients it was observed a decrease on the dimensions of upper airways and an increase on the soft palate length. CONCLUSIONS: The standard values of Sleep Apnea analysis can be used as reference in Brazilian individuals. Besides, through lateral cephalograms it was possible to identify craniofacial alterations in OSAHS patients.

  12. RESEARCH REGARDING SOME PHYSICAL QUALITY VALUES OF JAPANESE QUAIL EGGS OBTAINED AT THE MIDDLE OF THE LAYING STAGE

    Directory of Open Access Journals (Sweden)

    ANCA TEUŞAN

    2009-10-01

    Full Text Available The Japanese quail is one of the smallest bird subspecies which has been tamed by man, being industrially raised in our days in many states over the world. This avian subspecies produces over 300 eggs, and though there are about 6 races and different varieties, there are very little data in the scientific literature regarding the quality values for eggs of Japanese quail hatching eggs collected from hens at the end of the laying – physical values (pH value of the eggs components, albumen index, yolk index The present paper wants to bring a series of data regarding some of these indicators. The pH values was determined with an portable pH-oximeter, and to establish the other two quality indexes we used a device fitted with callipers taking into account: height of the dense egg white (albumen, minimum and maximum diameter of the dense and fluid egg white, height and the diameter of the yolk. The albumen pH recorded values of 8.90, and the yolk pH values of 6.07. The statistical mean for the 130 values of albumen index taken in study was 0.048. The mean value of yolk index was 0.399. The obtained results are normal for the period of quail’s life.

  13. Evolutionary Algorithms Application Analysis in Biometric Systems

    Directory of Open Access Journals (Sweden)

    N. Goranin

    2010-01-01

    Full Text Available Wide usage of biometric information for person identity verification purposes, terrorist acts prevention measures and authenticationprocess simplification in computer systems has raised significant attention to reliability and efficiency of biometricsystems. Modern biometric systems still face many reliability and efficiency related issues such as reference databasesearch speed, errors while recognizing of biometric information or automating biometric feature extraction. Current scientificinvestigations show that application of evolutionary algorithms may significantly improve biometric systems. In thisarticle we provide a comprehensive review of main scientific research done in sphere of evolutionary algorithm applicationfor biometric system parameter improvement.

  14. Increasing the Robustness of Biometric Templates for Dynamic Signature Biometric Systems

    OpenAIRE

    Tolosana Moranchel, Rubén; Vera-Rodríguez, Rubén; Ortega-García, Javier; Fiérrez, Julián

    2015-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia and J. Fierrez, "Increasing the robustness of biometric templates for dynamic...

  15. The Effect of Decomposition on the Efficacy of Biometrics for Positive Identification.

    Science.gov (United States)

    Sauerwein, Kelly; Saul, Tiffany B; Steadman, Dawnie Wolfe; Boehnen, Chris B

    2017-11-01

    Biometrics, unique measurable physiological and behavioral characteristics, are used to identify individuals in a variety of scenarios, including forensic investigations. However, data on the longevity of these indicators are incomplete. This study demonstrated that iris and fingerprint biometric data can be obtained up to four days postmortem in warmer seasons and 50 + days in the winter. It has been generally believed, but never studied, that iris recognition is only obtainable within the first 24 hours after death. However, this study showed that they remain viable for longer (2-34 days) depending upon the environmental conditions. Temperature, precipitation, insects, and scavenger activity were the primary factors affecting the retention of biometrics in decomposing human remains. While this study is an initial step in determining the utility of physiological biometrics across postmortem time, biometric research has the potential to make important contributions to human identification and the law enforcement, military, and medicolegal communities. © 2017 American Academy of Forensic Sciences.

  16. Importance of clean-up for comparison of TEQ-values obtained by CALUX and chemo-analysis.

    Science.gov (United States)

    Van Wouwe, N; Windal, I; Vanderperren, H; Eppe, G; Xhrouet, C; De Pauw, E; Goeyens, L; Baeyens, W

    2004-08-08

    This paper presents Chemically Activated LUciferine gene eXpression (CALUX) TEQ-values obtained for nine plasma samples following two different purification procedures, one of them involving fractionation. CALUX results obtained for the dioxin (DX) and dioxin + PCB (DX + PCB) fractions were then compared to the GC-HRMS TEQ-values calculated for the 17 polychlorinated dibenzo-p-dioxins and polychlorinated dibenzofurans (17 PCDD/F) and 17 PCDD/F + 4 cPCB congeners, respectively. The overestimation of the CALUX (DX fraction) TEQ-values in comparison with the chemo-analyses of the 17 PCDD/F is mainly explained by the presence of other AhR agonists, like brominated compounds. Otherwise, the constancy of the CALUX (DX + PCB fraction) TEQ-value which compares to increasing the GC-HRMS (17 PCDD/F + 4 cPCB) TEQ results raises questions concerning (1) the significance of CALUX results obtained without fractionation as well as (2) the toxicological effect of a cocktail of contaminants on the human health.

  17. Palmprint and Face Multi-Modal Biometric Recognition Based on SDA-GSVD and Its Kernelization

    Directory of Open Access Journals (Sweden)

    Jing-Yu Yang

    2012-04-01

    Full Text Available When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person’s overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA. Specifically, one person’s different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance.

  18. Palmprint and face multi-modal biometric recognition based on SDA-GSVD and its kernelization.

    Science.gov (United States)

    Jing, Xiao-Yuan; Li, Sheng; Li, Wen-Qian; Yao, Yong-Fang; Lan, Chao; Lu, Jia-Sen; Yang, Jing-Yu

    2012-01-01

    When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person's overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA). Specifically, one person's different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD) technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance.

  19. Palmprint and Face Multi-Modal Biometric Recognition Based on SDA-GSVD and Its Kernelization

    Science.gov (United States)

    Jing, Xiao-Yuan; Li, Sheng; Li, Wen-Qian; Yao, Yong-Fang; Lan, Chao; Lu, Jia-Sen; Yang, Jing-Yu

    2012-01-01

    When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person's overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA). Specifically, one person's different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD) technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance. PMID:22778600

  20. Viscoplastic-dynamic analyses of small-scale fracture tests to obtain crack arrest toughness values for PTS conditions

    International Nuclear Information System (INIS)

    Kanninen, M.F.; Hudak, S.J. Jr; Dexter, R.J.; Couque, H.; O'Donoghue, P.E.; Polch, E.Z.

    1988-01-01

    Reliable predictions of crack arrest at the high upper shelf toughness conditions involved in postulated pressurized thermal shock (PTS) events require procedures beyond those utilized in conventional fracture mechanics treatments. To develop such a procedure, viscoplastic-dynamic fracture mechanics finite element analyses, viscoplastic material characterization testing, and small-scale crack propagation and arrest experimentation are being combines in this research. The approach couples SwRI's viscoplastic-dynamic fracture mechanics finite element code VISCRK with experiments using duplex 4340/A533B steel compact specimens. The experiments are simulated by VISCRK computations employing the Bodner-Partom viscoplastic constitutive relation and the nonlinear fracture mechanics parameter T. The goal is to develop temperature-dependent crack arrest toughness values for A533B steel. While only room temperature K Ia values have been obtained so far, these have been found to agree closely with those obtained from wide plate tests. (author)

  1. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    Khan, Muhammad Khurram; Zhang Jiashu; Tian Lei

    2007-01-01

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  2. Chaotic secure content-based hidden transmission of biometric templates

    Energy Technology Data Exchange (ETDEWEB)

    Khan, Muhammad Khurram [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)]. E-mail: khurram.khan@scientist.com; Zhang Jiashu [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China); Tian Lei [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)

    2007-06-15

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature.

  3. Gaze as a biometric

    Science.gov (United States)

    Yoon, Hong-Jun; Carmichael, Tandy R.; Tourassi, Georgia

    2014-03-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing still images with different spatial relationships. Specifically, we created 5 visual "dotpattern" tests to be shown on a standard computer monitor. These tests challenged the viewer's capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users' average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  4. Gaze as a biometric

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Carmichael, Tandy [Tennessee Technological University; Tourassi, Georgia [ORNL

    2014-01-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  5. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  6. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    .... The ultimate goal of voice biometrics is to enable the use of voice as a password. Voice biometrics are "man-in-the-loop" systems in which system performance is significantly dependent on human performance...

  7. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  8. Biometric Authorization and Registration Systems and Methods

    National Research Council Canada - National Science Library

    Caulfield, H

    2002-01-01

    Biometric authorization and registration systems and methods are disclosed. In one embodiment, the system preferably comprises a firearm that includes a biometric authorization system, a plurality of training computers, and a server...

  9. A framework for biometric playtesting of games

    OpenAIRE

    Janssen, Dirk; Calvi, Licia; Gualeni, Stefano; Foundation of Digital Games Conference

    2013-01-01

    The described framework is meant to assist game developers in using biometric (psychophysiological) methods while playtesting. Biometric methods can give developers a valuable additional window on the playtester's experience.

  10. Comparison of oxygen saturation values obtained from fingers on physically restrained or unrestrained sides of the body.

    Science.gov (United States)

    Korhan, Esra Akin; Yönt, Gülendam Hakverdioğlu; Khorshid, Leyla

    2011-01-01

    The aim of this study was to compare semiexperimentally the pulse oximetry values obtained from a finger on restrained or unrestrained sides of the body. The pulse oximeter provides a noninvasive measurement of the oxygen saturation of hemoglobin in arterial blood. One of the procedures most frequently applied to patients in intensive care units is the application of physical restraint. Circulation problems are the most important complication in patients who are physically restrained. Evaluation of oxygen saturation from body parts in which circulation is impeded or has deteriorated can cause false results. The research sample consisted of 30 hospitalized patients who participated in the study voluntarily and who were concordant with the inclusion criteria of the study. Patient information and patient follow-up forms were used for data collection. Pulse oximetry values were measured simultaneously using OxiMax Nellcor finger sensors from fingers on the restrained and unrestrained sides of the body. Numeric and percentile distributions were used in evaluating the sociodemographic properties of patients. A significant difference was found between the oxygen saturation values obtained from a finger of an arm that had been physically restrained and a finger of an arm that had not been physically restrained. The mean oxygen saturation value measured from a finger of an arm that had been physically restrained was found to be 93.40 (SD, 2.97), and the mean oxygen saturation value measured from a finger of an arm that had not been physically restrained was found to be 95.53 (SD, 2.38). The results of this study indicate that nurses should use a finger of an arm that is not physically restrained when evaluating oxygen saturation values to evaluate them correctly.

  11. Biometrics for electronic health records.

    Science.gov (United States)

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.

  12. A method of ECG template extraction for biometrics applications.

    Science.gov (United States)

    Zhou, Xiang; Lu, Yang; Chen, Meng; Bao, Shu-Di; Miao, Fen

    2014-01-01

    ECG has attracted widespread attention as one of the most important non-invasive physiological signals in healthcare-system related biometrics for its characteristics like ease-of-monitoring, individual uniqueness as well as important clinical value. This study proposes a method of dynamic threshold setting to extract the most stable ECG waveform as the template for the consequent ECG identification process. With the proposed method, the accuracy of ECG biometrics using the dynamic time wraping for difference measures has been significantly improved. Analysis results with the self-built electrocardiogram database show that the deployment of the proposed method was able to reduce the half total error rate of the ECG biometric system from 3.35% to 1.45%. Its average running time on the platform of android mobile terminal was around 0.06 seconds, and thus demonstrates acceptable real-time performance.

  13. The use of biometrics in IT

    OpenAIRE

    Bílý, Petr

    2009-01-01

    Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems wi...

  14. Securing Biometric Images using Reversible Watermarking

    OpenAIRE

    Thampi, Sabu M.; Jacob, Ann Jisma

    2011-01-01

    Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible ...

  15. Performance Evaluation Of Behavioral Biometric Systems

    OpenAIRE

    Cherifi , Fouad; Hemery , Baptiste; Giot , Romain; Pasquet , Marc; Rosenberger , Christophe

    2009-01-01

    We present in this chapter an overview of techniques for the performance evaluation of behavioral biometric systems. The BioAPI standard that defines the architecture of a biometric system is presented in the first part of the chapter... The general methodology for the evaluation of biometric systems is given including statistical metrics, definition of benchmark databases and subjective evaluation. These considerations rely with the ISO/IEC19795-1 standard describing the biometric performanc...

  16. Comparison of internal dose estimates obtained using organ-level, voxel S value, and Monte Carlo techniques

    Energy Technology Data Exchange (ETDEWEB)

    Grimes, Joshua, E-mail: grimes.joshua@mayo.edu [Department of Physics and Astronomy, University of British Columbia, Vancouver V5Z 1L8 (Canada); Celler, Anna [Department of Radiology, University of British Columbia, Vancouver V5Z 1L8 (Canada)

    2014-09-15

    Purpose: The authors’ objective was to compare internal dose estimates obtained using the Organ Level Dose Assessment with Exponential Modeling (OLINDA/EXM) software, the voxel S value technique, and Monte Carlo simulation. Monte Carlo dose estimates were used as the reference standard to assess the impact of patient-specific anatomy on the final dose estimate. Methods: Six patients injected with{sup 99m}Tc-hydrazinonicotinamide-Tyr{sup 3}-octreotide were included in this study. A hybrid planar/SPECT imaging protocol was used to estimate {sup 99m}Tc time-integrated activity coefficients (TIACs) for kidneys, liver, spleen, and tumors. Additionally, TIACs were predicted for {sup 131}I, {sup 177}Lu, and {sup 90}Y assuming the same biological half-lives as the {sup 99m}Tc labeled tracer. The TIACs were used as input for OLINDA/EXM for organ-level dose calculation and voxel level dosimetry was performed using the voxel S value method and Monte Carlo simulation. Dose estimates for {sup 99m}Tc, {sup 131}I, {sup 177}Lu, and {sup 90}Y distributions were evaluated by comparing (i) organ-level S values corresponding to each method, (ii) total tumor and organ doses, (iii) differences in right and left kidney doses, and (iv) voxelized dose distributions calculated by Monte Carlo and the voxel S value technique. Results: The S values for all investigated radionuclides used by OLINDA/EXM and the corresponding patient-specific S values calculated by Monte Carlo agreed within 2.3% on average for self-irradiation, and differed by as much as 105% for cross-organ irradiation. Total organ doses calculated by OLINDA/EXM and the voxel S value technique agreed with Monte Carlo results within approximately ±7%. Differences between right and left kidney doses determined by Monte Carlo were as high as 73%. Comparison of the Monte Carlo and voxel S value dose distributions showed that each method produced similar dose volume histograms with a minimum dose covering 90% of the volume (D90

  17. Biometric identification based on feature fusion with PCA and SVM

    Science.gov (United States)

    Lefkovits, László; Lefkovits, Szidónia; Emerich, Simina

    2018-04-01

    Biometric identification is gaining ground compared to traditional identification methods. Many biometric measurements may be used for secure human identification. The most reliable among them is the iris pattern because of its uniqueness, stability, unforgeability and inalterability over time. The approach presented in this paper is a fusion of different feature descriptor methods such as HOG, LIOP, LBP, used for extracting iris texture information. The classifiers obtained through the SVM and PCA methods demonstrate the effectiveness of our system applied to one and both irises. The performances measured are highly accurate and foreshadow a fusion system with a rate of identification approaching 100% on the UPOL database.

  18. 3D biometrics systems and applications

    CERN Document Server

    Zhang, David

    2013-01-01

    Includes discussions on popular 3D imaging technologies, combines them with biometric applications, and then presents real 3D biometric systems Introduces many efficient 3D feature extraction, matching, and fusion algorithms Techniques presented have been supported by experimental results using various 3D biometric classifications

  19. Can soft biometric traits assist user recognition?

    Science.gov (United States)

    Jain, Anil K.; Dass, Sarat C.; Nandakumar, Karthik

    2004-08-01

    Biometrics is rapidly gaining acceptance as the technology that can meet the ever increasing need for security in critical applications. Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Hence, the fundamental requirement of any biometric recognition system is a human trait having several desirable properties like universality, distinctiveness, permanence, collectability, acceptability, and resistance to circumvention. However, a human characteristic that possesses all these properties has not yet been identified. As a result, none of the existing biometric systems provide perfect recognition and there is a scope for improving the performance of these systems. Although characteristics like gender, ethnicity, age, height, weight and eye color are not unique and reliable, they provide some information about the user. We refer to these characteristics as "soft" biometric traits and argue that these traits can complement the identity information provided by the primary biometric identifiers like fingerprint and face. This paper presents the motivation for utilizing soft biometric information and analyzes how the soft biometric traits can be automatically extracted and incorporated in the decision making process of the primary biometric system. Preliminary experiments were conducted on a fingerprint database of 160 users by synthetically generating soft biometric traits like gender, ethnicity, and height based on known statistics. The results show that the use of additional soft biometric user information significantly improves (approximately 6%) the recognition performance of the fingerprint biometric system.

  20. Biometric Score Calibration for Forensic Face Recognition

    NARCIS (Netherlands)

    Ali, Tauseef

    2014-01-01

    When two biometric specimens are compared using an automatic biometric recognition system, a similarity metric called “score‿ can be computed. In forensics, one of the biometric specimens is from an unknown source, for example, from a CCTV footage or a fingermark found at a crime scene and the other

  1. Multispectral biometrics systems and applications

    CERN Document Server

    Zhang, David; Gong, Yazhuo

    2016-01-01

    Describing several new biometric technologies, such as high-resolution fingerprint, finger-knuckle-print, multi-spectral backhand, 3D fingerprint, tongueprint, 3D ear, and multi-spectral iris recognition technologies, this book analyzes a number of efficient feature extraction, matching and fusion algorithms and how potential systems have been developed. Focusing on how to develop new biometric technologies based on the requirements of applications, and how to design efficient algorithms to deliver better performance, the work is based on the author’s research with experimental results under different challenging conditions described in the text. The book offers a valuable resource for researchers, professionals and postgraduate students working in the fields of computer vision, pattern recognition, biometrics, and security applications, amongst others.

  2. Binary Biometric Representation through Pairwise Adaptive Phase Quantization

    NARCIS (Netherlands)

    Chen, C.; Veldhuis, Raymond N.J.

    Extracting binary strings from real-valued biometric templates is a fundamental step in template compression and protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Quantization and coding is the straightforward way to extract binary representations

  3. Pregnancy related biometric changes in the ovaries and uterus of ...

    African Journals Online (AJOL)

    Ovaries and uteri of 40 apparently normal, sexually mature female Sahelian goats (30 pregnant and10 non-pregnant) were obtained and measured, immediately after slaughter, at the Metropolitan abattoir, Maiduguri, Nigeria, over a period of one year. This was with the aim of documenting pregnancy related biometrical ...

  4. Remote measurement of water color in coastal waters. [spectral radiance data used to obtain quantitative values for chlorophyll and turbidity

    Science.gov (United States)

    Weldon, J. W.

    1973-01-01

    An investigation was conducted to develop procedure to obtain quantitative values for chlorophyll and turbidity in coastal waters by observing the changes in spectral radiance of the backscattered spectrum. The technique under consideration consists of Examining Exotech model 20-D spectral radiometer data and determining which radiance ratios best correlated with chlorophyll and turbidity measurements as obtained from analyses of water samples and sechi visibility readings. Preliminary results indicate that there is a correlation between backscattered light and chlorophyll concentration and secchi visibility. The tests were conducted with the spectrometer mounted in a light aircraft over the Mississippi Sound at altitudes of 2.5K, 2.8K and 10K feet.

  5. Secure authentication system that generates seed from biometric information.

    Science.gov (United States)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  6. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  7. A Study on EMG-based Biometrics

    Directory of Open Access Journals (Sweden)

    Jin Su Kim

    2017-05-01

    Full Text Available Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG, electromyogram (EMG, and electroencephalogram (EEG. Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-based biometrics and implement a motion recognition and personal identification system. The system extracted features using non-uniform filter bank and Waveform Length (WL, and reduces the dimension using Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA. Afterward, it classified the features using Euclidean Distance (ED, Support Vector Machine (SVM and K Nearest Neighbors (KNN. As a result of the motion recognition experiment, 95% of acquired EMG data and 84.66% of UCI data were obtained and as a result of the personal recognition experiment, 85% of acquired EMG data and 88.66% of UCI data were obtained.

  8. A novel biometric authentication approach using ECG and EMG signals.

    Science.gov (United States)

    Belgacem, Noureddine; Fournier, Régis; Nait-Ali, Amine; Bereksi-Reguig, Fethi

    2015-05-01

    Security biometrics is a secure alternative to traditional methods of identity verification of individuals, such as authentication systems based on user name and password. Recently, it has been found that the electrocardiogram (ECG) signal formed by five successive waves (P, Q, R, S and T) is unique to each individual. In fact, better than any other biometrics' measures, it delivers proof of subject's being alive as extra information which other biometrics cannot deliver. The main purpose of this work is to present a low-cost method for online acquisition and processing of ECG signals for person authentication and to study the possibility of providing additional information and retrieve personal data from an electrocardiogram signal to yield a reliable decision. This study explores the effectiveness of a novel biometric system resulting from the fusion of information and knowledge provided by ECG and EMG (Electromyogram) physiological recordings. It is shown that biometrics based on these ECG/EMG signals offers a novel way to robustly authenticate subjects. Five ECG databases (MIT-BIH, ST-T, NSR, PTB and ECG-ID) and several ECG signals collected in-house from volunteers were exploited. A palm-based ECG biometric system was developed where the signals are collected from the palm of the subject through a minimally intrusive one-lead ECG set-up. A total of 3750 ECG beats were used in this work. Feature extraction was performed on ECG signals using Fourier descriptors (spectral coefficients). Optimum-Path Forest classifier was used to calculate the degree of similarity between individuals. The obtained results from the proposed approach look promising for individuals' authentication.

  9. Multi-factor challenge/response approach for remote biometric authentication

    Science.gov (United States)

    Al-Assam, Hisham; Jassim, Sabah A.

    2011-06-01

    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.

  10. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    Science.gov (United States)

    Strait, Robert S.; Pearson, Peter K.; Sengupta, Sailes K.

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  11. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    International Nuclear Information System (INIS)

    Strait, R.S.; Pearson, P.K.; Sengupta, S.K.

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a reference value. To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users

  12. Biometric security based on ECG

    NARCIS (Netherlands)

    Ma, L.; Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Recently the electrocardiogram (ECG) has been proposed as a novel biometric. This paper aims to construct a reliable ECG verification system, in terms of privacy protection. To this end, an improved expression to estimate the capacity in the autocorrelation (AC) of the ECG is derived, which not only

  13. NCI: DCTD: Biometric Research Program

    Science.gov (United States)

    The Biometric Research Program (BRP) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  14. Hand Grasping Synergies As Biometrics.

    Science.gov (United States)

    Patel, Vrajeshri; Thukral, Poojita; Burns, Martin K; Florescu, Ionut; Chandramouli, Rajarathnam; Vinjamuri, Ramana

    2017-01-01

    Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements). Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic). Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies) from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies-postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  15. NCI: DCTD: Biometric Research Branch

    Science.gov (United States)

    The Biometric Research Branch (BRB) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  16. Hand Grasping Synergies As Biometrics

    Directory of Open Access Journals (Sweden)

    Ramana Vinjamuri

    2017-05-01

    Full Text Available Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements. Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic. Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies—postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  17. No age discrimination for biometrics

    CSIR Research Space (South Africa)

    Lessing, MM

    2008-07-01

    Full Text Available . The research considers biometric advancements in the areas of travel and immigration, healthcare, law enforcement and banking. For the purpose of this study, adults are considered the individuals and groups in a working environment. Many of these applications...

  18. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  19. Using the Climbing Drum Peel (CDP) Test to Obtain a G(sub IC) value for Core/Facesheet Bonds

    Science.gov (United States)

    Nettles, A. T.; Gregory, Elizabeth D.; Jackson, Justin R.

    2006-01-01

    A method of measuring the Mode I fracture toughness of core/facesheet bonds in sandwich Structures is desired, particularly with the widespread use of models that need this data as input. This study examined if a critical strain energy release rate, G(sub IC), can be obtained from the climbing drum peel (CDP) test. The CDP test is relatively simple to perform and does not rely on measuring small crack lengths such as required by the double cantilever beam (DCB) test. Simple energy methods were used to calculate G(sub IC) from CDP test data on composite facesheets bonded to a honeycomb core. Facesheet thicknesses from 2 to 5 plies were tested to examine the upper and lower bounds on facesheet thickness requirements. Results from the study suggest that the CDP test, with certain provisions, can be used to find the GIG value of a core/facesheet bond.

  20. Valuing inter-sectoral costs and benefits of interventions in the healthcare sector: methods for obtaining unit prices.

    Science.gov (United States)

    Drost, Ruben M W A; Paulus, Aggie T G; Ruwaard, Dirk; Evers, Silvia M A A

    2017-02-01

    There is a lack of knowledge about methods for valuing health intervention-related costs and monetary benefits in the education and criminal justice sectors, also known as 'inter-sectoral costs and benefits' (ICBs). The objective of this study was to develop methods for obtaining unit prices for the valuation of ICBs. By conducting an exploratory literature study and expert interviews, several generic methods were developed. The methods' feasibility was assessed through application in the Netherlands. Results were validated in an expert meeting, which was attended by policy makers, public health experts, health economists and HTA-experts, and discussed at several international conferences and symposia. The study resulted in four methods, including the opportunity cost method (A) and valuation using available unit prices (B), self-constructed unit prices (C) or hourly labor costs (D). The methods developed can be used internationally and are valuable for the broad international field of HTA.

  1. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  2. Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system

    Directory of Open Access Journals (Sweden)

    S. Anu H. Nair

    2015-12-01

    Full Text Available Digital image watermarking is a major domain for hiding the biometric information, in which the watermark data are made to be concealed inside a host image imposing imperceptible change in the picture. Due to the advance in digital image watermarking, the majority of research aims to make a reliable improvement in robustness to prevent the attack. The reversible invisible watermarking scheme is used for fingerprint and iris multimodal biometric system. A novel approach is used for fusing different biometric modalities. Individual unique modalities of fingerprint and iris biometric are extracted and fused using different fusion techniques. The performance of different fusion techniques is evaluated and the Discrete Wavelet Transform fusion method is identified as the best. Then the best fused biometric template is watermarked into a cover image. The various watermarking techniques such as the Discrete Cosine Transform (DCT, Singular Value Decomposition (SVD and Bacterial Foraging Optimization Algorithm (BFOA are implemented to the fused biometric feature image. Performance of watermarking systems is compared using different metrics. It is found that the watermarked images are found robust over different attacks and they are able to reverse the biometric template for Bacterial Foraging Optimization Algorithm (BFOA watermarking technique.

  3. The research and application of multi-biometric acquisition embedded system

    Science.gov (United States)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  4. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  5. Ocular biometric measurements in cataract surgery candidates in Portugal.

    Science.gov (United States)

    Ferreira, Tiago B; Hoffer, Kenneth J; Ribeiro, Filomena; Ribeiro, Paulo; O'Neill, João G

    2017-01-01

    Describe the ocular biometric parameters and their associations in a population of cataract surgery candidates. A cross-sectional study of 13,012 eyes of 6,506 patients was performed. Biometric parameters of the eyes were measured by optical low-coherence reflectometry. The axial length (AL), mean keratometry (K) and astigmatism, anterior chamber depth (ACD) (epithelium to lens), lens thickness (LT), and Corneal Diameter (CD) were evaluated. The mean age was 69 ± 10 years (44-99 years). Mean AL, Km, and ACD were 23.87 ± 1.55 mm (19.8-31.92 mm), 43.91 ± 1.71 D (40.61-51.14 D), and 3.25 ± 0.44 mm (2.04-5.28 mm), respectively. The mean LT was 4.32 ± 0.49 mm (2.73-5.77 mm) and the mean CD was 12.02 ± 0.46 mm (10.50-14.15 mm). The mean corneal astigmatism was 1.08 ± 0.84 D (0.00-7.58 D) and 43.5% of eyes had astigmatism ≥ 1.00 D. Male patients had longer AL and ACDs (p biometric values for the Portuguese population. The greatest predictor of ocular biometrics was gender. There was no significant correlation between age and AL, ACD, or Km. These results may be relevant in the evaluation of refractive error and in the calculation of intraocular lens power.

  6. Combining two strategies to optimize biometric decisions against spoofing attacks

    Science.gov (United States)

    Li, Weifeng; Poh, Norman; Zhou, Yicong

    2014-09-01

    Spoof attack by replicating biometric traits represents a real threat to an automatic biometric verification/ authentication system. This is because the system, originally designed to distinguish between genuine users from impostors, simply cannot distinguish between a replicated biometric sample (replica) from a live sample. An effective solution is to obtain some measures that can indicate whether or not a biometric trait has been tempered with, e.g., liveness detection measures. These measures are referred to as evidence of spoofing or anti-spoofing measures. In order to make the final accept/rejection decision, a straightforward solution to define two thresholds: one for the anti-spoofing measure, and another for the verification score. We compared two variants of a method that relies on applying two thresholds - one to the verification (matching) score and another to the anti-spoofing measure. Our experiments carried out using a signature database as well as by simulation show that both the brute-force and its probabilistic variant turn out to be optimal under different operating conditions.

  7. Individual Biometric Identification Using Multi-Cycle Electrocardiographic Waveform Patterns

    Directory of Open Access Journals (Sweden)

    Wonki Lee

    2018-03-01

    Full Text Available The electrocardiogram (ECG waveform conveys information regarding the electrical property of the heart. The patterns vary depending on the individual heart characteristics. ECG features can be potentially used for biometric recognition. This study presents a new method using the entire ECG waveform pattern for matching and demonstrates that the approach can potentially be employed for individual biometric identification. Multi-cycle ECG signals were assessed using an ECG measuring circuit, and three electrodes can be patched on the wrists or fingers for considering various measurements. For biometric identification, our-fold cross validation was used in the experiments for assessing how the results of a statistical analysis will generalize to an independent data set. Four different pattern matching algorithms, i.e., cosine similarity, cross correlation, city block distance, and Euclidean distances, were tested to compare the individual identification performances with a single channel of ECG signal (3-wire ECG. To evaluate the pattern matching for biometric identification, the ECG recordings for each subject were partitioned into training and test set. The suggested method obtained a maximum performance of 89.9% accuracy with two heartbeats of ECG signals measured on the wrist and 93.3% accuracy with three heartbeats for 55 subjects. The performance rate with ECG signals measured on the fingers improved up to 99.3% with two heartbeats and 100% with three heartbeats of signals for 20 subjects.

  8. Individual Biometric Identification Using Multi-Cycle Electrocardiographic Waveform Patterns.

    Science.gov (United States)

    Lee, Wonki; Kim, Seulgee; Kim, Daeeun

    2018-03-28

    The electrocardiogram (ECG) waveform conveys information regarding the electrical property of the heart. The patterns vary depending on the individual heart characteristics. ECG features can be potentially used for biometric recognition. This study presents a new method using the entire ECG waveform pattern for matching and demonstrates that the approach can potentially be employed for individual biometric identification. Multi-cycle ECG signals were assessed using an ECG measuring circuit, and three electrodes can be patched on the wrists or fingers for considering various measurements. For biometric identification, our-fold cross validation was used in the experiments for assessing how the results of a statistical analysis will generalize to an independent data set. Four different pattern matching algorithms, i.e., cosine similarity, cross correlation, city block distance, and Euclidean distances, were tested to compare the individual identification performances with a single channel of ECG signal (3-wire ECG). To evaluate the pattern matching for biometric identification, the ECG recordings for each subject were partitioned into training and test set. The suggested method obtained a maximum performance of 89.9% accuracy with two heartbeats of ECG signals measured on the wrist and 93.3% accuracy with three heartbeats for 55 subjects. The performance rate with ECG signals measured on the fingers improved up to 99.3% with two heartbeats and 100% with three heartbeats of signals for 20 subjects.

  9. Intraocular pressure values obtained by ocular response analyzer, dynamic contour tonometry, and goldmann tonometry in keratokonic corneas.

    Science.gov (United States)

    Bayer, Atilla; Sahin, Afsun; Hürmeriç, Volkan; Ozge, Gökhan

    2010-01-01

    To determine the agreement between dynamic contour tonometer (DCT), Goldmann applanation tonometer (GAT), and Ocular Response Analyzer (ORA) in keratoconic corneas and to find out the effect of corneal biomechanics on intraocular pressure (IOP) measurements obtained by these devices. IOP was measured with the ORA, DCT, and GAT in random order in 120 eyes of 61 keratoconus patients. Central corneal thickness (CCT) and keratometry were measured after all IOP determinations had been made. The mean IOP measurement by the ORA and DCT was compared with the measurement by the GAT, using Student t test. Bland-Altman analysis was performed to assess the clinical agreement between these methods. The effect of corneal hysteresis (CH), corneal resistance factor (CRF), and CCT on measured IOP was explored by multiple backward stepwise linear regression analysis. The mean±SD patient age was 30.6±11.2 years. The mean±SD IOP measurement obtained with GAT, ORA Goldmann-correlated IOP (IOPg), ORA corneal-compensated IOP (IOPcc), and DCT was 10.96±2.8, 10.23±3.5, 14.65±2.8, and 15.42±2.7 mm Hg, respectively. The mean±SD CCT was 464.08±58.4 microns. The mean difference between IOPcc and GAT (P<0.0001), IOPcc and DCT (P<0.001), GAT and DCT (P<0.0001), IOPg and GAT (P<0.002), and IOPg and DCT (P<0.0001), was highly statistically significant. In multivariable regression analysis, DCT IOP and GAT IOP measurements were significantly associated with CH and CRF (P<0.0001 for both). DCT seemed to be affected by CH and CRF, and the IOP values tended to be higher when compared with GAT. ORA-measured IOPcc was found to be independent of CCT and suitable in comparison to the DCT in keratoconic eyes.

  10. A concatenated coding scheme for biometric template protection

    NARCIS (Netherlands)

    Shao, X.; Xu, H.; Veldhuis, Raymond N.J.; Slump, Cornelis H.

    2012-01-01

    Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction

  11. Transfer Function Control for Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodinsky, Carlos M. (Inventor)

    2015-01-01

    A modular apparatus for acquiring biometric data may include circuitry operative to receive an input signal indicative of a biometric condition, the circuitry being configured to process the input signal according to a transfer function thereof and to provide a corresponding processed input signal. A controller is configured to provide at least one control signal to the circuitry to programmatically modify the transfer function of the modular system to facilitate acquisition of the biometric data.

  12. Recognition Errors Control in Biometric Identification Cryptosystems

    Directory of Open Access Journals (Sweden)

    Vladimir Ivanovich Vasilyev

    2015-06-01

    Full Text Available The method of biometric cryptosystem designed on the basis of fuzzy extractor, in which main disadvantages of biometric and cryptographic systems are absent, is considered. The main idea of this work is a control of identity recognition errors with use of fuzzy extractor which operates with Reed – Solomon correcting code. The fingerprint features vector is considered as a biometric user identifier.

  13. SURVEY OF BIOMETRIC SYSTEMS USING IRIS RECOGNITION

    OpenAIRE

    S.PON SANGEETHA; DR.M.KARNAN

    2014-01-01

    The security plays an important role in any type of organization in today’s life. Iris recognition is one of the leading automatic biometric systems in the area of security which is used to identify the individual person. Biometric systems include fingerprints, facial features, voice recognition, hand geometry, handwriting, the eye retina and the most secured one presented in this paper, the iris recognition. Biometric systems has become very famous in security systems because it is not possi...

  14. Towards a General Definition of Biometric Systems

    OpenAIRE

    Mirko Cubrilo; Miroslav Baca; Markus Schatten

    2009-01-01

    A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In the end a Unified Modeling Language model is developed showing the connections between the two perspectives.

  15. Imaging systems and methods for obtaining and using biometric information

    Science.gov (United States)

    McMakin, Douglas L [Richland, WA; Kennedy, Mike O [Richland, WA

    2010-11-30

    Disclosed herein are exemplary embodiments of imaging systems and methods of using such systems. In one exemplary embodiment, one or more direct images of the body of a clothed subject are received, and a motion signature is determined from the one or more images. In this embodiment, the one or more images show movement of the body of the subject over time, and the motion signature is associated with the movement of the subject's body. In certain implementations, the subject can be identified based at least in part on the motion signature. Imaging systems for performing any of the disclosed methods are also disclosed herein. Furthermore, the disclosed imaging, rendering, and analysis methods can be implemented, at least in part, as one or more computer-readable media comprising computer-executable instructions for causing a computer to perform the respective methods.

  16. Emerging Biometric Modalities: Challenges and Opportunities

    Science.gov (United States)

    Gafurov, Davrondzhon

    Recent advances in sensor technology and wide spread use of various electronics (computers, PDA, mobile phones etc.) provide new opportunities for capturing and analyses of novel physiological and behavioural traits of human beings for biometric authentication. This paper presents an overview of several such types of human characteristics that have been proposed as alternatives to traditional types of biometrics. We refer to these characteristics as emerging biometrics. We survey various types of emerging modalities and techniques, and discuss their pros and cons. Emerging biometrics faces several limitations and challenges which include subject population coverage (focusing mostly on adults); unavailability of benchmark databases; little research with respect to vulnerability/robustness against attacks; and some privacy concerns they may arise. In addition, recognition performance of emerging modalities are generally less accurate compared to the traditional biometrics. Despite all of these emerging biometrics posses their own benefits and advantages compared to traditional biometrics which makes them still attractive for research. First of all, emerging biometrics can always serve as a complementary source for identity information; they can be suitable in applications where traditional biometrics are difficult or impossible to adapt such as continuous or periodic re-verification of the user's identity etc.

  17. Encryption Technology based on Human Biometrics

    Directory of Open Access Journals (Sweden)

    Wei Yang

    2017-08-01

    Full Text Available The research progress of encryption technologies based on human biometrics is reviewed in this paper.The technologies that utilize human biometrics to make information encryption and identity authentication,and the technologies which combine biometrics encryption with optical encryption methods are introduced in detail.The advantages and disadvantages of these encryption systems are discussed,and the obstacles in practical applications are pointed out.Finally,the prospect of the new encryption technologies that are based on human biometrics are predicted.

  18. A lightweight approach for biometric template protection

    Science.gov (United States)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  19. Identification and authentication. Common biometric methods review

    OpenAIRE

    Lysak, A.

    2012-01-01

    Major biometric methods used for identification and authentication purposes in modern computing systems are considered in the article. Basic classification, application areas and key differences are given.

  20. Biometric Collection, Transmission and Storage Standards. Version 1.1

    National Research Council Canada - National Science Library

    2006-01-01

    This document provides a comprehensive technical reference that lists published biometric standards and describes their applicability to the biometric functions described in the Capstone Concept of Operations (CONOPS...

  1. Tongue prints in biometric authentication: A pilot study.

    Science.gov (United States)

    Jeddy, Nadeem; Radhika, T; Nithya, S

    2017-01-01

    Biometric authentication is an important process for the identification and verification of individuals for security purposes. There are many biometric systems that are currently in use and also being researched. Tongue print is a new biometric authentication tool that is unique and cannot be easily forged because no two tongue prints are similar. The present study aims to evaluate the common morphological features of the tongue and its variations in males and females. The usefulness of alginate impression and dental cast in obtaining the lingual impression was also evaluated. The study sample included twenty participants. The participants were subjected to visual examination following which digital photographs of the dorsal surface of the tongue were taken. Alginate impressions of the tongue were made, and casts were prepared using dental stone. The photographs and the casts were analyzed by two observers separately for the surface morphology including shape, presence or absence of fissures and its pattern of distribution. Three reference points were considered to determine the shape of the tongue. The most common morphological feature on the dorsum of the tongue was the presence of central fissures. Multiple vertical fissures were observed in males whereas single vertical fissure was a common finding in females. The fissures were predominantly shallow in males and deep in females. The tongue was predominantly U shaped in males and females. V-shaped tongue was observed in 25% of females. Tongue prints are useful in biometric authentication. The methodology used in the study is simple, easy and can be adopted by dentists on a regular basis. However, large-scale studies are required to validate the results and also identify other features of the tongue that can be used in forensics and biometric authentication process.

  2. Facial biometrics of Yorubas of Nigeria using Akinlolu-Raji image-processing algorithm

    Directory of Open Access Journals (Sweden)

    Adelaja Abdulazeez Akinlolu

    2016-01-01

    Full Text Available Background: Forensic anthropology deals with the establishment of human identity using genetics, biometrics, and face recognition technology. This study aims to compute facial biometrics of Yorubas of Osun State of Nigeria using a novel Akinlolu-Raji image-processing algorithm. Materials and Methods: Three hundred Yorubas of Osun State (150 males and 150 females, aged 15–33 years were selected as subjects for the study with informed consents and when established as Yorubas by parents and grandparents. Height, body weight, and facial biometrics (evaluated on three-dimensional [3D] facial photographs were measured on all subjects. The novel Akinlolu-Raji image-processing algorithm for forensic face recognition was developed using the modified row method of computer programming. Facial width, total face height, short forehead height, long forehead height, upper face height, nasal bridge length, nose height, morphological face height, and lower face height computed from readings of the Akinlolu-Raji image-processing algorithm were analyzed using z-test (P ≤ 0.05 of 2010 Microsoft Excel statistical software. Results: Statistical analyzes of facial measurements showed nonsignificant higher mean values (P > 0.05 in Yoruba males compared to females. Yoruba males and females have the leptoprosopic face type based on classifications of face types from facial indices. Conclusions: Akinlolu-Raji image-processing algorithm can be employed for computing anthropometric, forensic, diagnostic, or any other measurements on 2D and 3D images, and data computed from its readings can be converted to actual or life sizes as obtained in 1D measurements. Furthermore, Yoruba males and females have the leptoprosopic face type.

  3. Comparison between total lung capacity and residual volume values obtained by pletysmography and single breath methods with methane

    Directory of Open Access Journals (Sweden)

    Ricardo Marques Dias

    2006-11-01

    Full Text Available We analyzed pulmonary function tests of twenty asthmatic patients from Gaffrée e Guinle University Hospital, classified according to Brazilian Guidelines for Asthma (2002, similar to GINA, into mild persistent or moderate (9 or severe (11 asthma. We obtained parameters from spirometry, plethysmograph(PL and single breath technique for diffusion capacity (SB, with methane. Total lung capacity and residual volume were called TLCPL and RVPL when measured by pletysmography and TLCSB and RVSB when determined by single breath test. There were 13 women and 7 men with mean age of 47.6 years. The pulmonary dysfunction degree to FEV1/FVC was 58.8% with CI95=53.9 to 63.6. The mean values in litres for TLCPL (5.94 and RVPL (2.55 were significantly higher than for TLCSB (4.73 and RVSB (1.66. Multiple regression equations were determined for TLCPL e RVPL using only single breath values, TLCSB or RVSB, and spirographic parameters, with significant regression coefficients. However, the inclusion of spirometric parameters, except for FVC, did not improve the predicted capacity for the equations. Considering only the TLCSB, r2=0.79, the equation is: TLCPL=(TLCSB*1.025+1.088, with EPE=0.64. The regression for RVPL, r2=0.23, is: RVPL=(RVSB*0.9268+1.012. The results obtained after bronchodilation with 400 mcg of salbutamol did not improve the regression. We concluded that the SB technique did not obtain the same results as pletysmography for TLC and RV, but for TLC this difference can be predicted. Resumo: Foram analisados exames de função pulmonar de 20 asmáticos, em acompanhamento no HU Gaffrée Guinle, classificados, segundo o Consenso Brasileiro (2002, em asma leve persistente ou moderada (9 e grave (11. Foram obtidos os valores dos parâmetros da espirografia, da pletismografia e da técnica de respiração única, com metano, para a medida da difusão pulmonar (DLco. Assim, a capacidade pulmonar total e o volume residual, quando

  4. Optimization of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Alberto Izquierdo Fuente

    2014-01-01

    Full Text Available On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced.

  5. Performance Evaluation of a Biometric System Based on Acoustic Images

    Science.gov (United States)

    Izquierdo-Fuente, Alberto; del Val, Lara; Jiménez, María I.; Villacorta, Juan J.

    2011-01-01

    An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side). Two Uniform Linear Arrays (ULA) with 15 λ/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR)/False Non-Match Rate (FNMR) parameters and the Receiver Operating Characteristic (ROC) curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications. PMID:22163708

  6. Optimization of a Biometric System Based on Acoustic Images

    Science.gov (United States)

    Izquierdo Fuente, Alberto; Del Val Puente, Lara; Villacorta Calvo, Juan J.; Raboso Mateos, Mariano

    2014-01-01

    On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced. PMID:24616643

  7. Performance Evaluation of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Juan J. Villacorta

    2011-10-01

    Full Text Available An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side. Two Uniform Linear Arrays (ULA with 15 l/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR/False Non-Match Rate (FNMR parameters and the Receiver Operating Characteristic (ROC curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications.

  8. Reference charts for fetal biometric parameters in twin pregnancies according to chorionicity.

    Science.gov (United States)

    Araujo Júnior, Edward; Ruano, Rodrigo; Javadian, Pouya; Martins, Wellington P; Elito, Julio; Pires, Claudio Rodrigues; Zanforlin Filho, Sebastião Marques

    2014-04-01

    The objective of this article is to determine reference values for fetal biometric parameters in twin pregnancies and to compare these values between monochorionic and dichorionic pregnancies. A retrospective cross-sectional study was conducted among 157 monochorionic and 176 dichorionic twin pregnancies between 14 and 38 weeks of gestation. Biometric measurements included the biparietal diameter (BPD), abdominal circumference (AC), femurs length (FL) and estimated fetal weight (EFW). To evaluate the correlation between biometric parameters and gestational age, polynomial regression models were created, with adjustments using the coefficient of determination (R(2) ). Comparison between monochorionic and dichorionic pregnancies was performed using analysis of covariance. The mean BPD, AC, FL and EFW for the dichorionic pregnancies were 56.16 mm, 191.1 mm, 41.08 mm and 816.1 g, respectively. The mean BPD, AC, FL and EFW for the monochorionic pregnancies were 57.14 mm, 184.2 mm, 39.29 mm and 723.4 g, respectively. There was a statistical difference between mono and dichorionic pregnancies for all the biometric parameters (BPD p = 0.012; AC p = 0.047; FL p = 0.007; EFW p = 0.011). Reference curves of biometric parameters in twin pregnancies were determined. Biometric parameters were statistically different between monochorionic and dichorionic pregnancies. © 2014 John Wiley & Sons, Ltd.

  9. Biometrics can help protect and safeguard.

    Science.gov (United States)

    Oakes, Shaun

    2017-06-01

    Shaun Oakes, managing director at ievo, a north-east England-based manufacturer of biometric fingerprint readers, argues that growing use of biometrics technology can improve security and afford better protection to premises, valuable items, and people, across an ever-busier NHS.

  10. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    affect the visual quality of the original art. On the contrary, removable visible watermarking .... Significant motivation for using biometric features such as face, voice and signature as a watermark is that face and ... These are the major reasons which motivated us to propose multimodal biometric watermarking. When the ...

  11. Controlling Leakage of Biometric Information using Dithering

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Buhan, I.R.; Doumen, J.M.; Hartel, P.H.

    Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric data. Fuzzy extractors can be used to authenticate a user to a server without storing her biometric data directly. However, in the Information Theoretic sense fuzzy extractors will leak information about the

  12. Semiparametric Copula Models for Biometric Score Level

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    In biometric recognition systems, biometric samples (images of faces, finger- prints, voices, gaits, etc.) of people are compared and classifiers (matchers) indicate the level of similarity between any pair of samples by a score. If two samples of the same person are compared, a genuine score is

  13. Behavioural Biometrics for Application in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, M.

    2013-01-01

    Roč. 1, č. 1 (2013), s. 56-56 ISSN 1805-8698. [EFMI 2013 Special Topic Conference. 17.04.2013-19.04.2013, Prague] Institutional support: RVO:67985807 Keywords : biometrics * behavioural biometrics * keystroke dynamics * mouse dynamics Subject RIV: IN - Informatics, Computer Science

  14. Biometric antispoofing methods: A survey in face recognition

    OpenAIRE

    Galbally Herrero, Javier; Marcel, Sébastien; Fiérrez, Julián

    2014-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. Galbally, S. Marcel and J. Fierrez, "Biometric Antispoofing Methods", IEEE Access, vol.2, pp. 1530-1552, Dec. 2014 In re...

  15. Mobile networks for biometric data analysis

    CERN Document Server

    Madrid, Natividad; Seepold, Ralf; Orcioni, Simone

    2016-01-01

    This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient’s prevention pl...

  16. Biometric and intelligent decision making support

    CERN Document Server

    Kaklauskas, Arturas

    2015-01-01

    This book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people’s needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master’s degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities fo...

  17. Recommendation on the Use of Biometric Technology

    DEFF Research Database (Denmark)

    Juul, Niels Christian

    2013-01-01

    Biometric technology is based on the use of information linked to individuals. Hence, privacy and security in biometric applications becomes a concern and the need to assess such applications thoroughly becomes equally important. Guidelines for application of biometric technology must ensure...... a positive impact on both security and privacy. Based on two cases of biometric application, which have been assessed by the Danish Data Protecting Agency, this chapter present a set of recommendations to legislators, regulators, corporations and individuals on the appropriate use of biometric technologies...... put forward by the Danish Board of Technology. The recommendations are discussed and compared to the similar proposal put forward by the European Article 29 Data Protection Working Party....

  18. Bridging the gap: from biometrics to forensics.

    Science.gov (United States)

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  19. Biometric features and privacy : condemned, based upon your finger print

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Veldhuis, Raymond N.J.

    What information is available in biometric features besides that needed for the biometric recognition process? What if a biometric feature contains Personally Identifiable Information? Will the whole biometric system become a threat to privacy? This paper is an attempt to quantifiy the link between

  20. Privacy-leakage codes for biometric authentication systems

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2014-01-01

    In biometric privacy-preserving authentication systems that are based on key-binding, two terminals observe two correlated biometric sequences. The first terminal selects a secret key, which is independent of the biometric data, binds this secret key to the observed biometric sequence and

  1. Quality dependent fusion of intramodal and multimodal biometric experts

    Science.gov (United States)

    Kittler, J.; Poh, N.; Fatukasi, O.; Messer, K.; Kryszczuk, K.; Richiardi, J.; Drygajlo, A.

    2007-04-01

    We address the problem of score level fusion of intramodal and multimodal experts in the context of biometric identity verification. We investigate the merits of confidence based weighting of component experts. In contrast to the conventional approach where confidence values are derived from scores, we use instead raw measures of biometric data quality to control the influence of each expert on the final fused score. We show that quality based fusion gives better performance than quality free fusion. The use of quality weighted scores as features in the definition of the fusion functions leads to further improvements. We demonstrate that the achievable performance gain is also affected by the choice of fusion architecture. The evaluation of the proposed methodology involves 6 face and one speech verification experts. It is carried out on the XM2VTS data base.

  2. Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification.

    Science.gov (United States)

    Wang, Yi; Wan, Jianwu; Guo, Jun; Cheung, Yiu-Ming; C Yuen, Pong

    2017-07-14

    Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric privacy protection are in general based on pairwise matching of secured biometric templates and have inherent limitations in search efficiency and scalability. In this paper, we propose an inference-based framework for privacy-preserving similarity search in Hamming space. Our approach builds on an obfuscated distance measure that can conceal Hamming distance in a dynamic interval. Such a mechanism enables us to systematically design statistically reliable methods for retrieving most likely candidates without knowing the exact distance values. We further propose to apply Montgomery multiplication for generating search indexes that can withstand adversarial similarity analysis, and show that information leakage in randomized Montgomery domains can be made negligibly small. Our experiments on public biometric datasets demonstrate that the inference-based approach can achieve a search accuracy close to the best performance possible with secure computation methods, but the associated cost is reduced by orders of magnitude compared to cryptographic primitives.

  3. A comparison of specific effective energies values obtained for some radioactive element using 3 different decay data banks

    International Nuclear Information System (INIS)

    Nascimento, J.E.C.; Bertelli Neto, L.

    1990-01-01

    The Specific Effective Energies (SEE) are the dose equivalents received by each of the body organs (targets organs) per nuclear transformation of a radionuclide deposited in an organ or tissue (source organ) after an intake of this isotope. The SEE values were calculated on basis of the dosimetric concepts of Publication 30 of the International Comission on Radiological Protection (ICRP). The results were evaluated using two of the three most known decay data banks. This study shows considerables discrepancies in the evaluation of the SEE values for some radionuclides. In theses cases it is recommended the use of the most complete and detailed decay data bank to perform the SEE calculations. (author) [pt

  4. A novel approach to transformed biometrics using successive projections

    Science.gov (United States)

    Gopi, E. S.

    2010-02-01

    Unlike user created password, number of biometrics is limited for creating account in different organizations. Transformed biometrics attempts to solve the problem by transforming the biometric into another form, which is unique to the particular organization. This makes the availability of different transformed biometrics in different organizations transformed from the same biometrics and helps in foolproof transactions. In this article a novel approach to transformed biometrics using successive projection technique is suggested .In the proposed technique, the user can register up to 5*4n-1 organizations if the length of the biometric password is 'n'.

  5. Retinal biometrics based on Iterative Closest Point algorithm.

    Science.gov (United States)

    Hatanaka, Yuji; Tajima, Mikiya; Kawasaki, Ryo; Saito, Koko; Ogohara, Kazunori; Muramatsu, Chisako; Sunayama, Wataru; Fujita, Hiroshi

    2017-07-01

    The pattern of blood vessels in the eye is unique to each person because it rarely changes over time. Therefore, it is well known that retinal blood vessels are useful for biometrics. This paper describes a biometrics method using the Jaccard similarity coefficient (JSC) based on blood vessel regions in retinal image pairs. The retinal image pairs were rough matched by the center of their optic discs. Moreover, the image pairs were aligned using the Iterative Closest Point algorithm based on detailed blood vessel skeletons. For registration, perspective transform was applied to the retinal images. Finally, the pairs were classified as either correct or incorrect using the JSC of the blood vessel region in the image pairs. The proposed method was applied to temporal retinal images, which were obtained in 2009 (695 images) and 2013 (87 images). The 87 images acquired in 2013 were all from persons already examined in 2009. The accuracy of the proposed method reached 100%.

  6. Realistic Measurement of Student Attendance in LMS Using Biometrics

    Directory of Open Access Journals (Sweden)

    Elisardo Gonzalez-Agulla

    2010-10-01

    Full Text Available In this paper we propose a solution to obtain useful and reliable student session logs in a Learning Management System (LMS combining current logs with biometrics-based logs that show the student behaviour during the whole learning session. The aims of our solution are to guarantee that the online student is who he/she claims to be, and also to know exactly how much time he/she spends in front of the computer reading each LMS content. Even when the proposed solution does not completely avoid cheating, the use of biometric data during authentication and face tracking provides additional help to validate student performance during learning sessions. In this way it is possible to improve security for specific contents, to gain feedback of the student effort and to check the actual time spent in learning.

  7. Heartbeat Signal from Facial Video for Biometric Recognition

    DEFF Research Database (Denmark)

    Haque, Mohammad Ahsanul; Nasrollahi, Kamal; Moeslund, Thomas B.

    2015-01-01

    Different biometric traits such as face appearance and heartbeat signal from Electrocardiogram (ECG)/Phonocardiogram (PCG) are widely used in the human identity recognition. Recent advances in facial video based measurement of cardio-physiological parameters such as heartbeat rate, respiratory rate......, and blood volume pressure provide the possibility of extracting heartbeat signal from facial video instead of using obtrusive ECG or PCG sensors in the body. This paper proposes the Heartbeat Signal from Facial Video (HSFV) as a new biometric trait for human identity recognition, for the first time...... to the best of our knowledge. Feature extraction from the HSFV is accomplished by employing Radon transform on a waterfall model of the replicated HSFV. The pairwise Minkowski distances are obtained from the Radon image as the features. The authentication is accomplished by a decision tree based supervised...

  8. Novel continuous authentication using biometrics

    Science.gov (United States)

    Dubey, Prakash; Patidar, Rinku; Mishra, Vikas; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    We explore whether a classifier can consistent1y verify c1ients and interact with the computer using camera and behavior of users. In this paper we propose a new way of authentication of user which wi1l capture many images of user in random time and ana1ysis of its touch biometric behavior. In this system experiment the touch conduct of a c1ient/user between an en1istment stage is stored in the database and it is checked its mean time behavior during equa1 partition of time. This touch behavior wi1l ab1e to accept or reject the user. This wi1l modify the use of biometric more accurate to use. In this system the work p1an going to perform is the user wi1l ask single time to a1low to take it picture before 1ogin. Then it wi1l take images of user without permission of user automatica1ly and store in the database. This images and existing image of user wi1l be compare and reject or accept wi1l depend on its comparison. The user touch behavior wi1l keep storing with number of touch make in equa1 amount of time of the user. This touch behavior and image wi1l fina1ly perform authentication of the user automatically.

  9. Estimating the impact of somatic cell count on the value of milk utilising parameters obtained from the published literature.

    Science.gov (United States)

    Geary, Una; Lopez-Villalobos, Nicolas; O'Brien, Bernadette; Garrick, Dorian J; Shalloo, Laurence

    2014-05-01

    The impact of mastitis on milk value per litre independent of the effect of mastitis on milk volume, was quantified for Ireland using a meta-analysis and a processing sector model. Changes in raw milk composition, cheese processing and composition associated with increased bulk milk somatic cell count (BMSCC) were incorporated into the model. Processing costs and market values were representative of current industry values. It was assumed that as BMSCC increased (i) milk fat and milk protein increased and milk lactose decreased, (ii) fat and protein recoveries decreased, (iii) cheese protein decreased and cheese moisture increased. Five BMSCC categories were examined from ⩽100 000 to >400 000 cells/ml. The analysis showed that as BMSCC increased the production quantities reduced. An increase in BMSCC from 100 000 to >400 000 cells/ml saw a reduction in net revenue of 3·2% per annum (€51·3 million) which corresponded to a reduction in the value of raw milk of €0·0096 cents/l.

  10. Digital holographic-based cancellable biometric for personal authentication

    International Nuclear Information System (INIS)

    Verma, Gaurav; Sinha, Aloka

    2016-01-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%. (paper)

  11. Incidence of Artifacts and Deviating Values in Research Data Obtained from an Anesthesia Information Management System in Children.

    Science.gov (United States)

    Hoorweg, Anne-Lee J; Pasma, Wietze; van Wolfswinkel, Leo; de Graaff, Jurgen C

    2018-02-01

    Vital parameter data collected in anesthesia information management systems are often used for clinical research. The validity of this type of research is dependent on the number of artifacts. In this prospective observational cohort study, the incidence of artifacts in anesthesia information management system data was investigated in children undergoing anesthesia for noncardiac procedures. Secondary outcomes included the incidence of artifacts among deviating and nondeviating values, among the anesthesia phases, and among different anesthetic techniques. We included 136 anesthetics representing 10,236 min of anesthesia time. The incidence of artifacts was 0.5% for heart rate (95% CI: 0.4 to 0.7%), 1.3% for oxygen saturation (1.1 to 1.5%), 7.5% for end-tidal carbon dioxide (6.9 to 8.0%), 5.0% for noninvasive blood pressure (4.0 to 6.0%), and 7.3% for invasive blood pressure (5.9 to 8.8%). The incidence of artifacts among deviating values was 3.1% for heart rate (2.1 to 4.4%), 10.8% for oxygen saturation (7.6 to 14.8%), 14.1% for end-tidal carbon dioxide (13.0 to 15.2%), 14.4% for noninvasive blood pressure (10.3 to 19.4%), and 38.4% for invasive blood pressure (30.3 to 47.1%). Not all values in anesthesia information management systems are valid. The incidence of artifacts stored in the present pediatric anesthesia practice was low for heart rate and oxygen saturation, whereas noninvasive and invasive blood pressure and end-tidal carbon dioxide had higher artifact incidences. Deviating values are more often artifacts than values in a normal range, and artifacts are associated with the phase of anesthesia and anesthetic technique. Development of (automatic) data validation systems or solutions to deal with artifacts in data is warranted.

  12. Improving the corn-ethanol industry: studying protein separation techniques to obtain higher value added product options for distillers grains

    NARCIS (Netherlands)

    Brehmer, B.; Bals, B.; Sanders, J.P.M.; Dale, B.

    2008-01-01

    Currently in America the biofuel ethanol is primarily being produced by the dry grind technique to obtain the starch contained in the corn grains and subsequently subjected to fermentation. This so-called 1st generation technology has two setbacks; first the lingering debate whether its life cycle

  13. Using Biometric Characteristics to Increase ITS Security

    Directory of Open Access Journals (Sweden)

    Miroslav Bača

    2007-11-01

    Full Text Available Terrorist attacks in New York City and Washington, Districtof Columbia on the morning of September 11, 2001 havechanged our lives. The secwity problem became very importantregarding all spheres of human activities. Tracking persons(employees, customers etc. in ITS (Intelligent Transport Systemis a huge problem. Biometrics offers a very good solutionfor this problem and is today maybe one of the most promisingtechniques for person's secure verification and authentication;biometric system also features some advantages when comparedto other security systems. When using a biometric systemone has to be careful because the functionality of a biometricapplication can be dramatically aggravated if inappropriatebiometric features are selected. Classification of biometric featureson contact and contactless, or distinction between"strong" and "soft" biometric features gives a framework for usingbiometric features, but it does not ensure that biometric featŁtres are implemented at a satisfactory level. The usage ofmultimodal or unimodal biometric system can significantly increasethe system security but it also opens plenty of questionslike privacy etc. This paper describes the implementation ofbiometric features which can be used in ITS, and delineates anew model of usage.

  14. Fusion of Multimodal Biometrics using Feature and Score Level Fusion

    OpenAIRE

    Mohana Prakash, S.; Betty, P.; Sivanarulselvan, K.

    2016-01-01

    Biometrics is used to uniquely identify a person‘s individual based on physical and behavioural characteristics. Unimodal biometric system contains various problems such as degree of freedom, spoof attacks, non-universality, noisy data and error rates. Multimodal biometrics is introduced to overcome the limitations in Unimodal biometrics. The presented methodology extracts the features of four biometric traits such as fingerprint, palm, iris and retina. Then extracted features are fused in th...

  15. Comparative analysis of the quality of biometric methods

    OpenAIRE

    Filipčík, Jan

    2010-01-01

    The main objective is to describe and analyze the types of biometric identification and selected biometric methods and identify their strengths and weaknesses compared to the current document type of identification and verification of persons and compared to other biometric methods and then focus on the relationships and support of biometric methods in terms of IS / ICT services. The work will consist of 5 types of biometric methods namely dactyloscopy, hand geometry scanning, facial scanning...

  16. Maximal isometric muscle strength values obtained By hand-held dynamometry in children between 6 and 15 years of age.

    Science.gov (United States)

    Escobar, Raul G; Munoz, Karin T; Dominguez, Angelica; Banados, Pamela; Bravo, Maria J

    2017-01-01

    In this study we aimed to determine the maximal isometric muscle strength of a healthy, normal-weight, pediatric population between 6 and 15 years of age using hand-held dynamometry to establish strength reference values. The secondary objective was determining the relationship between strength and anthropometric parameters. Four hundred normal-weight Chilean children, split into 10 age groups, separated by 1-year intervals, were evaluated. Each age group included between 35 and 55 children. The strength values increased with increasing age and weight, with a correlation of 0.83 for age and 0.82 for weight. The results were similar to those reported in previous studies regarding the relationships among strength, age, and anthropometric parameters, but the reported strength differed. These results provide normal strength parameters for healthy and normal-weight Chilean children between 6 and 15 years of age and highlight the relevance of ethnicity in defining reference values for muscle strength in a pediatric population. Muscle Nerve 55: 16-22, 2017. © 2016 Wiley Periodicals, Inc.

  17. Data Acquisition for Modular Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodsinsky, Carlos M. (Inventor)

    2014-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to collect data asynchronously, via the bus, from the memory of the plurality of data acquisition modules according to a relative fullness of the memory of the plurality of data acquisition modules.

  18. Multi-stage IT project evaluation: The flexibility value obtained by implementing and resolving Berk, Green and Naik (2004) model

    Science.gov (United States)

    Abid, Fathi; Guermazi, Dorra

    2009-11-01

    In this paper, we evaluate a multi-stage information technology investment project, by implementing and resolving Berk, Green and Naik's (2004) model, which takes into account specific features of IT projects and considers the real option to suspend investment at each stage. We present a particular case of the model where the project value is the solution of an optimal control problem with a single state variable. In this case, the model is more intuitive and tractable. The case study confirms the practical potential of the model and highlights the importance of the real-option approach compared to classical discounted cash flow techniques in the valuation of IT projects.

  19. Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures

    OpenAIRE

    Bringer, Julien; Chabanne, Herve; Metayer, Daniel Le; Lescuyer, Roch

    2017-01-01

    This work aims to show the applicability, and how, of privacy by design approach to biometric systems and the benefit of using formal methods to this end. Starting from a general framework that has been introduced at STM in 2014, that enables to define privacy architectures and to formally reason about their properties, we explain how it can be adapted to biometrics. The choice of particular techniques and the role of the components (central server, secure module, biometric terminal, smart ca...

  20. Value Retention, Service Life, Use Intensity and Long-Term Productivity of Wood Chippers as Obtained from Contractor Records

    Directory of Open Access Journals (Sweden)

    Raffaele Spinelli

    2017-12-01

    Full Text Available Acknowledging the absence of up-to-date empirical data on the value retention, service life and annual use of chipping machinery, in 2017 the authors surveyed the records kept by 50 contractors offering biomass chipping services. The machine fleet and operations in this survey could be taken as representative for most of Europe, where the biomass sector is well established and is facing further expansion. Data collection included the whole chipping unit, comprised of chipper, carrier and loader. Manually-fed units were excluded from the survey. The data pointed at a service life up to and exceeding 10,000 h and 10 years, which relieved any concerns about poor durability. Value retention was good, and may exceed that of other mainstream forestry equipment. Engine power was the main explanatory variable in any models to predict purchase price and productivity. The effect of this variable could explain most of the variability (>80% in the purchase price and productivity data. Results also pointed at the essential equivalence in price and productivity between PTO-driven (i.e., tractor powered and independent-engine chippers, once differences in engine power are accounted for. However, the distribution of purchase price between different components of the chipping unit was different between the two unit types, with the chipper accounting for a larger proportion of the total investment in independent-engine units. Machine power was also different, with most PTO-driven units being significantly smaller than independent-engine units, due to the limitations of existing tractors. Furthermore, half of the carriers assigned to a PTO-driven unit were subject to flexible use, i.e., they were not solely used for chipping work.

  1. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Directory of Open Access Journals (Sweden)

    C. Chen

    2009-01-01

    Full Text Available Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP approach and a greedy search (GS approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  2. Fungicidal values of bio-oils and their lignin-rich fractions obtained from wood/bark fast pyrolysis.

    Science.gov (United States)

    Mohan, Dinesh; Shi, Jenny; Nicholas, Darrel D; Pittman, Charles U; Steele, Philip H; Cooper, Jerome E

    2008-03-01

    Pine wood, pine bark, oak wood and oak bark were pyrolyzed in an auger reactor. A total of 16 bio-oils or pyrolytic oils were generated at different temperatures and residence times. Two additional pine bio-oils were produced at the National Renewable Energy Laboratory in a fluidized-bed reactor at different temperatures. All these bio-oils were fractionated to obtain lignin-rich fractions which consist mainly of phenols and neutrals. The pyrolytic lignin-rich fractions were obtained by liquid-liquid extraction. Whole bio-oils and their lignin-rich fractions were studied as potential environmentally benign wood preservatives to replace metal-based CCA and copper systems that have raised environmental concerns. Each bio-oil and several lignin-rich fractions were tested for antifungal properties. Soil block tests were conducted using one brown-rot fungus (Gloeophyllum trabeum) and one white-rot fungus (Trametes versicolor). The lignin-rich fractions showed greater fungal inhibition than whole bio-oils for a impregnation solution 10% concentration level. Water repellence tests were also performed to study wood wafer swelling behavior before and after bio-oil and lignin-rich fraction treatments. In this case, bio-oil fractions did not exhibit higher water repellency than whole bio-oils. Comparison of raw bio-oils in soil block tests, with unleached wafers, at 10% and 25% bio-oil impregnation solution concentration levels showed excellent wood preservation properties at the 25% level. The good performance of raw bio-oils at higher loading levels suggests that fractionation to generate lignin-rich fractions is unnecessary. At this more effective 25% loading level in general, the raw bio-oils performed similarly. Prevention of leaching is critically important for both raw bio-oils and their fractions to provide decay resistance. Initial tests of a polymerization chemical to prevent leaching showed some success.

  3. The biometric antecedents to happiness.

    Directory of Open Access Journals (Sweden)

    Petri Böckerman

    Full Text Available It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905 and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980 are associated with happiness in adulthood (2001. Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986 on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  4. The biometric antecedents to happiness.

    Science.gov (United States)

    Böckerman, Petri; Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  5. A Vein Map Biometric System

    Directory of Open Access Journals (Sweden)

    Felix Fuentes

    2013-08-01

    Full Text Available There is increasing demand world-wide, from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but userfriendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed negatively because of many cultural and hygienic issues associated with them. Comparatively, mapping veins as a human barcode, a new technology, has many advantages over older technologies. Specifically, reproducing a three-dimensional model of a human vein system is impossible to replicate. Vein map technology is distinctive because of its state-of-the-art sensors are only able to recognize vein patterns if hemoglobin is actively flowing through the person

  6. Update on the US Government's Biometric Consortium

    National Research Council Canada - National Science Library

    Campbell, Joseph

    1997-01-01

    .... The goals of the consortium remain largely the same under this new leadership. The current emphasis is on the formal approval of our charter and on the establishment of a national biometric test and evaluation laboratory.

  7. Autopoietic Theory as a Framework for Biometrics

    Directory of Open Access Journals (Sweden)

    Markus Schatten

    2009-01-01

    Full Text Available Autopoietic theory which represents a framework for describing complex non-linear and especially living systems is described in a context of biometric characteristics. It is argued that any living system by performing an internal process of reproducing its structural components yields physical biometric characteristics. Likewise any living system when structurally coupling to another (eventually allopoietic system yields a behavioral or psychological characteristic of the living system. It is shown that any system that can be considered as autopoietic can potentially be measured, authenticated and/or identified using adequate biometric methods, and thus biometrics is applicable to any autopoietic system: living beings, groups of living beings, social systems, organizations as well as information systems. In the end implications of such a conceptualization are discussed as well as possible applications.

  8. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    In 2002, the President of the United States established an organization within the DOD to develop and promulgate biometrics technologies to achieve security in information, information systems, weapons, and facilities...

  9. Prognostic value of myocardial infarct size index, obtained with technetium-99m pyrophosphate and thallium-201 chloride scintigraphy

    Energy Technology Data Exchange (ETDEWEB)

    Sugihara, Masami [Kanazawa Univ. (Japan). School of Medicine

    1982-02-01

    In order to determine the usefulness of nuclear cardiology methods in evaluating infarction size and in predicting subsequent mortality, the infarction size index was calculated and their left ventricular ejection fraction (LVEF) was measured for 136 patients with acute myocardial infarction, by means of sup(99m)Tc- and /sup 201/Tl-scintigraphy. Sensitivity of sup(99m)Tc-scintigraphy was 84% (of 44 cases). The hot sup(99m)Tc-areas were measured by planimetry only in anterior transmural infarctions. For 15 patients followed for 25 months on the average, hot areas were 13.8 +- 10.8 cm/sup 2/ in survivors and 31.7 +- 18.2 cm/sup 2/ in non-survivors. Both a doughnut pattern and persistent hot area in scintigraphs were signs of poor prognosis. Sensitivity of /sup 201/Tl-scintigraphy was 86% (of 95 cases). The extent of /sup 201/Tl perfusion defects was determined in three views by the average ratio of the length of perfusion defects to that of the left ventricle (LV). Interobserver correlation was high (r = 0.89). As the percent /sup 201/Tl defect index increased, the peak value of creatine phosphokinase, the grade of Peel index, incidence of congestion on initial chest X-ray, and LV aneurysma all gradually increased. In 48 patients followed for 23 months on the average after discharge, the incidence of congestive heart failure and mortality also increased with the larger degree of percent /sup 201/Tl defect index. In particular, the prognosis was poor in patients who had the percent /sup 201/Tl defect index larger than 40%. The LVEF, measured with a computerized multi-crystal gamma camera, was well correlated with that of contrast ventriculography (r = 0.92). The patients who had severe LV dysfunction and the LVEF less than 31% also showed poor prognosis.

  10. Biometrics IRB best practices and data protection

    Science.gov (United States)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  11. Crop Biometric Maps: The Key to Prediction

    Directory of Open Access Journals (Sweden)

    Francisco Rovira-Más

    2013-09-01

    Full Text Available The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  12. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  13. Transfer learning for bimodal biometrics recognition

    Science.gov (United States)

    Dan, Zhiping; Sun, Shuifa; Chen, Yanfei; Gan, Haitao

    2013-10-01

    Biometrics recognition aims to identify and predict new personal identities based on their existing knowledge. As the use of multiple biometric traits of the individual may enables more information to be used for recognition, it has been proved that multi-biometrics can produce higher accuracy than single biometrics. However, a common problem with traditional machine learning is that the training and test data should be in the same feature space, and have the same underlying distribution. If the distributions and features are different between training and future data, the model performance often drops. In this paper, we propose a transfer learning method for face recognition on bimodal biometrics. The training and test samples of bimodal biometric images are composed of the visible light face images and the infrared face images. Our algorithm transfers the knowledge across feature spaces, relaxing the assumption of same feature space as well as same underlying distribution by automatically learning a mapping between two different but somewhat similar face images. According to the experiments in the face images, the results show that the accuracy of face recognition has been greatly improved by the proposed method compared with the other previous methods. It demonstrates the effectiveness and robustness of our method.

  14. Crop biometric maps: the key to prediction.

    Science.gov (United States)

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-09-23

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular "identity." This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  15. Apparent diffusion coefficient maps obtained from high b value diffusion-weighted imaging in the preoperative evaluation of gliomas at 3T: comparison with standard b value diffusion-weighted imaging

    Energy Technology Data Exchange (ETDEWEB)

    Zeng, Qiang; Ling, Chenhan; Zhang, Jianmin [Second Affiliated Hospital of Zhejiang University School of Medicine, Department of Neurosurgery, Hangzhou, Zhejiang (China); Dong, Fei; Jiang, Biao [Second Affiliated Hospital of Zhejiang University School of Medicine, Department of Radiology, Hangzhou, Zhejiang (China); Shi, Feina [Second Affiliated Hospital of Zhejiang University School of Medicine, Department of Neurology, Hangzhou, Zhejiang (China)

    2017-12-15

    To assess whether ADC maps obtained from high b value DWI were more valuable in preoperatively evaluating the grade, Ki-67 index and outcome of gliomas. Sixty-three patients with gliomas, who underwent preoperative multi b value DWI at 3 T, were enrolled. The ADC{sub 1000}, ADC{sub 2000} and ADC{sub 3000} maps were generated. Receiver operating characteristic analyses were conducted to determine the area under the curve (AUC) in differentiating high-grade gliomas (HGG) from low-grade gliomas (LGG). Pearson correlation coefficients (R value) were calculated to investigate the correlation between parameters with the Ki-67 proliferation index. Survival analysis was conducted by using Cox regression. The AUC of the mean ADC{sub 1000} value (0.820) was lower than that of the mean ADC{sub 2000} value (0.847) and mean ADC{sub 3000} value (0.875) in differentiating HGG from LGG. The R value of the mean ADC{sub 1000} value (-0.499) was less negative than that of the mean ADC{sub 2000} value (-0.530) and mean ADC{sub 3000} value (-0.567). The mean ADC{sub 3000} value was an independent prognosis factor for gliomas (p = 0.008), while the mean ADC{sub 1000} and ADC{sub 2000} values were not. ADC maps obtained from high b value DWI might be a better imaging biomarker in the preoperative evaluation of gliomas. (orig.)

  16. Advanced quantitative methods in correlating sarcopenic muscle degeneration with lower extremity function biometrics and comorbidities.

    Science.gov (United States)

    Edmunds, Kyle; Gíslason, Magnús; Sigurðsson, Sigurður; Guðnason, Vilmundur; Harris, Tamara; Carraro, Ugo; Gargiulo, Paolo

    2018-01-01

    Sarcopenic muscular degeneration has been consistently identified as an independent risk factor for mortality in aging populations. Recent investigations have realized the quantitative potential of computed tomography (CT) image analysis to describe skeletal muscle volume and composition; however, the optimum approach to assessing these data remains debated. Current literature reports average Hounsfield unit (HU) values and/or segmented soft tissue cross-sectional areas to investigate muscle quality. However, standardized methods for CT analyses and their utility as a comorbidity index remain undefined, and no existing studies compare these methods to the assessment of entire radiodensitometric distributions. The primary aim of this study was to present a comparison of nonlinear trimodal regression analysis (NTRA) parameters of entire radiodensitometric muscle distributions against extant CT metrics and their correlation with lower extremity function (LEF) biometrics (normal/fast gait speed, timed up-and-go, and isometric leg strength) and biochemical and nutritional parameters, such as total solubilized cholesterol (SCHOL) and body mass index (BMI). Data were obtained from 3,162 subjects, aged 66-96 years, from the population-based AGES-Reykjavik Study. 1-D k-means clustering was employed to discretize each biometric and comorbidity dataset into twelve subpopulations, in accordance with Sturges' Formula for Class Selection. Dataset linear regressions were performed against eleven NTRA distribution parameters and standard CT analyses (fat/muscle cross-sectional area and average HU value). Parameters from NTRA and CT standards were analogously assembled by age and sex. Analysis of specific NTRA parameters with standard CT results showed linear correlation coefficients greater than 0.85, but multiple regression analysis of correlative NTRA parameters yielded a correlation coefficient of 0.99 (Pbiometrics, SCHOL, and BMI, and particularly highlight the value of the

  17. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  18. Multimodal Biometric System- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

    Directory of Open Access Journals (Sweden)

    Grace Wangari Mwaura

    2017-04-01

    Full Text Available Biometrics has developed to be one of the most relevant technologies used in Information Technology IT security. Unimodal biometric systems have a variety of problems which decreases the performance and accuracy of these system. One way to overcome the limitations of the unimodal biometric systems is through fusion to form a multimodal biometric system. Generally biometric fusion is defined as the use of multiple types of biometric data or ways of processing the data to improve the performance of biometric systems. This paper proposes to develop a model for fusion of the face and fingerprint biometric at the match score fusion level. The face and fingerprint unimodal in the proposed model are built using scale invariant feature transform SIFT algorithm and the hamming distance to measure the distance between key points. To evaluate the performance of the multimodal system the FAR and FRR of the multimodal are compared along those of the individual unimodal systems. It has been established that the multimodal has a higher accuracy of 92.5 compared to the face unimodal system at 90 while the fingerprint unimodal system is at 82.5.

  19. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  20. ECG biometric identification: A compression based approach.

    Science.gov (United States)

    Bras, Susana; Pinho, Armando J

    2015-08-01

    Using the electrocardiogram signal (ECG) to identify and/or authenticate persons are problems still lacking satisfactory solutions. Yet, ECG possesses characteristics that are unique or difficult to get from other signals used in biometrics: (1) it requires contact and liveliness for acquisition (2) it changes under stress, rendering it potentially useless if acquired under threatening. Our main objective is to present an innovative and robust solution to the above-mentioned problem. To successfully conduct this goal, we rely on information-theoretic data models for data compression and on similarity metrics related to the approximation of the Kolmogorov complexity. The proposed measure allows the comparison of two (or more) ECG segments, without having to follow traditional approaches that require heartbeat segmentation (described as highly influenced by external or internal interferences). As a first approach, the method was able to cluster the data in three groups: identical record, same participant, different participant, by the stratification of the proposed measure with values near 0 for the same participant and closer to 1 for different participants. A leave-one-out strategy was implemented in order to identify the participant in the database based on his/her ECG. A 1NN classifier was implemented, using as distance measure the method proposed in this work. The classifier was able to identify correctly almost all participants, with an accuracy of 99% in the database used.

  1. Radionuclide Data Centre. Tasks and problems of obtaining the most reliable values of the nuclear physics characteristics of radionuclides and radiation physics parameters of radionuclide sources

    International Nuclear Information System (INIS)

    Chechev, V.P.

    1994-01-01

    Information is provided on the establishment of the Radionuclide Data Centre under the V.G. Khlopin Radium Institute. Its functions and areas of activity are discussed. The paper focuses on the procedure of obtaining the evaluated values of the decay and radiative characteristics of the widely used radionuclides. (author)

  2. Estimation of optimal b-value sets for obtaining apparent diffusion coefficient free from perfusion in non-small cell lung cancer.

    Science.gov (United States)

    Karki, Kishor; Hugo, Geoffrey D; Ford, John C; Olsen, Kathryn M; Saraiya, Siddharth; Groves, Robert; Weiss, Elisabeth

    2015-10-21

    The purpose of this study was to determine optimal sets of b-values in diffusion-weighted MRI (DW-MRI) for obtaining monoexponential apparent diffusion coefficient (ADC) close to perfusion-insensitive intravoxel incoherent motion (IVIM) model ADC (ADCIVIM) in non-small cell lung cancer. Ten subjects had 40 DW-MRI scans before and during radiotherapy in a 1.5 T MRI scanner. Respiratory triggering was applied to the echo-planar DW-MRI with TR ≈ 4500 ms, TE  =  74 ms, eight b-values of 0-1000 μs μm(-2), pixel size  =  1.98 × 1.98 mm(2), slice thickness  =  6 mm, interslice gap  =  1.2 mm, 7 axial slices and total acquisition time ≈6 min. One or more DW-MRI scans together covered the whole tumour volume. Monoexponential model ADC values using various b-value sets were compared to reference-standard ADCIVIM values using all eight b-values. Intra-scan coefficient of variation (CV) of active tumour volumes was computed to compare the relative noise in ADC maps. ADC values for one pre-treatment DW-MRI scan of each of the 10 subjects were computed using b-value pairs from DW-MRI images synthesized for b-values of 0-2000 μs μm(-2) from the estimated IVIM parametric maps and corrupted by various Rician noise levels. The square root of mean of squared error percentage (RMSE) of the ADC value relative to the corresponding ADCIVIM for the tumour volume of the scan was computed. Monoexponential ADC values for the b-value sets of 250 and 1000; 250, 500 and 1000; 250, 650 and 1000; 250, 800 and 1000; and 250-1000 μs μm(-2) were not significantly different from ADCIVIM values (p > 0.05, paired t-test). Mean error in ADC values for these sets relative to ADCIVIM were within 3.5%. Intra-scan CVs for these sets were comparable to that for ADCIVIM. The monoexponential ADC values for other sets-0-1000; 50-1000; 100-1000; 500-1000; and 250 and 800 μs μm(-2) were significantly different from the ADCIVIM values. From Rician noise

  3. Biometrics in support of special forces medical operations.

    Science.gov (United States)

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  4. Review of modern biometric user authentication and their development prospects

    Science.gov (United States)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  5. Application of Some Biometric Indices in the Assessment of the ...

    African Journals Online (AJOL)

    Application of Some Biometric Indices in the Assessment of the Water Quality of the Benin River, Niger Delta, Nigeria. ... Username, Password, Remember me, or Register ... Rapid Bioassessment Protocols (RBP) using some biometric indices ...

  6. Heart Sound Biometric System Based on Marginal Spectrum Analysis

    Science.gov (United States)

    Zhao, Zhidong; Shen, Qinqin; Ren, Fangqin

    2013-01-01

    This work presents a heart sound biometric system based on marginal spectrum analysis, which is a new feature extraction technique for identification purposes. This heart sound identification system is comprised of signal acquisition, pre-processing, feature extraction, training, and identification. Experiments on the selection of the optimal values for the system parameters are conducted. The results indicate that the new spectrum coefficients result in a significant increase in the recognition rate of 94.40% compared with that of the traditional Fourier spectrum (84.32%) based on a database of 280 heart sounds from 40 participants. PMID:23429515

  7. Body shape-based biometric recognition using millimeter wave images

    OpenAIRE

    González-Sosa, Ester; Vera-Rodríguez, Rubén; Fiérrez, Julián; Ortega-García, Javier

    2013-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. González-Sosa, E. ; Vera-Rodríguez, R. ; Fierrez, J. ; Ortega-García, J. "Body shape-based biometric recognition using millime...

  8. Corneal topography measurements for biometric applications

    Science.gov (United States)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  9. Biometrics Enabling Capability Increment 1 (BEC Inc 1)

    Science.gov (United States)

    2016-03-01

    modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will support the Warfighter in...2016 Major Automated Information System Annual Report Biometrics Enabling Capability Increment 1 (BEC Inc 1) Defense Acquisition Management...Phone: 227-3119 DSN Fax: Date Assigned: July 15, 2015 Program Information Program Name Biometrics Enabling Capability Increment 1 (BEC Inc 1) DoD

  10. Biometric Passport Validation Scheme using Radio Frequency Identification

    OpenAIRE

    V.K. Narendira Kumar; B. Srinivasan

    2013-01-01

    Biometric passports issued nowadays have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris. The electronic passport is the privacy and security risks that arise by embedding RFID technology. The ...

  11. On the Quantification of Aging Effects on Biometric Features

    OpenAIRE

    Lanitis , Andreas; Tsapatsoulis , Nicolas

    2010-01-01

    International audience; Biometric templates are often used in intelligent human computer interaction systems that include automated access control and personalization of user interaction. The effectiveness of biometric systems is directly linked with aging that causes modifications on biometric features. For example the long term performance of person identification systems decreases as biometric templates derived from aged subjects may display substantial differences when compared to referen...

  12. Information analysis of iris biometrics for the needs of cryptology key extraction

    Directory of Open Access Journals (Sweden)

    Adamović Saša

    2013-01-01

    Full Text Available The paper presents a rigorous analysis of iris biometric information for the synthesis of an optimized system for the extraction of a high quality cryptology key. Estimations of local entropy and mutual information were identified as segments of the iris most suitable for this purpose. In order to optimize parameters, corresponding wavelets were transformed, in order to obtain the highest possible entropy and mutual information lower in the transformation domain, which set frameworks for the synthesis of systems for the extraction of truly random sequences of iris biometrics, without compromising authentication properties. [Projekat Ministarstva nauke Republike Srbije, br. TR32054 i br. III44006

  13. A proposed simple method for measurement in the anterior chamber angle: biometric gonioscopy.

    Science.gov (United States)

    Congdon, N G; Spaeth, G L; Augsburger, J; Klancnik, J; Patel, K; Hunter, D G

    1999-11-01

    To design a system of gonioscopy that will allow greater interobserver reliability and more clearly defined screening cutoffs for angle closure than current systems while being simple to teach and technologically appropriate for use in rural Asia, where the prevalence of angle-closure glaucoma is highest. Clinic-based validation and interobserver reliability trial. Study 1: 21 patients 18 years of age and older recruited from a university-based specialty glaucoma clinic; study 2: 32 patients 18 years of age and older recruited from the same clinic. In study 1, all participants underwent conventional gonioscopy by an experienced observer (GLS) using the Spaeth system and in the same eye also underwent Scheimpflug photography, ultrasonographic measurement of anterior chamber depth and axial length, automatic refraction, and biometric gonioscopy with measurement of the distance from iris insertion to Schwalbe's line using a reticule based in the slit-lamp ocular. In study 2, all participants underwent both conventional gonioscopy and biometric gonioscopy by an experienced gonioscopist (NGC) and a medical student with no previous training in gonioscopy (JK). Study 1: The association between biometric gonioscopy and conventional gonioscopy, Scheimpflug photography, and other factors known to correlate with the configuration of the angle. Study 2: Interobserver agreement using biometric gonioscopy compared to that obtained with conventional gonioscopy. In study 1, there was an independent, monotonic, statistically significant relationship between biometric gonioscopy and both Spaeth angle (P = 0.001, t test) and Spaeth insertion (P = 0.008, t test) grades. Biometric gonioscopy correctly identified six of six patients with occludable angles according to Spaeth criteria. Biometric gonioscopic grade was also significantly associated with the anterior chamber angle as measured by Scheimpflug photography (P = 0.005, t test). In study 2, the intraclass correlation coefficient

  14. Correlation of Lactic Acid and Base Deficit Values Obtained From Arterial and Peripheral Venous Samples in a Pediatric Population During Intraoperative Care.

    Science.gov (United States)

    Bordes, Brianne M; Walia, Hina; Sebastian, Roby; Martin, David; Tumin, Dmitry; Tobias, Joseph D

    2017-12-01

    Lactic acid and base deficit (BD) values are frequently monitored in the intensive care unit and operating room setting to evaluate oxygenation, ventilation, cardiac output, and peripheral perfusion. Although generally obtained from an arterial cannula, such access may not always be available. The current study prospectively investigates the correlation of arterial and peripheral venous values of BD and lactic acid. The study cohort included 48 patients. Arterial BD values ranged from -8 to 4 mEq/L and peripheral venous BD values ranged from -8 to 4 mEq/L. Arterial lactic acid values ranged from 0.36 to 2.45 μmol/L and peripheral venous lactic acid values ranged from 0.38 to 4 μmol/L. The arterial BD (-0.4 ± 2.2 mEq/L) was not significantly different from the peripheral venous BD (-0.6 ± 2.2 mEq/L). The arterial lactic acid (1.0 ± 0.5 μmol/L) was not significantly different from the peripheral venous lactic acid (1.1 ± 0.6 μmol/L). Pearson correlation coefficients demonstrated a very high correlation between arterial and peripheral venous BD ( r = .88, P lactic acid ( r = .67, P lactic acid corresponded to a 0.9-unit increase in peripheral venous lactic acid (95% CI: 0.6-1.2; P lactic acid and BD values.

  15. Biometrics and their use in e-passports

    NARCIS (Netherlands)

    Schouten, B.A.M.; Jacobs, B.P.F.

    2009-01-01

    A successful design, deployment and operation of biometric systems depends highly on the results for existing biometrical technologies and components. These existing technologies as well as new solutions need to be evaluated on their performance. However it is often forgotten that the biometric

  16. Biometrics and their use in e-passports

    NARCIS (Netherlands)

    Prof. Bart Jacobs; B.A.M. Ben Schouten

    2007-01-01

    A succesful design, deployment and operation of biometric systems depends highly on the results for existing biometrical technologies and components. These existing technologies as well as new solutions need to be evaluated on their performance. However it is often forgotten that the biometric

  17. Biometrics in Forensic Science: Challenges, Lessons and New Technologies

    NARCIS (Netherlands)

    Tistarelli, Massimo; Grosso, Enrico; Meuwly, Didier

    2014-01-01

    Biometrics has historically found its natural mate in Forensics. The first applications found in the literature and over cited so many times, are related to biometric measurements for the identification of multiple offenders from some of their biometric and anthropometric characteristics (tenprint

  18. 75 FR 39323 - Amendment to the Biometric Visa Program

    Science.gov (United States)

    2010-07-08

    ... DEPARTMENT OF STATE [Public Notice: 7047] Amendment to the Biometric Visa Program AGENCY: Department of State. ACTION: Notice of Amendment to the Biometric Visa Program. This public notice announces an amendment to the Biometric Visa Program. Section 303 of the Enhanced Border Security and Visa...

  19. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  20. Biometric security from an information-theoretical perspective

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2012-01-01

    In this review, biometric systems are studied from an information theoretical point of view. In the first part biometric authentication systems are studied. The objective of these systems is, observing correlated enrollment and authentication biometric sequences, to generate or convey as large as

  1. Biometric identification using local iterated function

    Science.gov (United States)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  2. Correlation of iris biometrics and DNA

    DEFF Research Database (Denmark)

    Harder, Stine; Clemmensen, Line Katrine Harder; Dahl, Anders Bjorholm

    2013-01-01

    The presented work concerns prediction of complex human phenotypes from genotypes. We were interested in correlating iris color and texture with DNA. Our data consist of 212 eye images along with DNA: 32 single-nucleotide polymorphisms (SNPs). We used two types of biometrics to describe the eye...... images: One for iris color and one for iris texture. Both biometrics were high dimensional and a sparse principle component analysis (SPCA) reduced the dimensions and resulted in a representation of data with good interpretability. The correlations between the sparse principal components (SPCs......) and the 32 SNPs were found using a canonical correlation analysis (CCA). The result was a single significant canonical correlation (CC) for both biometrics. Each CC comprised two correlated canonical variables, consisting of a linear combination of SPCs and a linear combination of SNPs, respectively...

  3. A survey of keystroke dynamics biometrics.

    Science.gov (United States)

    Teh, Pin Shen; Teoh, Andrew Beng Jin; Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.

  4. Animal biometrics: quantifying and detecting phenotypic appearance.

    Science.gov (United States)

    Kühl, Hjalmar S; Burghardt, Tilo

    2013-07-01

    Animal biometrics is an emerging field that develops quantified approaches for representing and detecting the phenotypic appearance of species, individuals, behaviors, and morphological traits. It operates at the intersection between pattern recognition, ecology, and information sciences, producing computerized systems for phenotypic measurement and interpretation. Animal biometrics can benefit a wide range of disciplines, including biogeography, population ecology, and behavioral research. Currently, real-world applications are gaining momentum, augmenting the quantity and quality of ecological data collection and processing. However, to advance animal biometrics will require integration of methodologies among the scientific disciplines involved. Such efforts will be worthwhile because the great potential of this approach rests with the formal abstraction of phenomics, to create tractable interfaces between different organizational levels of life. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  6. 3D face analysis for demographic biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Tokola, Ryan A [ORNL; Mikkilineni, Aravind K [ORNL; Boehnen, Chris Bensing [ORNL

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  7. Axial length and keratometry readings in Nigeria- a guide to biometr

    African Journals Online (AJOL)

    Dr Adio

    though not ideal may be useful where biometric machines are either not available or faulty. Surgeries are increasingly being done in the rural areas and in camp settings and a working figure for the axial length and/or keratometry values in the locality where the procedure is taking place are useful. The average A-scan ...

  8. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  9. Improvement of security techniques and protection of biometric data in biometric systems: Presentation of International Standard ISO 24745

    OpenAIRE

    Milinković, Milorad

    2017-01-01

    This paper presents the International Standard ISO 24745 as a potential security tool for biometric information protection, more precisely as a tool for privacy protection in biometric systems. This is one of the latest internationally accepted standards that address the security issues of biometric systems.

  10. Privacy Enhancements for Inexact Biometric Templates

    Science.gov (United States)

    Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud

    Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.

  11. Practical biometrics from aspiration to implementation

    CERN Document Server

    Ashbourn, Julian

    2015-01-01

    This practically-focused text presents a hands-on guide to making biometric technology work in real-life scenarios. Extensively revised and updated, this new edition takes a fresh look at what it takes to integrate biometrics into wider applications. An emphasis is placed on the importance of a complete understanding of the broader scenario, covering technical, human and implementation factors. This understanding may then be exercised through interactive chapters dealing with educational software utilities and the BANTAM Program Manager. Topics and features: provides a concise introduction t

  12. Mathematical and information maintenance of biometric systems

    Science.gov (United States)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  13. Biometric Changes After Trabeculectomy with Contact and Non-contact Biometry.

    Science.gov (United States)

    Alvani, Azam; Pakravan, Mohammad; Esfandiari, Hamed; Yaseri, Mehdi; Yazdani, Shahin; Ghahari, Elham

    2016-02-01

    To compare biometric changes measured with contact and noncontact methods after mitomycin-C-augmented trabeculectomy. In this prospective study, 31 eyes from 31 glaucoma patients scheduled for primary trabeculectomy were enrolled. Biometric parameters including axial length (AL), anterior chamber depth (ACD), and lens thickness (LT) were measured using contact ultrasound biometry (UD-6000 Ultrasonic A/B scanner biometer; Tomey Corporation, Nagoya, Japan) and a noncontact optical biometry device (Lenstar; Haag-Streit AG, Koeniz, Switzerland). Measurements were taken the day before trabeculectomy and then compared with measurements obtained 3 and 6 months after surgery. The AL and ACD were significantly decreased at 3 and 6 months compared with baseline values taken with each biometry method. There was a significant increase in LT measured by the Lenstar device at the 3- and 6-month follow-up. At both the 3- and 6-month follow-up, the mean AL measurement reduction with the Lenstar device was significantly lower than that of the A-scan ultrasound measurements. The mean ACD changes between the two devices were not significantly different. There is a small but significant decrease in the AL and ACD after trabeculectomy as measured with both the contact and noncontact methods. The amount of AL reduction measured is significantly smaller using the noncontact method, making it the preferable method for intraocular lens power calculation for patients who need cataract surgery combined with or after trabeculectomy. The LT measured by the Lenstar device increased significantly after the operation, which can be an early sign of the progression of cataractous changes after trabeculectomy.

  14. Facial biometrics of peri-oral changes in Crohn's disease.

    Science.gov (United States)

    Zou, L; Adegun, O K; Willis, A; Fortune, Farida

    2014-05-01

    Crohn's disease is a chronic relapsing and remitting inflammatory condition which affects any part of the gastrointestinal tract. In the oro-facial region, patients can present peri-oral swellings which results in severe facial disfigurement. To date, assessing the degree of facial changes and evaluation of treatment outcomes relies on clinical observation and semi-quantitative methods. In this paper, we describe the development of a robust and reproducible measurement strategy using 3-D facial biometrics to objectively quantify the extent and progression of oro-facial Crohn's disease. Using facial laser scanning, 32 serial images from 13 Crohn's patients attending the Oral Medicine clinic were acquired during relapse, remission, and post-treatment phases. Utilising theories of coordinate metrology, the facial images were subjected to registration, regions of interest identification, and reproducible repositioning prior to obtaining volume measurements. To quantify the changes in tissue volume, scan images from consecutive appointments were compared to the baseline (first scan image). Reproducibility test was performed to ascertain the degree of uncertainty in volume measurements. 3-D facial biometric imaging is a reliable method to identify and quantify peri-oral swelling in Crohn's patients. Comparison of facial scan images at different phases of the disease revealed precisely profile and volume changes. The volume measurements were highly reproducible as adjudged from the 1% standard deviation. 3-D facial biometrics measurements in Crohn's patients with oro-facial involvement offers a quick, robust, economical and objective approach for guided therapeutic intervention and routine assessment of treatment efficacy on the clinic.

  15. Biometric approach in selecting plants for phytoaccumulation of uranium.

    Science.gov (United States)

    Stojanović, Mirjana; Pezo, Lato; Lačnjevac, Časlav; Mihajlović, Marija; Petrović, Jelena; Milojković, Jelena; Stanojević, Marija

    2016-01-01

    This paper promotes the biometric classification system of plant cultivars, unique characteristics, in terms of the uranium (U) uptake, primarily in the function of the application for phytoremediation. It is known that the degree of adoption of U depends on the plant species and its morphological and physiological properties, but it is less known what impact have plants cultivars, sorts, and hybrids. Therefore, we investigated the U adoption in four cultivars of three plant species (corn, sunflower and soy bean). "Vegetation experiments were carried out in a plastic-house filled with soil (0.66 mgU) and with tailing (15.3 mgU kg(-1)) from closed uranium mine Gabrovnica-Kalna southeast of Serbia". Principal Component Analysis (PCA), Cluster Analysis (CA) and analysis of variance (ANOVA) were used for assessing the effect of different substrates cultivars, plant species and plant organs (root or shoot) on U uptake. Obtained results showed that a difference in U uptake by three investigated plant species depends not only of the type of substrate types and plant organs but also of their cultivars. Biometrics techniques provide a good opportunity for a better understanding the behavior of plants and obtaining much more useful information from the original data.

  16. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    OpenAIRE

    İlker ŞİRİN

    2014-01-01

    Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation...

  17. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    Science.gov (United States)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  18. A Systems Approach to Biometrics in the Military Domain.

    Science.gov (United States)

    Wilson, Lauren; Gahan, Michelle; Lennard, Chris; Robertson, James

    2018-02-21

    Forensic biometrics is the application of forensic science principles to physical and behavioral characteristics. Forensic biometrics is a secondary sub-system in the forensic science "system of systems," which describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military system. The purpose of this paper is to discuss biometrics in the military domain and integration into the wider forensic science system of systems. The holistic system thinking methodology was applied to the U.S. biometric system to map it to the system of systems framework. The U.S. biometric system is used as a case study to help guide other countries to develop military biometric systems that are integrated and interoperable at the whole-of-government level. The aim is to provide the system of systems framework for agencies to consider for proactive design of biometric systems. © 2018 American Academy of Forensic Sciences.

  19. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  20. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  1. Capillary-Patterns for Biometric Authentication

    NARCIS (Netherlands)

    Paloma Benedicto, J.; Bruekers, A.A.M.; Presura, C.N.; Garcia Molina, G.

    2007-01-01

    In this report, we present a method using the capillary structuresunder the "distal interphalangeal joint" (DIP joint), which is located between the second and third (distal) phalanges of the finger, for achieving secure biometric authentication. Images of the DIPjoint are acquired using a

  2. Analysis of eigenvalue correction applied to biometrics

    NARCIS (Netherlands)

    Hendrikse, A.J.; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan; Bazen, A.M.

    Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic

  3. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  4. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  5. Extracting forensic evidence from biometric devices

    Science.gov (United States)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  6. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  7. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  8. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  9. WE-G-18C-02: Estimation of Optimal B-Value Set for Obtaining Apparent Diffusion Coefficient Free From Perfusion in Non-Small Cell Lung Cancer

    Energy Technology Data Exchange (ETDEWEB)

    Karki, K; Hugo, G; Ford, J; Saraiya, S; Weiss, E [Radiation Oncology, Virginia Commonwealth University, Richmond, VA (United States); Olsen, K; Groves, R [Radiology, Virginia Commonwealth University, Richmond, VA (United States)

    2014-06-15

    Purpose: Diffusion-weighted MRI (DW-MRI) is increasingly being investigated for radiotherapy planning and response assessment. Selection of a limited number of b-values in DW-MRI is important to keep geometrical variations low and imaging time short. We investigated various b-value sets to determine an optimal set for obtaining monoexponential apparent diffusion coefficient (ADC) close to perfusion-insensitive intravoxel incoherent motion (IVIM) model ADC (ADCIVIM) in nonsmall cell lung cancer. Methods: Seven patients had 27 DW-MRI scans before and during radiotherapy in a 1.5T scanner. Respiratory triggering was applied to the echo-planar DW-MRI with TR=4500ms approximately, TE=74ms, pixel size=1.98X1.98mm{sub 2}, slice thickness=4–6mm and 7 axial slices. Diffusion gradients were applied to all three axes producing traceweighted images with eight b-values of 0–1000μs/μm{sup 2}. Monoexponential model ADC values using various b-value sets were compared to ADCIVIM using all b-values. To compare the relative noise in ADC maps, intra-scan coefficient of variation (CV) of active tumor volumes was computed. Results: ADCIVIM, perfusion coefficient and perfusion fraction for tumor volumes were in the range of 880-1622 μm{sup 2}/s, 8119-33834 μm{sup 2}/s and 0.104–0.349, respectively. ADC values using sets of 250, 800 and 1000; 250, 650 and 1000; and 250–1000μs/μm{sup 2} only were not significantly different from ADCIVIM(p>0.05, paired t-test). Error in ADC values for 0–1000, 50–1000, 100–1000, 250–1000, 500–1000, and three b-value sets- 250, 500 and 1000; 250, 650 and 1000; and 250, 800 and 1000μs/μm{sup 2} were 15.0, 9.4, 5.6, 1.4, 11.7, 3.7, 2.0 and 0.2% relative to the reference-standard ADCIVIM, respectively. Mean intrascan CV was 20.2, 20.9, 21.9, 24.9, 32.6, 25.8, 25.4 and 24.8%, respectively, whereas that for ADCIVIM was 23.3%. Conclusion: ADC values of two 3 b-value sets

  10. Determination of crack arrest toughness in A508 CL.3 forging steel from ASTM E1221-88 procedure. Comparison with the values obtained from thermal loading tests

    International Nuclear Information System (INIS)

    Frund, J.M.; Difant, M.; Bethmont, M.

    1994-01-01

    A crack arrest study is under way at Electricite de France as part of the analysis of the risk of fast fracture of PWR vessels in emergency conditions. The first objective of this study is to evaluate the toughness which characterizes crack arrest through tests on reduced-size specimens. Some of the tests on a forging steel (A508 Cl.3) were conducted in conformity with two experimental methods. One method recommended by the ASTM calls for the use of an imposed-displacement mechanical loading on specimens kept under homogeneous temperature. Since the stress intensity factor K applied to the outside loading decreases along the crack growth, we can observe the arrest of the crack. In order to obtain brittle crack initiations in cleavage in the whole studied range of temperature and crack propagation of a sufficient length, the application of a weld point at the top of the notch is done. The other experimental method is based on a thermal loading. It requires the use of a disk or a cylinder with a longitudinal initial crack of the external surface. We dip this specimen in liquid nitrogen and we heat its internal surface with inducing current. There is a temperature gradient in the thickness of the specimen which produces a stress field which tends to open the crack. When the value of K is reached the crack initiation takes place. Several phenomena act to oppose the crack growth, they even go as far as stopping it. First the value of K, after increasing, gets steady then decreases, then, the rate of energy dissipated by plasticity at the top of the crack increases because the crack meets warmer and warmer areas on its way. The arrest toughness values which were obtained were then analyzed and compared to one another and with values proposed by RCC-m code. (authors). 12 refs., 11 figs., 3 tabs

  11. Water uptake in free films and coatings using the Brasher and Kingsbury equation: a possible explanation of the different values obtained by electrochemical Impedance spectroscopy and gravimetry

    International Nuclear Information System (INIS)

    Vosgien Lacombre, C.; Bouvet, G.; Trinh, D.; Mallarino, S.; Touzain, S.

    2017-01-01

    For many years, the water uptake in organic coatings was measured by EIS and/or gravimetry but differences in water content values were found in almost all studies. The Brasher-Kingsbury equation used in the electrochemical analysis (EIS) is often criticized because elementary assumptions may be unvalid. The origin of the discrepancy between both methods is still of interest because many questions remain open and this study aims to provide new insights to these questions. In this work, free films and coatings of a model epoxy-amine system were immersed in a 3 wt.% NaCl solution. The water uptake in free films was evaluated using gravimetric measurements and EIS, using the Basher-Kingsbury equation. The mass of free-films used in the EIS tests was measured and compare to gravimetric measurements while the water uptake (EIS) in free films was compared to that obtained with coatings. It was found that the mass increase of free films tested with EIS was in agreement with gravimetric measurements but was always lower than the water uptake obtained by EIS. Moreover, the water uptake in free films (EIS) was different from that obtained with coatings. In all cases, it was found that the Basher-Kingsbury equation overestimated the water uptake. It appears that the differences between EIS and gravimetric measurements can be analyzed in terms of geometrical effects. Indeed, the swelling in free films and coatings can be monitored by DMA and SECM during ageing. Finally, by mixing the experimental swelling data and the Brasher-Kingsbury equation, the same value of water uptake was obtained by EIS and gravimetry for coatings.

  12. Biometric identification devices -- Laboratory testing vs. real life

    International Nuclear Information System (INIS)

    Ahrens, J.S.

    1997-01-01

    For over fifteen years Sandia National Laboratories has been involved in laboratory testing of biometric identification devices. The key concept of biometric identification devices is the ability for the system to identify some unique aspect of the individual rather than some object a person may be carrying or some password they are required to know. Tests were conducted to verify manufacturer's performance claims, to determine strengths/weaknesses of devices, and to determine devices that meet the US Department of energy's needs. However, during recent field installation, significantly different performance was observed than was predicted by laboratory tests. Although most people using the device believed it operated adequately, the performance observed was over an order of magnitude worse than predicted. The search for reasons behind this gap between the predicted and the actual performance has revealed many possible contributing factors. As engineers, the most valuable lesson to be learned from this experience is the value of scientists and engineers with (1) common sense, (2) knowledge of human behavior, (3) the ability to observe the real world, and (4) the capability to realize the significant differences between controlled experiments and actual installations

  13. BIOMETRICAL CHARACTERIZATION OF TEST SITES FOR MAIZE BREEDING

    Directory of Open Access Journals (Sweden)

    Domagoj Šimić

    2003-12-01

    Full Text Available Yield stability of genotypes and analysis of genotype×environment interaction (GEI as important objects in analyses of multienvironment trials are well documented in Croatia. However, little is known about suitability and biometrical characters of the sites where genotypes should be tested. Objectives of this study were in combined analysis of balanced maize trials i to compare test sites in joint linear regression analysis and ii to compare several stability models by clustering test sites in order to assess biometrical suitability of particular test sites. Partitioning of GEI sum of squares according to the symmetrical joint linear regression analysis revealed highly significant Tukey's test, heterogeneity of environmental regressions and residual deviations. Mean grain yields, within-macroenvironment error mean squares, and stability parameters varied considerably among 16 macroenvironments. The highest grain yields were recorded in Osijek in both years and in Varaždin in 1996, with more than 11 t ha-1 . It seems that Feričanci would be optimum test site with relatively high and consistent yield and high values of entry mean squares indicating satisfactory differentiation among cultivars. However, four clustering methods generally did not correspond. According to three out of four clustering methods, two macroenvironments of Feričanci provide similar results. Employing other methods such as shifted multiplicative models, which effectively eliminate significant rank-change interaction, appears to be more reasonable.

  14. Diagnosis of inflammatory bowel disease: Potential role of molecular biometrics.

    Science.gov (United States)

    M'Koma, Amosy E

    2014-11-27

    Accurate diagnosis of predominantly colonic inflammatory bowel disease (IBD) is not possible in 30% of patients. For decades, scientists have worked to find a solution to improve diagnostic accuracy for IBD, encompassing Crohn's colitis and ulcerative colitis. Evaluating protein patterns in surgical pathology colectomy specimens of colonic mucosal and submucosal compartments, individually, has potential for diagnostic medicine by identifying integrally independent, phenotype-specific cellular and molecular characteristics. Mass spectrometry (MS) and imaging (I) MS are analytical technologies that directly measure molecular species in clinical specimens, contributing to the in-depth understanding of biological molecules. The biometric-system complexity and functional diversity is well suited to proteomic and diagnostic studies. The direct analysis of cells and tissues by Matrix-Assisted-Laser Desorption/Ionization (MALDI) MS/IMS has relevant medical diagnostic potential. MALDI-MS/IMS detection generates molecular signatures obtained from specific cell types within tissue sections. Herein discussed is a perspective on the use of MALDI-MS/IMS and bioinformatics technologies for detection of molecular-biometric patterns and identification of differentiating proteins. I also discuss a perspective on the global challenge of transferring technologies to clinical laboratories dealing with IBD issues. The significance of serologic-immunometric advances is also discussed.

  15. Template characterization and correlation algorithm created from segmentation for the iris biometric authentication based on analysis of textures implemented on a FPGA

    International Nuclear Information System (INIS)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L

    2011-01-01

    Among the most used biometric signals to set personal security permissions, taker increasingly importance biometric iris recognition based on their textures and images of blood vessels due to the rich in these two unique characteristics that are unique to each individual. This paper presents an implementation of an algorithm characterization and correlation of templates created for biometric authentication based on iris texture analysis programmed on a FPGA (Field Programmable Gate Array), authentication is based on processes like characterization methods based on frequency analysis of the sample, and frequency correlation to obtain the expected results of authentication.

  16. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    Directory of Open Access Journals (Sweden)

    Josua Tarigan

    2004-01-01

    Full Text Available As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges will face when develop biometric technology as control in accounting information system are standardization, hybrid technology uses, life cycle management. Abstract in Bahasa Indonesia : Adanya keinginan setiap organisasi untuk mencari metode pengamanan authentication yang lebih untuk akses user, dijawab dengan adanya teknologi biometric security yang mendapat perhatian yang cukup besar bagi organisasi. Implementasi teknologi biometric security cukup luas dalam sistem informasi akuntansi yaitu sebagai pengendalian pada physical access, virtual access, e-commerce applications dan covert surveillance. Dalam mengimplementasikan teknologi biometric, ada tiga tahapan yang harus dilakukan organisasi, yakni strategic planning and budgeting, developing a system reliability plan dan documentation. Tantangan yang akan dihadapi dalam mengembangkan teknologi biometric sebagai pengendalian dalam sistem informasi akuntansi yakni standarisasi, aplikasi teknologi hybrid dan manajemen siklus hidup pada biometric security. Kata kunci: authentication, akses user dan biometric security.

  17. [Biometric method for the description of the head of an unrecognized corpse for the purpose of personality individualization and identification].

    Science.gov (United States)

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    We have determined absolute dimensions of the head and the relationship between the dimensions of its selected parts. The study enrolled adult subjects (mostly of Russian ethnicity) at the age from 17 to 22 years (1108 men and 1153 women). We calculated the normal values for the estimation of real dimensional characteristics and the frequency of their occurrence in the population. The proposed approach makes it possible to reliably identify the dimensional features of human appearance in terms of the quantitative verbal description (categories 1-5) and to reveal its most characteristic features. The results of this biometric study of the heads of unrecognized corpses obtained by the specially developed technology may be used in operational and search investigations, in the procedure of corpse identification, and forensic medical personality identification of a missing subject.

  18. [Exploration of three-dimensional biometric measurement of emmetropic adult eye-ball by using magnetic resonance imaging technology].

    Science.gov (United States)

    Xu, Hai-Ming; Zhou, Yun-Xin; Shi, Ming-Guang

    2008-11-01

    To study biometric measurements of emmetropic adult eyes with magnetic resonance imaging technology (MRI). MRI technology, with super-resolution, hyper-speed imaging and the integration of the thin-scanning layer, is applied to measure the three-dimensional biometric parameters of the eyeball. From January to December, 2003, emmetropic eyes from 31 normal Chinese adults (16 males and 15 females) aged from 18 to 32 years old (23.32 +/- 3.32) were successfully measured to obtain the volume of the eyeball and vitreous cavity; inner dimensions of the eye, including the anterior-posterior, vertical and horizontal diameters. The length of ocular axis was measured by A-echo too. Data was analyzed by SPSS 11.0 statistical software. The volume of the eyeball, anterior chamber, lens and the vitreous cavity is (6.013 +/- 0.449) ml, (0.348 +/- 0.020) ml, (0.183 +/- 0.015) ml, and (5.482 +/- 0.440) ml, respectively. The length of anterior-posterior diameter of the vitreous cavity is (16.008 +/- 0.707) mm. The ocular inner dimensions of horizontal, vertical and anterior-posterior planes were (22.455 +/- 0.983) mm, (23.290 +/- 0.815) mm and (22.619 +/- 0.912) mm, respectively. The length of the ocular axis is (23.10 +/- 0.92) mm (with MRI & Orbscan II) and (23.67 +/- 0.82) mm (with A-echo). The value of the ocular length in emmetropic eye measured with both MRI + Orbscan II and the (A-echo) in the present study is very close to the value of the Bennett-Rabbitts schematic eye (24.09 mm). MRI technology is valuable for obtaining more reliable and precise data in the study of ocular physiology and clinical ophthalmology.

  19. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    Science.gov (United States)

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  20. A Novel Multimodal Biometrics Recognition Model Based on Stacked ELM and CCA Methods

    Directory of Open Access Journals (Sweden)

    Jucheng Yang

    2018-04-01

    Full Text Available Multimodal biometrics combine a variety of biological features to have a significant impact on identification performance, which is a newly developed trend in biometrics identification technology. This study proposes a novel multimodal biometrics recognition model based on the stacked extreme learning machines (ELMs and canonical correlation analysis (CCA methods. The model, which has a symmetric structure, is found to have high potential for multimodal biometrics. The model works as follows. First, it learns the hidden-layer representation of biological images using extreme learning machines layer by layer. Second, the canonical correlation analysis method is applied to map the representation to a feature space, which is used to reconstruct the multimodal image feature representation. Third, the reconstructed features are used as the input of a classifier for supervised training and output. To verify the validity and efficiency of the method, we adopt it for new hybrid datasets obtained from typical face image datasets and finger-vein image datasets. Our experimental results demonstrate that our model performs better than traditional methods.

  1. Prenatal Brain MR Imaging: Reference Linear Biometric Centiles between 20 and 24 Gestational Weeks.

    Science.gov (United States)

    Conte, G; Milani, S; Palumbo, G; Talenti, G; Boito, S; Rustico, M; Triulzi, F; Righini, A; Izzo, G; Doneda, C; Zolin, A; Parazzini, C

    2018-05-01

    Evaluation of biometry is a fundamental step in prenatal brain MR imaging. While different studies have reported reference centiles for MR imaging biometric data of fetuses in the late second and third trimesters of gestation, no one has reported them in fetuses in the early second trimester. We report centiles of normal MR imaging linear biometric data of a large cohort of fetal brains within 24 weeks of gestation. From the data bases of 2 referral centers of fetal medicine, accounting for 3850 examinations, we retrospectively collected 169 prenatal brain MR imaging examinations of singleton pregnancies, between 20 and 24 weeks of gestational age, with normal brain anatomy at MR imaging and normal postnatal neurologic development. To trace the reference centiles, we used the CG-LMS method. Reference biometric centiles for the developing structures of the cerebrum, cerebellum, brain stem, and theca were obtained. The overall interassessor agreement was adequate for all measurements. Reference biometric centiles of the brain structures in fetuses between 20 and 24 weeks of gestational age may be a reliable tool in assessing fetal brain development. © 2018 by American Journal of Neuroradiology.

  2. Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study

    Directory of Open Access Journals (Sweden)

    I. G. Damousis

    2012-01-01

    Full Text Available We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs, Artificial Neural Networks (ANNs, Fuzzy Expert Systems (FESs, and Support Vector Machines (SVMs. The fusion of biometrics leads to security systems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not included in the training dataset. The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature.

  3. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  4. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  5. A robust probabilistic collaborative representation based classification for multimodal biometrics

    Science.gov (United States)

    Zhang, Jing; Liu, Huanxi; Ding, Derui; Xiao, Jianli

    2018-04-01

    Most of the traditional biometric recognition systems perform recognition with a single biometric indicator. These systems have suffered noisy data, interclass variations, unacceptable error rates, forged identity, and so on. Due to these inherent problems, it is not valid that many researchers attempt to enhance the performance of unimodal biometric systems with single features. Thus, multimodal biometrics is investigated to reduce some of these defects. This paper proposes a new multimodal biometric recognition approach by fused faces and fingerprints. For more recognizable features, the proposed method extracts block local binary pattern features for all modalities, and then combines them into a single framework. For better classification, it employs the robust probabilistic collaborative representation based classifier to recognize individuals. Experimental results indicate that the proposed method has improved the recognition accuracy compared to the unimodal biometrics.

  6. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  7. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  8. A biometric method to secure telemedicine systems.

    Science.gov (United States)

    Zhang, G H; Poon, Carmen C Y; Li, Ye; Zhang, Y T

    2009-01-01

    Security and privacy are among the most crucial issues for data transmission in telemedicine systems. This paper proposes a solution for securing wireless data transmission in telemedicine systems, i.e. within a body sensor network (BSN), between the BSN and server as well as between the server and professionals who have assess to the server. A unique feature of this solution is the generation of random keys by physiological data (i.e. a biometric approach) for securing communication at all 3 levels. In the performance analysis, inter-pulse interval of photoplethysmogram is used as an example to generate these biometric keys to protect wireless data transmission. The results of statistical analysis and computational complexity suggest that this type of key is random enough to make telemedicine systems resistant to attacks.

  9. Unconstrained and contactless hand geometry biometrics.

    Science.gov (United States)

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  10. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  11. Carbon Nanotube Embedded Nanostructure for Biometrics.

    Science.gov (United States)

    Park, Juhyuk; Youn, Jae Ryoun; Song, Young Seok

    2017-12-27

    Low electric energy loss is a very important problem to minimize the decay of transferred energy intensity due to impedance mismatch. This issue has been dealt with by adding an impedance matching layer at the interface between two media. A strategy was proposed to improve the charge transfer from the human body to a biometric device by using an impedance matching nanostructure. Nanocomposite pattern arrays were fabricated with shape memory polymer and carbon nanotubes. The shape recovery ability of the nanopatterns enhanced durability and sustainability of the structure. It was found that the composite nanopatterns improved the current transfer by two times compared with the nonpatterned composite sample. The underlying mechanism of the enhanced charge transport was understood by carrying out a numerical simulation. We anticipate that this study can provide a new pathway for developing advanced biometric devices with high sensitivity to biological information.

  12. Unconstrained and Contactless Hand Geometry Biometrics

    Directory of Open Access Journals (Sweden)

    Carmen Sánchez-Ávila

    2011-10-01

    Full Text Available This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM and k-Nearest Neighbour (k-NN. Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  13. An Improved Cambridge Filter Pad Extraction Methodology to Obtain More Accurate Water and “Tar” Values: In Situ Cambridge Filter Pad Extraction Methodology

    Directory of Open Access Journals (Sweden)

    Ghosh David

    2014-07-01

    conventional cigarettes is required the in situ extraction methodology must be used for the aerosol of the PMI HTP to obtain accurate NFDPM/”tar” values. This would be for example the case if there were a need to print “tar” yields on packs or compare yields to ceilings. Failure to use the in situ extraction methodology will result in erroneous and overestimated NFDPM/”tar” values.

  14. Evaluation methodologies for security testing biometric systems beyond technological evaluation

    OpenAIRE

    Fernández Saavedra, María Belén

    2013-01-01

    The main objective of this PhD Thesis is the specification of formal evaluation methodologies for testing the security level achieved by biometric systems when these are working under specific contour conditions. This analysis is conducted through the calculation of the basic technical biometric system performance and its possible variations. To that end, the next two relevant contributions have been developed. The first contribution is the definition of two independent biometric performance ...

  15. Joint Sparse Representation for Robust Multimodal Biometrics Recognition

    Science.gov (United States)

    2014-01-01

    Biometrics with error term Finger 1 Finger 2 Finger 3 Finger ...Individual Biometrics without error term Finger 1 Finger 2 Finger 3 Finger 4 Iris 1 Iris 2 (a) (b) 20 40 60 80 100 120 140 160 180 200 220 60 65 70...75 80 85 90 95 Rank C um ul at iv e R ec og ni tio n R at e (% ) CMC Curve for Individual Biometrics using SLR Finger 1 Finger 2

  16. Towards the Security Evaluation of Biometric Authentication Systems

    OpenAIRE

    El-Abed , Mohamad; Giot , Romain; Hemery , Baptiste; Rosenberger , Christophe; Schwartzmann , Jean-Jacques

    2011-01-01

    International audience; Despite the obvious advantages of biometric authentication systems over traditional security ones (based on tokens or passwords), they are vulnerable to attacks which may considerably decrease their security. In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems. It is based on the use of a database of common threats and vulnerabilities of biometric systems, and th...

  17. Multi-modal Behavioural Biometric Authentication for Mobile Devices

    OpenAIRE

    Saevanee , Hataichanok; Clarke , Nathan ,; Furnell , Steven ,

    2012-01-01

    Part 12: Authentication and Delegation; International audience; The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. This research investigated three behavi...

  18. Biometric Authentication System using Non-Linear Chaos

    OpenAIRE

    Dr.N.Krishnan; A.Senthil Arumugam,

    2010-01-01

    A major concern nowadays for any Biometric Credential Management System is its potential vulnerability to protect its information sources; i.e. protecting a genuine user’s template from both internal and external threats. These days’ biometric authentication systems face various risks. One of the most serious threats is the ulnerability of the template's database. An attacker with access to a reference template could try to impersonate a legitimate user by reconstructing the biometric sample...

  19. Behavioural Biometrics for Multi-factor Authentication in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, M.

    2012-01-01

    Roč. 8, č. 5 (2012), s. 19-24 ISSN 1801-5603 Grant - others:GA MŠk(CZ) LM2010005; GA UK(CZ) SVV-2012-264513 Institutional support: RVO:67985807 Keywords : biometric s * anatomical-physiological biometric s * behavioural biometric s * multi-factor authentication * keystroke dynamics * mouse dynamics Subject RIV: IN - Informatics, Computer Science http://www.ejbi.org/img/ejbi/2012/5/Schlenker_en.pdf

  20. Biometric Security: Alternatif Pengendalian Dalam Sistem Informasi Akuntansi Terkomputerisasi

    OpenAIRE

    Tarigan, Josua

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  1. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    OpenAIRE

    Josua Tarigan

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  2. Prospects of Biometrics at-a-Distance

    Science.gov (United States)

    2015-09-01

    face or fingerprint. For instance, light levels affect the ability of the sensor to collect accurate imagery (Pato & Millet , 2010). When conducting...accurate data on a subject given environmental or hardware restraints (Pato & Millet , 2010). These issues degrade biometric system capabilities when...where the arch pattern looks more like a hill with ridges entering from one side, moving across the finger while rising, then falling and exiting the

  3. A biometric approach to laboratory rodent identification.

    Science.gov (United States)

    Cameron, Jens; Jacobson, Christina; Nilsson, Kenneth; Rögnvaldsson, Thorsteinn

    2007-03-01

    Individual identification of laboratory rodents typically involves invasive methods, such as tattoos, ear clips, and implanted transponders. Beyond the ethical dilemmas they may present, these methods may cause pain or distress that confounds research results. The authors describe a prototype device for biometric identification of laboratory rodents that would allow researchers to identify rodents without the complications of other methods. The device, which uses the rodent's ear blood vessel pattern as the identifier, is fast, automatic, noninvasive, and painless.

  4. Device for biometric verification of maternity

    OpenAIRE

    Lalović Komlen; Milosavljević Milan; Tot Ivan; Maček Nemanja

    2015-01-01

    Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that refere...

  5. A Study on EMG-based Biometrics

    OpenAIRE

    Jin Su Kim; Sung Bum Pan

    2017-01-01

    Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG), electromyogram (EMG), and electroencephalogram (EEG). Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-ba...

  6. Biometric Methods for Application in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, Milan

    2011-01-01

    Roč. 7, č. 1 (2011), s. 37-43 ISSN 1801-5603 R&D Projects: GA MŠk(CZ) 1M06014 Institutional research plan: CEZ:AV0Z10300504 Keywords : biometrics * data security * EHR ( electronic health record ) * fingerprints * hand geometry * face recognition * iris recognition * retinal scanning * keystroke dynamics * multi-factor authentification Subject RIV: IN - Informatics, Computer Science http://www.ejbi.eu/images/2011-1/Schlenker_en.pdf

  7. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  8. Heart Electrical Actions as Biometric Indicia

    Science.gov (United States)

    Schipper, John F. (Inventor); Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor); Belousof, Eugene (Inventor)

    2013-01-01

    A method and associated system for use of statistical parameters based on peak amplitudes and/or time interval lengths and/or depolarization-repolarization vector angles and/or depolarization-repolarization vector lengths for PQRST electrical signals associated with heart waves, to identify a person. The statistical parameters, estimated to be at least 192, serve as biometric indicia, to authenticate, or to decline to authenticate, an asserted identity of a candidate person.

  9. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    OpenAIRE

    Rohit M Thanki; Ved Vyas Dwivedi; Komal Borisagar

    2016-01-01

    Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to sec...

  10. EFFECT OF THE PRODUCTION SEASON ON NUTRITIONAL VALUE AND TECHNOLOGICAL SUITABILITY OF MILK OBTAINED FROM INTENSIVE (TMR AND TRADITIONAL FEEDING SYSTEM OF COWS

    Directory of Open Access Journals (Sweden)

    Aneta Brodziak

    2012-04-01

    Full Text Available The seasonal variations in milk yield and its chemical composition arise mainly from changes in feeding of the cattle in different seasons of the year. A constant quantity of production and a similar quality of the raw material supply farms, where the feeding of cows is uniform throughout the year (TMR and PMR. The study included 1211 samples of milk obtained in the summer season (663 and in the winter season (548 from cows maintained in traditional and intensive (TMR system of production. Following parameters were determined: content of fat, protein, casein, lactose and dry matter; acidity (pH value; heat stability; rennet coagulation time; content of α-lactalbumin, β-lactoglobulin, bovine serum albumin, lactoferrin, lysozyme and fatty acid profiles. Cows fed in the TMR system produced significantly (P≤0.01 more milk and of a better chemical composition regardless of the season of production. Milk obtained from cows fed traditionally had the most profitable protein to fat ratio (0,90 and the shortest time of rennet coagulation (3:26 min. It contained significantly (P≤0.01 more whey proteins and had better fatty acid profiles for health. In addition the differences were usually larger in the summer season than in the winter season. It is possible to state that in summer season, when the animals are maintained on the pasture, milk obtained from cows fed traditionally is more suitable for processing and contains more biologically active substances. The daily milk yield and other important quality features of milk, significant interactions between season of production and system of feeding were revealed.

  11. Optical coherence tomography used for internal biometrics

    Science.gov (United States)

    Chang, Shoude; Sherif, Sherif; Mao, Youxin; Flueraru, Costel

    2007-06-01

    Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.

  12. Improving Speaker Recognition by Biometric Voice Deconstruction

    Directory of Open Access Journals (Sweden)

    Luis Miguel eMazaira-Fernández

    2015-09-01

    Full Text Available Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g. YouTube to broadcast its message. In this new scenario, classical identification methods (such fingerprints or face recognition have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. Through the present paper, a new methodology to characterize speakers will be shown. This methodology is benefiting from the advances achieved during the last years in understanding and modelling voice production. The paper hypothesizes that a gender dependent characterization of speakers combined with the use of a new set of biometric parameters extracted from the components resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract gender-dependent extended biometric parameters are given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  13. Biometric technology authentication, biocryptography, and cloud-based architecture

    CERN Document Server

    Das, Ravi

    2014-01-01

    Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed.Exploring the technological and social implications of widespread biometric use, the book considers the

  14. Biometric templates selection and update using quality measures

    Science.gov (United States)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    To deal with severe variation in recording conditions, most biometric systems acquire multiple biometric samples, at the enrolment stage, for the same person and then extract their individual biometric feature vectors and store them in the gallery in the form of biometric template(s), labelled with the person's identity. The number of samples/templates and the choice of the most appropriate templates influence the performance of the system. The desired biometric template(s) selection technique must aim to control the run time and storage requirements while improving the recognition accuracy of the biometric system. This paper is devoted to elaborating on and discussing a new two stages approach for biometric templates selection and update. This approach uses a quality-based clustering, followed by a special criterion for the selection of an ultimate set of biometric templates from the various clusters. This approach is developed to select adaptively a specific number of templates for each individual. The number of biometric templates depends mainly on the performance of each individual (i.e. gallery size should be optimised to meet the needs of each target individual). These experiments have been conducted on two face image databases and their results will demonstrate the effectiveness of proposed quality-guided approach.

  15. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    Directory of Open Access Journals (Sweden)

    İlker ŞİRİN

    2014-08-01

    Full Text Available Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation and legislation for data sharing and security exists, lack of a national data protection law brings with it security gaps.

  16. Values of some topographic parameters of optic nerve head obtained by Heidelberg retina tomograph II in volunteers and different stage primary open-angle glaucoma patients

    Directory of Open Access Journals (Sweden)

    B. Anguelov

    2013-01-01

    Full Text Available Purpose: То assess the values of the top five topographic parameters of optic nerve head (ONH obtained by Heidelberg retina tomograph (HRT II in volunteers and primary open angle glaucoma (POAG patients with different stage of perimetric changes.Methods: 73 eyes (38 volunteers at the age of 56 years ±13, 11 men and 27 women and 170 eyes (90 patients at the age of 66 years ±12, 33 men and 57 women were examined. We performed the comprehensive ophthalmic examination, standard automated perimetry and measurement of the top five topographic parameters of ONH — rim area, rim volume, cup shape measure, height variation contour и mean RNFL thickness. For the purpose of this study we used HRT II.Results: We determine the values of the investigated topographic parameters of the ONH for healthy volunteers (rim area = 1.68±0.22 mm2, rim volume = 0.44±0.07 mm3, cup shape measure = –0.2±0.06, height variation contour = 0.38±0.08 mm and mean RNFL thickness = 0.24±0.03 mm and for the patients in different perimetric glaucoma stages (early stage: rim area = 1.52±0.47 mm2, rim volume = 0.38±0.17 mm3, cup shape measure = –0.14±0.1, height variation contour = 0.36±0.09 mm and mean RNFL thickness = 0.22±0.11 mm; moderate stage: rim area = 1.21±0.46 mm2, rim volume = 0.27±0.17 mm3, cup shape measure = –0.09±0.1, height variation contour = 0.36±0.17 mm and mean RNFL thickness = 0.16±0.12 mm; severe stage: rim area = 0.97±0.01 mm2, rim volume = 0.18±0.17 mm3, cup shape measure = –0.06±0.1, height variation contour = 0.28±0.11 mm and mean RNFL thickness = 0.17±0.11 mm. Hodapp-Parrish-Anderson (H-P-A ’s staging system includes three separate levels (early, moderate and severe of glaucoma according to visual field defects. Each stage is additionally characterized by the values of the top five topographic parameters of the ONH.Conclusion: Early diagnosis, staging and follow-up of POAG are based on both function and

  17. A comparison of intraocular pressure values obtained with the Tono-Pachymeter NT530P, iCare® rebound tonometer and Goldmann applanation tonometer

    Directory of Open Access Journals (Sweden)

    N. Rampersad

    2011-12-01

    Full Text Available The purpose of this study was to compare the intraocular pressure (IOP values measured with the Tono-Pachymeter NT530P (Tonopachy™ and the iCare® rebound tonometer (iCare® with those obtained by the Goldmann applanation tonometer (GAT. The right eyes of 105 subjects aged 18 to 82 years (mean age = 29.27 ± 14.67 years were assessed with the three tonometers. Central corneal thickness (CCT was measured first using the Tonopachy™ and then IOP was measured by Tonopachy™, iCare® and GAT. The data was analyzed with descriptive statistics, paired  t-test, correlation and regression analysis. The Bland-Altman method of analysis was used to evaluate agreements between the sets of data from the three devices. The CCT values ranged from 440 µm to 606 µm (mean= 518.49 ± 33.01 µm. There was little or no correlation between CCT and IOP for any of the instruments used in this study (r = 0.29 for Tonopachy™, r = 0.22 for iCare®, r = 0.17 for GAT. The mean IOP measured with the Tonopachy™ was 14.31 ± 3.57 mmHg (range 8.7 mmHg to 31 mmHg and 16.64 ± 4.38 mmHg (range 8 mmHg to 32 mmHg using the iCare®. The mean IOP measured with the GAT was 14.79 ± 3.09 mmHg (range 8.7 mmHg to 29.7 mmHg. Using the Bland-Altman method, the upper and lower limits of agreement between the Tonopachy™ and GAT, iCare® and GAT, iCare® and Tonopachy™ were 5.1 mmHg and –4.2 mmHg, 8.6 mmHg and –4.9 mmHg, 7.5 mmHg and –2.8 mmHg respectively. In 79.1% of the eyes studied, the mean IOP difference between Tonopachy™ and GAT was less than 3 mmHg and in 20.9% of the eyes, the difference was greater than 3 mmHg. However, mean IOP differences of greater than 3 mmHg were obtained by iCare® in comparison with GAT (40% and Tonopachy™ (34.3% respectively. Findings of this study suggest that the Tonopachy™ yielded IOP readings that were consistent with those of GAT values while iCare® yielded higher IOP values compared to both GAT and Tonopachy™. (S Afr

  18. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  19. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  20. Estimating adipose tissue in the chest wall using ultrasonic and alternate 40K and biometric measurements

    International Nuclear Information System (INIS)

    Anderson, A.L.; Campbell, G.W.

    1982-01-01

    The percentage of adipose (fat) tissue in the chest wall must be known to accurately measure Pu in the human lung. Correction factors of 100% or more in x-ray detection efficiency are common. Methods using simple 40 K and biometric measurement techniques were investigated to determine the adipose content in the human chest wall. These methods predict adipose content to within 15% of the absolute ultrasonic value. These new methods are discussed and compared with conventional ultrasonic measurement techniques

  1. Multi-biometric Liveness Detection – A New Perspective

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... Basic Multi-biometric Authentication System was thought to have sealed the vulnerabilities ..... action of a real physical human being and not from a pattern ... of authentication is referred to as multi-biometric fusion, and such a ...

  2. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  3. Forensic biometrics: From two communities to one discipline

    NARCIS (Netherlands)

    Meuwly, Didier; Meuwly, Didier; Veldhuis, Raymond N.J.

    2012-01-01

    This article describes how the fields of biometrics and forensic science can contribute and benefit from each other. The aim is to foster the development of new methods and tools improving the current forensic biometric applications and allowing for the creation of new ones. The article begins with

  4. 21 CFR 1311.116 - Additional requirements for biometrics.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Additional requirements for biometrics. 1311.116 Section 1311.116 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REQUIREMENTS FOR... for biometrics. (a) If one of the factors used to authenticate to the electronic prescription...

  5. Biometrical analysis in radiobiological works of N.V. Luchnik

    International Nuclear Information System (INIS)

    Glotov, N.V.

    1996-01-01

    The contribution of the famous Russian geneticist and biophysics N.V. Luchnik into biometrical analysis of radiobiological data is discussed. His works on radiation mortality of mice (2) and the process of post-radiation repair of chromosome aberrations (10) are thoroughly observed. The conclusion of necessity to develop biometrical analysis as separate part of biometry is made

  6. Practical considerations in privacy preserving biometric face recognition algorithms

    NARCIS (Netherlands)

    Papatsimpa, Ch.; de Groot, J.; Linnartz, J.-P.

    2013-01-01

    The popularity of authentication via fingerprints, iris, face or other biometric features is growing. Hence there is an increasing need to allow a wide variety of verifying parties to have access to biometric template (or reference) data. In this paper, we discuss solutions to ensure that in a

  7. A study of dorsal vein pattern for biometric security

    African Journals Online (AJOL)

    Nafiisah

    ensure more reliable security, many biometric verification techniques have been developed .... 3.0 HA D DORSAL VEI PATTER AS A BIOMETRIC ... image for the back of the hand, and converted by a computer into a digital image that can be.

  8. Semiparametric copula models for biometric score level fusion

    NARCIS (Netherlands)

    Susyanto, N.

    2016-01-01

    In biometric recognition, biometric samples (images of faces, fingerprints, voices, gaits, etc.) of people are compared and matchers (classifiers) indicate the level of similarity between any pair of samples by a score. If we model the joint distribution of all scores by a (semiparametric) Gaussian

  9. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  10. Can visual evoked potentials be used in biometric identification?

    Science.gov (United States)

    Power, Alan J; Lalor, Edmund C; Reilly, Richard B

    2006-01-01

    Due to known differences in the anatomical structure of the visual pathways and generators in different individuals, the use of visual evoked potentials offers the possibility of an alternative to existing biometrics methods. A study based on visual evoked potentials from 13 individuals was carried out to assess the best combination of temporal, spectral and AR modeling features to realize a robust biometric. From the results it can be concluded that visual evoked potentials show considerable biometric qualities, with classification accuracies reaching a high of 86.54% and that a specific temporal and spectral combination was found to be optimal. Based on these results the visual evoked potential may be a useful tool in biometric identification when used in conjunction with more established biometric methods.

  11. Advances in biometrics for secure human authentication and recognition

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2013-01-01

    GENERAL BIOMETRICSSecurity and Reliability Assessment for Biometric Systems; Gayatri MirajkarReview of Human Recognition Based on Retinal Images; Amin DehghaniADVANCED TOPICS IN BIOMETRICSVisual Speech as Behavioral Biometric; Preety Singh, Vijay Laxmi, and Manoj Singh GaurHuman Gait Signature for Biometric Authentication; Vijay JohnHand-Based Biometric for Personal Identification Using Correlation Filter Classifier; Mohammed Saigaa , Abdallah Meraoumia , Salim Chitroub, and Ahmed BouridaneOn Deciding the Dynamic Periocular Boundary for Human Recognition; Sambit Bakshi , Pankaj Kumar Sa, and Banshidhar MajhiRetention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System; Nilanjan Dey, Bijurika Nandi, Poulami Das, Achintya Das, and Sheli Sinha ChaudhuriFacial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis; N. G. Chitaliya and A. I. TrivediCASE STUDIES AND LA...

  12. On humanitarian refugee biometrics and new forms of intervention

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    This article traces a development from UNHCR's initial use of biometrics in a few pilot projects (early/mid-2000s), to the emergence of a UNHCR policy where biometric registration is considered a "strategic decision". Next it engages key insights from current debates about 'materiality' and agentic...... capacity in combination with current debates about new forms of intervention. Finally, these insights are combined into a framework through which the last part of the article engages critically with this development of humanitarian refugee biometrics by posing the following question: how does an approach...... biometric refugee data, has affected the relationship between UNHCR, donor states, host states and refugees, the article shows how UNHCR's trialling of new biometric technologies, combined with actual and potential data-sharing practices, has advanced the technology's performance as well as its...

  13. Are Haar-like Rectangular Features for Biometric Recognition Reducible?

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2013-01-01

    Biometric recognition is still a very difficult task in real-world scenarios wherein unforeseen changes in degradations factors like noise, occlusion, blurriness and illumination can drastically affect the extracted features from the biometric signals. Very recently Haar-like rectangular features...... which have usually been used for object detection were introduced for biometric recognition resulting in systems that are robust against most of the mentioned degradations [9]. The problem with these features is that one can define many different such features for a given biometric signal...... and it is not clear whether all of these features are required for the actual recognition or not. This is exactly what we are dealing with in this paper: How can an initial set of Haar-like rectangular features, that have been used for biometric recognition, be reduced to a set of most influential features...

  14. Evaluation of the Repeatability and the Reproducibility of AL-Scan Measurements Obtained by Residents

    Directory of Open Access Journals (Sweden)

    Mehmet Kola

    2014-01-01

    Full Text Available Purpose. To assess the repeatability and reproducibility of ocular biometry and intraocular lens (IOL power measurements obtained by ophthalmology residents using an AL-Scan device, a novel optical biometer. Methods. Two ophthalmology residents were instructed regarding the AL-Scan device. Both performed ocular biometry and IOL power measurements using AL-Scan, three times on each of 128 eyes, independently of one another. Corneal keratometry readings, horizontal iris width, central corneal thickness, anterior chamber depth, pupil size, and axial length values measured by both residents were recorded together with IOL power values calculated on the basis of four different IOL calculation formulas (SRK/T, Holladay, and HofferQ. Repeatability and reproducibility of the measurements obtained were analyzed using the intraclass correlation coefficient (ICC. Results. Repeatability (ICC, 0.872-0.999 for resident 1 versus 0.905-0.999 for resident 2 and reproducibility (ICC, 0.916-0.999 were high for all biometric measurements. Repeatability (ICC, 0.981-0.983 for resident 1 versus 0.995-0.996 for resident 2 and reproducibility were also high for all IOL power measurements (ICC, 0.996 for all. Conclusions. The AL-Scan device exhibits good repeatability and reproducibility in all biometric measurements and IOL power calculations, independent of the operator concerned.

  15. Morphological Variations and Biometrics of Ear: An Aid to Personal Identification.

    Science.gov (United States)

    Verma, Pradhuman; Sandhu, Harpreet Kaur; Verma, Kanika Gupta; Goyal, Sharry; Sudan, Madhu; Ladgotra, Amit

    2016-05-01

    The morphological characteristics and dimensions of external ear vary in different human ethnic races which can be utilized in forensics for personal identification of living or deceased. To determine uniqueness of morphological and biometric variations of both ears for individualization among North East (NE) and North West (NW) subpopulation of India. The study was conducted on randomly selected 80 students, 40 from each subgroup. Nine ear parameters were recorded twice using digital Vernier's caliper by single investigator and two indices (Ear Index and Lobule Index) were calculated for both the ears. Morphological ear shapes and lobule attachment were also noted. Pearson's coefficient correlation test was performed on cross-tabulations to evaluate significant relationship between different variables. Of the total 35% free and 65% attached ear lobes were noted in both population groups. Oval ear shape was most commonly noted followed by triangular, rectangular and round in both populations. On comparing anthropometric measurements of ears in two populations it was found that except the tragus length and lobule index all other values were noted more in NW population. No statistical difference was found in ear and lobular indices of males and females although the left ear index and lobule index were found to be higher than right in both populations except in NW females where right lobule index was recorded more than left. The results obtained can be used in anthropological and forensic sciences for the inclusion and exclusion of persons for identification on the basis of ear variations.

  16. Enhanced biometric access control for mobile devices

    CSIR Research Space (South Africa)

    Brown, Dane

    2017-09-01

    Full Text Available is investigated to determine whether it is comparable to the well-established face biometric. The rest of the paper is organized as follows: Section II presents related face, iris and fused systems found in the literature. Section III discusses the construction.... This diagram is referred to throughout this section, in which the different phases of the system are explained. A. Feature Detection 1) Face: An initial region of interest (ROI) is determined by detecting the face by classifying Histogram of Gaussian (HoG...

  17. Audiovisual Speech Synchrony Measure: Application to Biometrics

    Directory of Open Access Journals (Sweden)

    Gérard Chollet

    2007-01-01

    Full Text Available Speech is a means of communication which is intrinsically bimodal: the audio signal originates from the dynamics of the articulators. This paper reviews recent works in the field of audiovisual speech, and more specifically techniques developed to measure the level of correspondence between audio and visual speech. It overviews the most common audio and visual speech front-end processing, transformations performed on audio, visual, or joint audiovisual feature spaces, and the actual measure of correspondence between audio and visual speech. Finally, the use of synchrony measure for biometric identity verification based on talking faces is experimented on the BANCA database.

  18. [Personal identification with biometric and genetic methods].

    Science.gov (United States)

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  19. Biometry, biometrics, biostatistics, bioinformatics,..., bio-X.

    Science.gov (United States)

    Molenberghs, Geert

    2005-03-01

    Recent scientific evolutions force us to rethink our profession's position on the scientific map, in relation to our neighboring professions, the ones with which we traditionally have strong collaborative links as well as the newly emerging fields, but also within our own, diverse professional group. We will show that great inspiration can be drawn from our own history, in fact from the early days of the Society. A recent inspiring example has been set by the late Rob Kempton, who died suddenly just months before he was to become President of the International Biometric Society.

  20. Biometrics and Psychometrics: Origins, Commonalities and Differences

    Directory of Open Access Journals (Sweden)

    John Gower

    2016-09-01

    Full Text Available Starting with the common origins of biometrics and psychometrics at the beginning of the twentieth century, the paper compares and contrasts subsequent developments, informed by the author's 35 years at Rothamsted Experimental Station followed by a period with the data theory group in Leiden and thereafter. Although the methods used by biometricians and psychometricians have much in common, there are important differences arising from the different fields of study. Similar differences arise wherever data are generated and may be regarded as a major driving force in the development of statistical ideas.

  1. Secure Biometric E-Voting Scheme

    Science.gov (United States)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  2. Biometric verificaton and biometric identification of a person by methods of statistical analysis of digitized iris images

    Czech Academy of Sciences Publication Activity Database

    Machala, L.; Pospíšil, Jaroslav

    40-41, - (2001), s. 155-162 ISSN 0231-9365 Institutional research plan: CEZ:AV0Z1010921 Keywords : biometric verification * biometric idntification * human eye`s iris * statistical error of type I * statistical erroer II * charasteristic iris vector Subject RIV: BH - Optics, Masers, Lasers

  3. Anti-deception: reliable EEG-based biometrics with real-time capability from the neural response of face rapid serial visual presentation.

    Science.gov (United States)

    Wu, Qunjian; Yan, Bin; Zeng, Ying; Zhang, Chi; Tong, Li

    2018-05-03

    The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior invisibility, non-clonality, and non-coercion. In order to enhance its applicability in identity authentication, a novel EEG-based identity authentication method is proposed based on self- or non-self-face rapid serial visual presentation. In contrast to previous studies that extracted EEG features from rest state or motor imagery, the designed paradigm could obtain a distinct and stable biometric trait with a lower time cost. Channel selection was applied to select specific channels for each user to enhance system portability and improve discriminability between users and imposters. Two different imposter scenarios were designed to test system security, which demonstrate the capability of anti-deception. Fifteen users and thirty imposters participated in the experiment. The mean authentication accuracy values for the two scenarios were 91.31 and 91.61%, with 6 s time cost, which illustrated the precision and real-time capability of the system. Furthermore, in order to estimate the repeatability and stability of our paradigm, another data acquisition session is conducted for each user. Using the classification models generated from the previous sessions, a mean false rejected rate of 7.27% has been achieved, which demonstrates the robustness of our paradigm. Experimental results reveal that the proposed paradigm and methods are effective for EEG-based identity authentication.

  4. Method for Improving EEG Based Emotion Recognition by Combining It with Synchronized Biometric and Eye Tracking Technologies in a Non-invasive and Low Cost Way.

    Science.gov (United States)

    López-Gil, Juan-Miguel; Virgili-Gomá, Jordi; Gil, Rosa; García, Roberto

    2016-01-01

    Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric, and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving forty-four people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals, and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self-regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA) data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self-regulation does

  5. Method for Improving EEG Based Emotion Recognition by Combining It with Synchronized Biometric and Eye Tracking Technologies in a Non-invasive and Low Cost Way

    Science.gov (United States)

    López-Gil, Juan-Miguel; Virgili-Gomá, Jordi; Gil, Rosa; Guilera, Teresa; Batalla, Iolanda; Soler-González, Jorge; García, Roberto

    2016-01-01

    Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric, and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving forty-four people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals, and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self-regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA) data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self-regulation does

  6. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  7. Privacy leakage in binary biometric systems : from gaussian to binary data

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.; Campisi, P.

    2013-01-01

    In this chapter we investigate biometric key-binding systems for i.i.d. Gaussian biometric sources. In these systems two terminals observe two correlated biometric sequences. Moreover, a secret key, which is independent of the biometric sequences, is selected at the first terminal. The first

  8. Predictive value of mutant p53 expression index obtained from nonenhanced computed tomography measurements for assessing invasiveness of ground-glass opacity nodules

    Directory of Open Access Journals (Sweden)

    Wang W

    2016-03-01

    Full Text Available Wei Wang,1 Jian Li,2 Ransheng Liu,1 Aixu Zhang,1 Zhiyong Yuan1 1Department of Radiation Oncology, Tianjin Medical University Cancer Institute and Hospital, National Clinical Research Center of Cancer, Key Laboratory of Cancer Prevention and Therapy, Tianjin, People’s Republic of China; 2Department of Radiology, Tianjin Hospital, Tianjin, People’s Republic of China Purpose: To predict p53 expression index (p53-EI based on measurements from computed tomography (CT for preoperatively assessing pathologies of nodular ground-glass opacities (nGGOs. Methods: Information of 176 cases with nGGOs on high-resolution CT that were pathologically confirmed adenocarcinoma was collected. Diameters, total volumes (TVs, maximum (MAX, average (AVG, and standard deviation (STD of CT attenuations within nGGOs were measured. p53-EI was evaluated through immunohistochemistry with Image-Pro Plus 6.0. A multiple linear stepwise regression model was established to calculate p53-EI prediction from CT measurements. Receiver-operating characteristic curve analysis was performed to compare the diagnostic performance of variables in differentiating preinvasive adenocarcinoma (PIA, minimally invasive adenocarcinoma (MIA, and invasive adenocarcinoma (IAC. Results: Diameters, TVs, MAX, AVG, and STD showed significant differences among PIAs, MIAs, and IACs (all P-values <0.001, with only MAX being incapable to differentiate MIAs from IACs (P=0.106. The mean p53-EIs of PIAs, MIAs, and IACs were 3.4±2.0, 7.2±1.9, and 9.8±2.7, with significant intergroup differences (all P-values <0.001. An equation was established by multiple linear regression as: p53-EI prediction =0.001* TVs +0.012* AVG +0.022* STD +9.345, through which p53-EI predictions were calculated to be 4.4%±1.0%, 6.8%±1.3%, and 8.5%±1.4% for PIAs, MIAs, and IACs (Kruskal–Wallis test P<0.001; Tamhane’s T2 test: PIA vs MIA P<0.001, MIA vs IAC P<0.001, respectively. Although not significant, p53-EI prediction

  9. Nutritive value of the elephant-grass obtained on different cut ages Valor nutritivo do capim-elefante obtido em diferentes idades de corte

    Directory of Open Access Journals (Sweden)

    Joanis Tilemahos Zervoudakis

    2008-09-01

    Full Text Available The present work aimed to determine the chemical composition, the parameters of the dry matter (DM and neutral detergent fiber (NDF in situ degrability, the MS (IVDMD in vitro dry matter digestibility and the content of total digestible nutrients (NDT of grass-elephant obtained in different cut ages, in rainy season. The grass-elephant was submitted to the cut at the ages of 30, 45, 60, 75, 90 and 105 days, from December to March. The samples were analyzed for dry matter (MS, crude protein (PB, ash, ether extract (EE, total carbohydrates (CT, neutral detergent fiber (NDF and acid (FDA, indigestible NDF (INDF and insoluble protein in acid detergent (ADIP. Additionally, the samples were weighted in bags of nylon, incubated in the rumen of three bovine canulated, and the residues were analyzed for DM and NDF residual. Subsequently, it were submitted to in vitro incubation with liquid ruminal and solution of acid pepsin for dry matter in vitro digestibility (IVDMDdetermination, of which values were utilized for content of total digestible nutrients (NDT estimation. The content of CP was reduced in a linear way by the advancement of the cut age, while the contents of NDF, ADF, INDF and ADIP increased. The fraction “a” of the DM was reduced and the NDF I fraction was increased with the cut age advancement. The IVDMD and TDN presented quadratic behaviors (P<0,05, in function of cut age , with maximum values of 69.00% and 57.21%, to the ages of 19.64 and 48.98 days, respectively.Objetivou-se determinar a composição químico-bromatológica, os parâmetros da degradabilidade in situ da matéria seca (MS e fibra em detergente neutro (FDN, a digestibilidade in vitro da MS (DIVMS e o teor de nutrientes digestíveis totais (NDT do capim-elefante obtido em diferentes idades de corte, na época das águas. A forrageira foi submetida ao corte nas idades de 30, 45, 60, 75, 90 e 105 dias, de dezembro a março. As amostras foram analisadas para matéria seca

  10. PREDICTIVE ACCURACY OF TRANSCEREBELLAR DIAMETER IN COMPARISON WITH OTHER FOETAL BIOMETRIC PARAMETERS FOR GESTATIONAL AGE ESTIMATION AMONG PREGNANT NIGERIAN WOMEN.

    Science.gov (United States)

    Adeyekun, A A; Orji, M O

    2014-04-01

    To compare the predictive accuracy of foetal trans-cerebellar diameter (TCD) with those of other biometric parameters in the estimation of gestational age (GA). A cross-sectional study. The University of Benin Teaching Hospital, Nigeria. Four hundred and fifty healthy singleton pregnant women, between 14-42 weeks gestation. Trans-cerebellar diameter (TCD), biparietal diameter (BPD), femur length (FL), abdominal circumference (AC) values across the gestational age range studied. Correlation and predictive values of TCD compared to those of other biometric parameters. The range of values for TCD was 11.9 - 59.7mm (mean = 34.2 ± 14.1mm). TCD correlated more significantly with menstrual age compared with other biometric parameters (r = 0.984, p = 0.000). TCD had a higher predictive accuracy of 96.9% ± 12 days), BPD (93.8% ± 14.1 days). AC (92.7% ± 15.3 days). TCD has a stronger predictive accuracy for gestational age compared to other routinely used foetal biometric parameters among Nigerian Africans.

  11. Distinct iris gene expression profiles of primary angle closure glaucoma and primary open angle glaucoma and their interaction with ocular biometric parameters.

    Science.gov (United States)

    Seet, Li-Fong; Narayanaswamy, Arun; Finger, Sharon N; Htoon, Hla M; Nongpiur, Monisha E; Toh, Li Zhen; Ho, Henrietta; Perera, Shamira A; Wong, Tina T

    2016-11-01

    This study aimed to evaluate differences in iris gene expression profiles between primary angle closure glaucoma (PACG) and primary open angle glaucoma (POAG) and their interaction with biometric characteristics. Prospective study. Thirty-five subjects with PACG and thirty-three subjects with POAG who required trabeculectomy were enrolled at the Singapore National Eye Centre, Singapore. Iris specimens, obtained by iridectomy, were analysed by real-time polymerase chain reaction for expression of type I collagen, vascular endothelial growth factor (VEGF)-A, -B and -C, as well as VEGF receptors (VEGFRs) 1 and 2. Anterior segment optical coherence tomography (ASOCT) imaging for biometric parameters, including anterior chamber depth (ACD), anterior chamber volume (ACV) and lens vault (LV), was also performed pre-operatively. Relative mRNA levels between PACG and POAG irises, biometric measurements, discriminant analyses using genes and biometric parameters. COL1A1, VEGFB, VEGFC and VEGFR2 mRNA expression was higher in PACG compared to POAG irises. LV, ACD and ACV were significantly different between the two subgroups. Discriminant analyses based on gene expression, biometric parameters or a combination of both gene expression and biometrics (LV and ACV), correctly classified 94.1%, 85.3% and 94.1% of the original PACG and POAG cases, respectively. The discriminant function combining genes and biometrics demonstrated the highest accuracy in cross-validated classification of the two glaucoma subtypes. Distinct iris gene expression supports the pathophysiological differences that exist between PACG and POAG. Biometric parameters can combine with iris gene expression to more accurately define PACG from POAG. © 2016 The Authors. Clinical & Experimental Ophthalmology published by John Wiley & Sons Australia, Ltd on behalf of Royal Australian and New Zealand College of Ophthalmologists.

  12. Device for biometric verification of maternity

    Directory of Open Access Journals (Sweden)

    Lalović Komlen

    2015-01-01

    Full Text Available Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templates with a goal to provide a 100% guarantee maternity for each new born child. Scanning the fingerprints of both mother and the child simultaneously, at moment of birth, and pairing them with unique ID reference removes potential fears occurring from hospital negligence to malicious activities, while the data encryption raises the whole process to the highest level of security and confidentiality. The main contribution of the device that removes the fear that almost every mother has in this period as it provides an answer to the question: “Is this my baby?” with a 100% guarantee “It’s certainly yours!”

  13. Improving Speaker Recognition by Biometric Voice Deconstruction

    Science.gov (United States)

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions. PMID:26442245

  14. Relationship Between Adult Renal Dimensions and Biometric ...

    African Journals Online (AJOL)

    We measured renal dimensions sonographically and correlated the values obtained with some anthropometric parameters in order to identify the best estimate of renal size in a clinical setting. The renal dimensions of 200 adult subjects referred for abdomino-pelvic scan at University of Nigeria Teaching Hospital, Enugu ...

  15. High Resolution Ultrasonic Method for 3D Fingerprint Representation in Biometrics

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Y.; Maeva, E. Y.; Severin, F. M.

    Biometrics is an important field which studies different possible ways of personal identification. Among a number of existing biometric techniques fingerprint recognition stands alone - because very large database of fingerprints has already been acquired. Also, fingerprints are an important evidence that can be collected at a crime scene. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. Ultrasonic method of fingerprint imaging was originally introduced over a decade as the mapping of the reflection coefficient at the interface between the finger and a covering plate and has shown very good reliability and free from imperfections of previous two methods. This work introduces a newer development of the ultrasonic fingerprint imaging, focusing on the imaging of the internal structures of fingerprints (including sweat pores) with raw acoustic resolution of about 500 dpi (0.05 mm) using a scanning acoustic microscope to obtain images and acoustic data in the form of 3D data array. C-scans from different depths inside the fingerprint area of fingers of several volunteers were obtained and showed good contrast of ridges-and-valleys patterns and practically exact correspondence to the standard ink-and-paper prints of the same areas. Important feature reveled on the acoustic images was the clear appearance of the sweat pores, which could provide additional means of identification.

  16. Reference charts of fetal biometric parameters in 31,476 Brazilian singleton pregnancies.

    Science.gov (United States)

    Araujo Júnior, Edward; Martins Santana, Eduardo Félix; Martins, Wellington P; Júnior, Julio Elito; Ruano, Rodrigo; Pires, Claudio Rodrigues; Filho, Sebastião Marques Zanforlin

    2014-07-01

    The purpose of this study was to establish reference charts of fetal biometric parameters measured by 2-dimensional sonography in a large Brazilian population. A cross-sectional retrospective study was conducted including 31,476 low-risk singleton pregnancies between 18 and 38 weeks' gestation. The following fetal parameters were measured: biparietal diameter, head circumference, abdominal circumference, femur length, and estimated fetal weight. To assess the correlation between the fetal biometric parameters and gestational age, polynomial regression models were created, with adjustments made by the determination coefficient (R(2)). The means ± SDs of the biparietal diameter, head circumference, abdominal circumference, femur length, and estimated fetal weight measurements at 18 and 38 weeks were 4.2 ± 2.34 and 9.1 ± 4.0 cm, 15.3 ± 7.56 and 32.3 ± 11.75 cm, 13.3 ± 10.42 and 33.4 ± 20.06 cm, 2.8 ± 2.17 and 7.2 ± 3.58 cm, and 256.34 ± 34.03 and 3169.55 ± 416.93 g, respectively. Strong correlations were observed between all fetal biometric parameters and gestational age, best represented by second-degree equations, with R(2) values of 0.95, 0.96, 0.95, 0.95, and 0.95 for biparietal diameter, head circumference, abdominal circumference, femur length, and estimated fetal weight. Fetal biometric parameters were determined for a large Brazilian population, and they may serve as reference values in cases with a high risk of intrauterine growth disorders. © 2014 by the American Institute of Ultrasound in Medicine.

  17. A SYSTEMATIC REVIEW AND META-ANALYSIS COMPARING CARDIOPULMONARY EXERCISE TEST VALUES OBTAINED FROM THE ARM CYCLE AND THE LEG CYCLE RESPECTIVELY IN HEALTHY ADULTS

    DEFF Research Database (Denmark)

    Larsen, Rasmus Tolstrup; Christensen, Jan; Tang, Lars Hermann

    2016-01-01

    a systematic review and meta-analysis of the difference in VO2max achieved by AC compared to LC in healthy adults and to explore factors that may be predictive of this difference. METHODS: MEDLINE, EMBASE, CINAHL, and PEDro were searched in April 2015. The differences in VO2max (ACLCdiff) were pooled across....../min with a mean ACLCratio of 0.70. The ACLCdiff was lower in studies with higher mean age and lower aerobic capacity. CONCLUSION: There is linear association between the AC and LC values in healthy adults. The AC values were on average 70% of the LC values. The magnitude of this difference appeared to be reduced...

  18. The value of radiotherapy in colorectal and anal carcinomas, judged on the basis of radiation results obtained in Wuerzburg between 1977 and 1985

    International Nuclear Information System (INIS)

    Aydin, H.

    1987-01-01

    Investigations were carried out into the effectiveness of radiotherapy in colorectal and anal carcinomas as well as metastases formed by those tumours. The relevance of changes in CT findings and CEA values is discussed in detail. (MBC) [de

  19. Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature

    Directory of Open Access Journals (Sweden)

    Frantisek Hortai

    2018-01-01

    Full Text Available New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features for a reasonable price. Even when the compromised solution is found it has to fulfill the given technology standards. For the listed reasons the paper argues one of the most natural biometric authentication method the dynamic biometric signature and lists its related standards. The paper also includes measurement evaluation which solves the independence between the person’s signature and device on which it was created

  20. [Study of personal best value of peak expiratory flow in patients with asthma--comparison of the highest value of daily PEF under good control and the highest value of daily PEF obtained after using repeated inhaled beta2-agonist during high-dose inhaled steroid treatment].

    Science.gov (United States)

    Watanabe, Naoto; Makino, Sohei; Kihara, Norio; Fukuda, Takeshi

    2008-12-01

    In the guideline for asthma management, it is important to find the personal best value of peak expiratory flow (best PEF). Recently, we have substituted the highest value of PEF in daily life under good control (daily highest PEF) for the best PEF. In the present study, we considered whether the daily highest PEF could be used as the best PEF or not. Subjects were 30 asthmatics who were well controlled but whose baseline PEF values were less than 80 percent of predicted values. We compared the daily highest PEF and the highest of PEF obtained after repeated inhaled beta2-agonist (salbutamol MDI every 20 minutes three times). All subjects then received 1600 microg/day of beclomethasone dipropionate (BDP) for 4 to 8 weeks. We studied the effect of high-dose inhaled steroid treatment on each PEF value and compared the daily highest PEF and the highest PEF obtained after using repeated salbutamol MDI during high dose inhaled steroid therapy on the examination day again. The baseline PEF, daily highest PEF and the highest PEF obtained after salbutamol MDI were significantly less than the each values obtained after high-dose BDP. The best PEF value of them was the value obtained after repeated salbutamol MDI during high dose BDP. We suggest that the daily highest PEF under good control is not a substitute for best PEF because it changes according to the degree of improvement of airway inflammation. We recommend that a course of high dose inhaled steroid is effective in finding the best value of PEF for each individual with moderate asthma.

  1. Haar-like Rectangular Features for Biometric Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rashidi, Maryam

    2013-01-01

    Developing a reliable, fast, and robust biometric recognition system is still a challenging task. This is because the inputs to these systems can be noisy, occluded, poorly illuminated, rotated, and of very low-resolutions. This paper proposes a probabilistic classifier using Haar-like features......, which mostly have been used for detection, for biometric recognition. The proposed system has been tested for three different biometrics: ear, iris, and hand vein patterns and it is shown that it is robust against most of the mentioned degradations and it outperforms state-of-the-art systems...

  2. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity.../or characteristics of some thing ? This thing can be anything, however in the context of this discussion, this thing could be a person, a network device, or even an identity authentication device itself ? This act or process of verifying these attributes could...

  3. Developing a multimodal biometric authentication system using soft computing methods.

    Science.gov (United States)

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  4. The biometric-based module of smart grid system

    Science.gov (United States)

    Engel, E.; Kovalev, I. V.; Ermoshkina, A.

    2015-10-01

    Within Smart Grid concept the flexible biometric-based module base on Principal Component Analysis (PCA) and selective Neural Network is developed. The formation of the selective Neural Network the biometric-based module uses the method which includes three main stages: preliminary processing of the image, face localization and face recognition. Experiments on the Yale face database show that (i) selective Neural Network exhibits promising classification capability for face detection, recognition problems; and (ii) the proposed biometric-based module achieves near real-time face detection, recognition speed and the competitive performance, as compared to some existing subspaces-based methods.

  5. BIOMETRIC PARAMETERS OF FIELD GROWN SESAME INFLUENCED BY ARBUSCULAR MYCORRHIZAL INOCULATION, ROCK PHOSPHATE FERTILIZATION AND IRRIGATION

    Directory of Open Access Journals (Sweden)

    V.S. Harikumar

    2017-08-01

    Full Text Available The aim of the study was to assess the effect of inoculation with arbuscular mycorrhizal fungi (AMF and rock phosphate (RP fertilization on biometric parameters and mycorrhizal colonization of field grown sesame under rainfed and irrigated conditions. Inoculation of AMF Funneliformis dimorphicus improved the biometric parameters of the crop such as leaf area (LA, leaf area index (LAI, specific leaf weight (SLW, net assimilation rate (NAR, oil index (OI as well as mycorrhizal colonization (%F in roots. Mycorrhizal inoculation however, did not give any positive response on harvest index (HI. LA, LAI and OI and %F showed a general increment in treatments of no added P (P0, while the other parameters such as SLW and NAR were improved by the application of RP at half the recommended dose (P50. HI did not respond to RP fertilization. Most of the parameters (LA, LAI, NAR, %F showed higher values under rainfed condition than irrigated condition whereas, SLW, HI and OI improved significantly under irrigated condition. Results indicated that the inoculation of AMF to field grown sesame can compensate for 50% of the recommended P fertilizer under a need based irrigation schedule, without affecting the biometric parameters.

  6. Seasonal variations in red deer (Cervus elaphus) hematology related to antler growth and biometrics measurements.

    Science.gov (United States)

    Gaspar-López, Enrique; Landete-Castillejos, Tomás; Estevez, Jose Antonio; Ceacero, Francisco; Gallego, Laureano; García, Andrés Jose

    2011-04-01

    The aim of the study was to relate seasonal hematology changes with the rest of physiological variations suffered by red deer, such as antler and biometrics cycle, and to assess the relationship between hematology and the effort performed in antler development. Blood samples were taken from 21 male red deer every 4 weeks during 18 months. Samples were analyzed for the main hematological parameters. Simultaneously, biometrics measurements were taken, such as antler length, body weight, body condition score, testicular diameter (TD), and thoracic and neck girth. All the blood cell types (erythrocytes, leukocytes, and platelets) showed seasonal variations, increasing as antler cleaning approached, as did hematocrit and hemoglobin. The final size of antlers was negatively related to leukocyte count, nonlymphoid leukocyte count, red cell distribution width, mean corpuscular hemoglobin, mean platelet volume, and TD, whereas it was positively related to body condition during antler growth. Huge seasonal variations in some hematological values have been found to be related to changes in antler and biometrics measurements. Since these variations are even greater than the caused by deer handling, they should be taken into account when evaluating hematology in deer populations. Copyright © 2011 Wiley-Liss, Inc., A Wiley Company.

  7. Nasal biometrics and nasofacial proportion in Hausas and Yorubas using Akinlolu-Raji image-processing algorithm

    Directory of Open Access Journals (Sweden)

    Akinlolu Abdulazeez Adelaja

    2016-01-01

    Full Text Available Background: Nasal biometrics is vital to facial analyses. This study evaluated nasal biometrics in Hausas and Yorubas of Nigeria. Materials and Methods: Hausas (150 males and 150 females, aged 18-36 years and Yorubas (150 males and 150 females, aged 15-33 years were selected as subjects with informed consents and when established as Hausas or Yorubas by parents and grandparents. Height, body weight and cephalometric parameters (evaluated on three-dimensional facial photographs were measured on subjects. The novel Akinlolu-Raji image-processing algorithm was developed using modified row method of computer programming. Nasal root width, nose height, nose width, nasal bridge length, nasal tip protrusion, nasal index, facial width and nasofacial proportion computed from readings of Akinlolu-Raji image-processing algorithm were analyzed using Z-test (P ≤ 0.05 of 2010 Microsoft Excel statistical software. Results: Computed nasal biometrics showed statistically nonsignificant higher values (P > 0.05 in males of Hausas (100% and Yorubas (80% compared to their female counterparts. In addition, results showed nonsignificant higher values (P > 0.05 in 80% of nasal biometrics in Hausas compared to Yorubas in both sexes. Based on classifications of nose types from nasal index, Hausas have the platyrrhine nose type while Yorubas have the mesorrhine nose type. Nasofacial proportion was lower in Hausa males compared to females, but of same values in Yoruba males and females. In addition, nasofacial proportions were lower in Hausas compared to Yorubas in both sexes. Conclusions: Sexual dimorphism of nasal biometrics exists between sexes of Hausas and Yorubas. Furthermore, Hausas and Yorubas are of similar nasal sizes.

  8. [Are biometric parameters of anterior segment of the eyeball influenced by type 2 diabetes?].

    Science.gov (United States)

    Dmuchowska, Diana A; Kraśnicki, Paweł; Mariak, Zofia

    2012-01-01

    To answer the question whether biometric parameters of anterior segment of the eyeball are influenced by type 2 diabetes, at the stage when the lens is still transparent, so before cataract development. Fifty subjects (28 women and 22 men), at the age of 63.3 +/- 11.3 years were enrolled in this prospective study. They were divided in 2 groups: patients with type 2 diabetes (24 subjects) and analogous age group in good general health - control group (26 subjects). None of the tested individuals presented lens opacities. The planned biometric measurements included: central corneal thickness, anterior chamber depth and axial lens thickness. The data were statistically analyzed. There was no difference between the groups of both proven and potential parameters that are associated with biometric measurements of the anterior segment of the eyeball, such as: gender, age, smoking and axial length of the eye. In diabetic patients, as opposed to the subjects in the control group, statistically significantly increased lens thickness (4.78 +/- 0.50 mm vs 4.43 +/- 0.50; p = 0.016), central corneal thickness (561.5 +/- 31.6 microm vs 542.2 +/- 35.2; p = 0.047), and the tendency for shallow anterior chamber (3.06 +/- 0.40 mm vs 3.22 +/- 0.38; p = 0.159), were observed. In patients with diabetes there was no association of the biometric parameters values with the duration of diabetes and presence of diabetic retinopathy. Type 2 diabetes contributes to increased axial corneal and lens thickness at the stage when the lens is transparent, albeit it does not significantly affect anterior chamber depth.

  9. Multimodal biometric method that combines veins, prints, and shape of a finger

    Science.gov (United States)

    Kang, Byung Jun; Park, Kang Ryoung; Yoo, Jang-Hee; Kim, Jeong Nyeo

    2011-01-01

    Multimodal biometrics provides high recognition accuracy and population coverage by using various biometric features. A single finger contains finger veins, fingerprints, and finger geometry features; by using multimodal biometrics, information on these multiple features can be simultaneously obtained in a short time and their fusion can outperform the use of a single feature. This paper proposes a new finger recognition method based on the score-level fusion of finger veins, fingerprints, and finger geometry features. This research is novel in the following four ways. First, the performances of the finger-vein and fingerprint recognition are improved by using a method based on a local derivative pattern. Second, the accuracy of the finger geometry recognition is greatly increased by combining a Fourier descriptor with principal component analysis. Third, a fuzzy score normalization method is introduced; its performance is better than the conventional Z-score normalization method. Fourth, finger-vein, fingerprint, and finger geometry recognitions are combined by using three support vector machines and a weighted SUM rule. Experimental results showed that the equal error rate of the proposed method was 0.254%, which was lower than those of the other methods.

  10. Correlating Corneal Biomechanics and Ocular Biometric Properties with Lamina Cribrosa Measurements in Healthy Subjects.

    Science.gov (United States)

    Pérez Bartolomé, Francisco; Martínez de la Casa, Jose María; Camacho Bosca, Irene; Sáenz-Francés, Federico; Aguilar Munoa, Soledad; Martín Juan, Alberto; Garcia-Feijoo, Julian

    2018-01-01

    To examine interrelations between corneal biomechanics, ocular biometric variables and optic disc size (ODS), lamina cribosa depth (LCD) or thickness (LCT) in a healthy population. In a cross-sectional case-control study, the following measurements were made in 81 eyes of 81 participants: axial length, anterior chamber depth, lens thickness, and central corneal thickness using the optical biometer Lenstar LS900; and corneal hysteresis (CH), corneal resistance factor (CRF), Goldman-correlated intraocular pressure (IOPg), and corneal-compensated IOP (IOPcc) using the Ocular Response Analyzer. Serial horizontal enhanced depth imaging optical coherence tomography (EDI OCT) B-scans of the optic nerve head were obtained in each participant. Mean ODS, mean LCD, and mean LCT were measured in 11 equally spaced horizontal B-scans, excluding the LC insertion area under Bruch's membrane and scleral rim. LCD was measured in 74 of 81 eyes (91.36%); LCT in 60/81 (75.3%); ODS in 81/81 (100%). CRF was poorly, but significantly, correlated with LCT (Pearson's R = 0.264; P = 0.045). IOPcc, IOPg, CH, and ocular biometrics variables were poorly (non-significantly) correlated with LCD, LCT, and ODS. CRF was poorly but directly correlated with LCT. No association was detected between CH or ocular biometric variables and ODS, LCD, or LCT.

  11. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  12. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  13. Bioinformatic and Biometric Methods in Plant Morphology

    Directory of Open Access Journals (Sweden)

    Surangi W. Punyasena

    2014-08-01

    Full Text Available Recent advances in microscopy, imaging, and data analyses have permitted both the greater application of quantitative methods and the collection of large data sets that can be used to investigate plant morphology. This special issue, the first for Applications in Plant Sciences, presents a collection of papers highlighting recent methods in the quantitative study of plant form. These emerging biometric and bioinformatic approaches to plant sciences are critical for better understanding how morphology relates to ecology, physiology, genotype, and evolutionary and phylogenetic history. From microscopic pollen grains and charcoal particles, to macroscopic leaves and whole root systems, the methods presented include automated classification and identification, geometric morphometrics, and skeleton networks, as well as tests of the limits of human assessment. All demonstrate a clear need for these computational and morphometric approaches in order to increase the consistency, objectivity, and throughput of plant morphological studies.

  14. Value management : functional expression of the need and functional performance specification : requirements for expressing and validating the need to be satisfied within the process of purchasing or obtaining a product

    CERN Document Server

    Association Française de Normalisation. Paris

    2013-01-01

    Value management : functional expression of the need and functional performance specification : requirements for expressing and validating the need to be satisfied within the process of purchasing or obtaining a product

  15. Ethical considerations in implementing a biometric co-enrol- ment ...

    African Journals Online (AJOL)

    The biometrics co-enrolment prevention system (BCEPS) is a novel ... capture participant's identification details in real time was approved by the SAMRC Ethics Committee. ... for guidelines and standard operating procedures (SOPs) for the.

  16. Joint sparse representation for robust multimodal biometrics recognition.

    Science.gov (United States)

    Shekhar, Sumit; Patel, Vishal M; Nasrabadi, Nasser M; Chellappa, Rama

    2014-01-01

    Traditional biometric recognition systems rely on a single biometric signature for authentication. While the advantage of using multiple sources of information for establishing the identity has been widely recognized, computational models for multimodal biometrics recognition have only recently received attention. We propose a multimodal sparse representation method, which represents the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Thus, we simultaneously take into account correlations as well as coupling information among biometric modalities. A multimodal quality measure is also proposed to weigh each modality as it gets fused. Furthermore, we also kernelize the algorithm to handle nonlinearity in data. The optimization problem is solved using an efficient alternative direction method. Various experiments show that the proposed method compares favorably with competing fusion-based methods.

  17. Factors impacting on the adoption of biometric technology by South ...

    African Journals Online (AJOL)

    and is limited to the use of biometric technology within the financial services sector. Within this ..... reality for the banking sector is that these systems are not as easily replaceable as the idea may sound. ... the respondents' mixed perceptions.

  18. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  19. A cancelable biometric scheme based on multi-lead ECGs.

    Science.gov (United States)

    Peng-Tzu Chen; Shun-Chi Wu; Jui-Hsuan Hsieh

    2017-07-01

    Biometric technologies offer great advantages over other recognition methods, but there are concerns that they may compromise the privacy of individuals. In this paper, an electrocardiogram (ECG)-based cancelable biometric scheme is proposed to relieve such concerns. In this scheme, distinct biometric templates for a given beat bundle are constructed via "subspace collapsing." To determine the identity of any unknown beat bundle, the multiple signal classification (MUSIC) algorithm, incorporating a "suppression and poll" strategy, is adopted. Unlike the existing cancelable biometric schemes, knowledge of the distortion transform is not required for recognition. Experiments with real ECGs from 285 subjects are presented to illustrate the efficacy of the proposed scheme. The best recognition rate of 97.58 % was achieved under the test condition N train = 10 and N test = 10.

  20. Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers.

    Science.gov (United States)

    Sun, Yunlian; Zhang, Man; Sun, Zhenan; Tan, Tieniu

    2018-02-01

    Biometrics is the technique of automatically recognizing individuals based on their biological or behavioral characteristics. Various biometric traits have been introduced and widely investigated, including fingerprint, iris, face, voice, palmprint, gait and so forth. Apart from identity, biometric data may convey various other personal information, covering affect, age, gender, race, accent, handedness, height, weight, etc. Among these, analysis of demographics (age, gender, and race) has received tremendous attention owing to its wide real-world applications, with significant efforts devoted and great progress achieved. This survey first presents biometric demographic analysis from the standpoint of human perception, then provides a comprehensive overview of state-of-the-art advances in automated estimation from both academia and industry. Despite these advances, a number of challenging issues continue to inhibit its full potential. We second discuss these open problems, and finally provide an outlook into the future of this very active field of research by sharing some promising opportunities.

  1. Attempt to validate breakpoint MIC values estimated from pharmacokinetic data obtained during oxolinic acid therapy of winter ulcer disease in Atlantic salmon ( Salmo salar )

    DEFF Research Database (Denmark)

    Coyne, R.; Bergh, Ø.; Samuelsen, O.

    2004-01-01

    Concentrations of oxolinic acid (OXA) were measured in the plasma, muscle, liver, and kidney of 48 Atlantic salmons (Salmo salar) 1 day after the end of an oral administration. OXA was administered over a period of 13 days to control an outbreak of winter ulcer disease in a commercial marine farm...... administration of OXA. A numerical description of the concentration of the antimicrobial agent achieved in therapy is necessary to determine the resistance or sensitivity of the bacteria involved in the infection. The degree of fish-to-fish variation in the concentrations of OXA, both within the healthy fish...... a useful parameter for describing the concentrations of agents achieved during therapy. The plasma data from this investigation were used to estimate clinically relevant breakpoint minimum inhibitory concentration (MIC) values. The validity of these breakpoint values was discussed with reference...

  2. Primary production of phytoplankton of Chascomus Pond (Prov. Buenos Aires (Argentina)). Critical evaluation of photosynthesis values obtained by O2 and 14 C methods

    International Nuclear Information System (INIS)

    Romero, M.C.; Arenas, P.M.

    1989-01-01

    The primary production of the phytoplankton of Chascomus pound was estimated with the dissolved oxygen and the assimilation of 14 CO 2 techniques, the laboratory, at light saturation. The bicarbonate consumptions by the phytoplankton was corrected by the excretion values, anaplerotic uptake of CO 2 by heterotrophic bacteria and for adsorption on suspended material. Gross production primary values fluctuated within 619,5 and 168,9 mg C.m -3 . h -1 , the net primary production within 564,8 (summer) and 93,8 (winter) mg C.m -3 . h -1 . Steemann Nielsen's technique subestimated the primary production in an average of the 21%; during the months of December, January and February those differences were only of the 8,6 and 1% respectively, implying that carrying out the respective corrections, both methods equalize themselves. (author)

  3. Method for modeling post-mortem biometric 3D fingerprints

    Science.gov (United States)

    Rajeev, Srijith; Shreyas, Kamath K. M.; Agaian, Sos S.

    2016-05-01

    Despite the advancements of fingerprint recognition in 2-D and 3-D domain, authenticating deformed/post-mortem fingerprints continue to be an important challenge. Prior cleansing and reconditioning of the deceased finger is required before acquisition of the fingerprint. The victim's finger needs to be precisely and carefully operated by a medium to record the fingerprint impression. This process may damage the structure of the finger, which subsequently leads to higher false rejection rates. This paper proposes a non-invasive method to perform 3-D deformed/post-mortem finger modeling, which produces a 2-D rolled equivalent fingerprint for automated verification. The presented novel modeling method involves masking, filtering, and unrolling. Computer simulations were conducted on finger models with different depth variations obtained from Flashscan3D LLC. Results illustrate that the modeling scheme provides a viable 2-D fingerprint of deformed models for automated verification. The quality and adaptability of the obtained unrolled 2-D fingerprints were analyzed using NIST fingerprint software. Eventually, the presented method could be extended to other biometric traits such as palm, foot, tongue etc. for security and administrative applications.

  4. A systematic review and meta-analysis comparing cardiopulmonary exercise test values obtained from the arm cycle and the leg cycle respectively in healthy adults

    DEFF Research Database (Denmark)

    Larsen, Rasmus Tolstrup; Christensen, Jan; Tang, Lars Hermann

    2016-01-01

    INTRODUCTION: The cardiopulmonary exercise test (CPET) assesses maximal oxygen uptake (VO2max) and is commonly performed on a leg cycle ergometer (LC). However, some individuals would rather perform the CPET on an arm cycle ergometer (AC). OBJECTIVE: The objectives of this study were to undertake...... in studies on older and less active populations. LEVEL OF EVIDENCE: 3a....... a systematic review and meta-analysis of the difference in VO2max achieved by AC compared to LC in healthy adults and to explore factors that may be predictive of this difference. METHODS: MEDLINE, EMBASE, CINAHL, and PEDro were searched in April 2015. The differences in VO2max (ACLCdiff) were pooled across....../min with a mean ACLCratio of 0.70. The ACLCdiff was lower in studies with higher mean age and lower aerobic capacity. CONCLUSION: There is linear association between the AC and LC values in healthy adults. The AC values were on average 70% of the LC values. The magnitude of this difference appeared to be reduced...

  5. A Systematic Review and Meta-analysis Comparing Cardiopulmonary Exercise Test Values Obtained From the Arm Cycle and the Leg Cycle Respectively in Healthy Adults

    DEFF Research Database (Denmark)

    Larsen, Rasmus Tolstrup; Christensen, Jan; Tang, Lars Hermann

    2016-01-01

    INTRODUCTION: The cardiopulmonary exercise test (CPET) assesses maximal oxygen uptake (VO2max) and is commonly performed on a leg cycle ergometer (LC). However, some individuals would rather perform the CPET on an arm cycle ergometer (AC). OBJECTIVE: The objectives of this study were to undertake...... in studies on older and less active populations. LEVEL OF EVIDENCE: 3a....... a systematic review and meta-analysis of the difference in VO2max achieved by AC compared to LC in healthy adults and to explore factors that may be predictive of this difference. METHODS: MEDLINE, EMBASE, CINAHL, and PEDro were searched in April 2015. The differences in VO2max (ACLCdiff) were pooled across....../min with a mean ACLCratio of 0.70. The ACLCdiff was lower in studies with higher mean age and lower aerobic capacity. CONCLUSION: There is linear association between the AC and LC values in healthy adults. The AC values were on average 70% of the LC values. The magnitude of this difference appeared to be reduced...

  6. Enrollment Time as a Requirement for Biometric Hand Recognition Systems

    OpenAIRE

    Carvalho, João; Sá, Vítor; Tenreiro de Magalhães, Sérgio; Santos, Henrique

    2015-01-01

    Biometric systems are increasingly being used as a means for authentication to provide system security in modern technologies. The performance of a biometric system depends on the accuracy, the processing speed, the template size, and the time necessary for enrollment. While much research has focused on the first three factors, enrollment time has not received as much attention. In this work, we present the findings of our research focused upon studying user’s behavior when enrolling in...

  7. Biometrics and smart card based applications for nuclear industry

    International Nuclear Information System (INIS)

    Nishanth Reddy, J.; Dheeraj Reddy, J.; Narender Reddy, J.

    2004-01-01

    Biometrics has emerged as a convenient, foolproof and well-accepted technology for identification around the globe. Nucleonix has developed innovative solutions based on finger scan biometrics for various industries. This paper closely looks into the application areas for the nuclear industry and how it will benefit this industry, in terms of identification, access control, security of PCs and applications, attendance, machinery usage control and other custom applications. (author)

  8. Direct Problems and Inverse Problems in Biometric Systems

    OpenAIRE

    Mihailescu Marius Iulian

    2013-01-01

    The article purpose is to describe the two sides of biometrics technologies, direct problems and inverse problems. The advance that we face today in field of Information Technology makes Information Security an inseparable part. The authentication has a huge role when we deal about security. The problems that can appear in implementing and developing biometrics systems is raising many problems, and one of the goal of this article is to focus on direct and inverse problems which is a new and c...

  9. Evaluation of biometric data and theire usage in authentication system

    OpenAIRE

    Peroutka, Tomáš

    2009-01-01

    The goal of this thesis is to introduce the main aspects of biometry, explain particular methods of biometric analysis and determine suitable methods for using in particular authentication system by multicriterial analysis. Our criteria for method analysis are: uniqueness, universality, public acceptability and policy consideration, resistence of fraud, accuracy, speed of comparison, template storage requirements, constancy of human biometric characters. The thesis deals with the effective us...

  10. An Efficient Human Identification through MultiModal Biometric System

    Directory of Open Access Journals (Sweden)

    K. Meena

    Full Text Available ABSTRACT Human identification is essential for proper functioning of society. Human identification through multimodal biometrics is becoming an emerging trend, and one of the reasons is to improve recognition accuracy. Unimodal biometric systems are affected by various problemssuch as noisy sensor data,non-universality, lack of individuality, lack of invariant representation and susceptibility to circumvention.A unimodal system has limited accuracy. Hence, Multimodal biometric systems by combining more than one biometric feature in different levels are proposed in order to enhance the performance of the system. A supervisor module combines the different opinions or decisions delivered by each subsystem and then make a final decision. In this paper, a multimodal biometrics authentication is proposed by combining face, iris and finger features. Biometric features are extracted by Local Derivative Ternary Pattern (LDTP in Contourlet domain and an extensive evaluation of LDTP is done using Support Vector Machine and Nearest Neighborhood Classifier. The experimental evaluations are performed on a public dataset demonstrating the accuracy of the proposed system compared with the existing systems. It is observed that, the combination of face, fingerprint and iris gives better performance in terms of accuracy, False Acceptance Rate, False Rejection Rate with minimum computation time.

  11. The biometric recognition on contactless multi-spectrum finger images

    Science.gov (United States)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  12. Biometric Attendance and Big Data Analysis for Optimizing Work Processes.

    Science.gov (United States)

    Verma, Neetu; Xavier, Teenu; Agrawal, Deepak

    2016-01-01

    Although biometric attendance management is available, large healthcare organizations have difficulty in big data analysis for optimization of work processes. The aim of this project was to assess the implementation of a biometric attendance system and its utility following big data analysis. In this prospective study the implementation of biometric system was evaluated over 3 month period at our institution. Software integration with other existing systems for data analysis was also evaluated. Implementation of the biometric system could be successfully done over a two month period with enrollment of 10,000 employees into the system. However generating reports and taking action this large number of staff was a challenge. For this purpose software was made for capturing the duty roster of each employee and integrating it with the biometric system and adding an SMS gateway. This helped in automating the process of sending SMSs to each employee who had not signed in. Standalone biometric systems have limited functionality in large organizations unless it is meshed with employee duty roster.

  13. Multimodal biometric approach for cancelable face template generation

    Science.gov (United States)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  14. Score level fusion scheme based on adaptive local Gabor features for face-iris-fingerprint multimodal biometric

    Science.gov (United States)

    He, Fei; Liu, Yuanning; Zhu, Xiaodong; Huang, Chun; Han, Ye; Chen, Ying

    2014-05-01

    A multimodal biometric system has been considered a promising technique to overcome the defects of unimodal biometric systems. We have introduced a fusion scheme to gain a better understanding and fusion method for a face-iris-fingerprint multimodal biometric system. In our case, we use particle swarm optimization to train a set of adaptive Gabor filters in order to achieve the proper Gabor basic functions for each modality. For a closer analysis of texture information, two different local Gabor features for each modality are produced by the corresponding Gabor coefficients. Next, all matching scores of the two Gabor features for each modality are projected to a single-scalar score via a trained, supported, vector regression model for a final decision. A large-scale dataset is formed to validate the proposed scheme using the Facial Recognition Technology database-fafb and CASIA-V3-Interval together with FVC2004-DB2a datasets. The experimental results demonstrate that as well as achieving further powerful local Gabor features of multimodalities and obtaining better recognition performance by their fusion strategy, our architecture also outperforms some state-of-the-art individual methods and other fusion approaches for face-iris-fingerprint multimodal biometric systems.

  15. Valores de energia metabolizável de alguns alimentos obtidos com aves de diferentes idades Metabolizable energy values of feedstuffs obtained from poultry at different ages

    Directory of Open Access Journals (Sweden)

    Heloisa Helena de Carvalho Mello

    2009-05-01

    Full Text Available Foram realizados quatro ensaios de metabolismo com a finalidade de determinar a energia metabolizável aparente (EMA e a energia metabolizável aparente corrigida (EMAn de dez alimentos em aves em diversas idades. Os alimentos testados foram: milho, farelo de soja, sorgo, farelo de trigo, farelo de arroz integral, duas farinhas de penas, duas farinhas de vísceras e plasma sangüíneo. Utilizou-se o método de coleta total de excretas, em delineamento experimental inteiramente casualizado, com 11 tratamentos (dez alimentos e uma ração-referência e seis repetições. No primeiro ensaio, foram utilizados 528 pintos de corte machos de 10 a 17 dias de idade, totalizando oito aves por repetição; no segundo ensaio, 396 frangos de corte machos de 26 a 33 dias de idade, com seis aves por repetição; no terceiro ensaio, 264 frangos de corte machos de 40 a 47 dias de idade, com quatro aves por repetição; e, no quarto ensaio, 132 galos, com duas aves por repetição. A idade das aves influenciou os valores de EMA e EMAn do farelo de soja, do sorgo, do farelo de arroz integral, das farinhas de penas e do plasma sangüíneo, enquanto, para o farelo de trigo, teve efeito apenas sobre a EMAn.Four assays were carried out to determine the apparent metabolizable energy (AME and the corrected apparent nitrogen metabolizable energy (AMEn of ten feeds for poultry at different poultry ages. The feeds studied were: corn grain, soybean meal, ground sorghum, wheat bran, integral rice bran, two kinds of feather meal, two kinds of poultry viscera meal and spray-dried plasma. The method of total excreta collection was used to determine the AME and AMEn values. The broiler chicks were distributed on a completely randomized experimental design, with 11 treatments, six replications, with different number of animals by replication according to the assay. In the first assay, 528 male broiler chicks in the period from 10 to 17 days of age were used, with eight animals

  16. 3D High-definition anorectal manometry: Values obtained in asymptomatic volunteers, fecal incontinence and chronic constipation. Results of a prospective multicenter study (NOMAD).

    Science.gov (United States)

    Mion, F; Garros, A; Brochard, C; Vitton, V; Ropert, A; Bouvier, M; Damon, H; Siproudhis, L; Roman, S

    2017-08-01

    3D-high definition anorectal manometry (3DARM) may aid the diagnosis of functional anorectal disorders, but data comparing asymptomatic and symptomatic subjects are scarce. We aimed to describe 3DARM values in asymptomatic volunteers and those with fecal incontinence (FI) or chronic constipation (CC), and identify which variables differentiate best these groups. Asymptomatic subjects were stratified by sex, age, and parity. Those with FI or CC were included according to anorectal symptom questionnaires. Endoanal ultrasound examination and 3DARM were performed the same day. Anal pressures were analyzed at rest, during voluntary squeeze, and during push maneuver, and compared between the 3 groups. Anal pressure defects were defined and compared to ultrasound defects. A total of 126 subjects (113 female, mean age 52 years, range 18-83) were included; 36 asymptomatic, 38 FI, 42 CC. Anal resting and squeeze pressures, and rectal sensitivity values were lower in FI women than in the other groups. Typical anal sphincter asymmetry during squeezing was less frequently observed in FI women. A dyssynergic pattern during push maneuver was found in 70% of asymptomatic subjects, and with a similar frequency in the 2 symptomatic groups. There was slight concordance between 3D-pressure defects and ultrasound defects. 3D anal pressures in asymptomatic women were significantly lower than in men, and in FI compared to asymptomatic women. The classical dyssynergic pattern during push maneuver was found as frequently in asymptomatic and symptomatic patients. Further studies should try to identify 3DARM variables that could reliably identify dyssynergic defecation. © 2017 John Wiley & Sons Ltd.

  17. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  18. UV irradiation of track membranes as a method for obtaining the necessary value of brittleness for good fractures of samples for sem observations

    International Nuclear Information System (INIS)

    Sartowska, B.; Nowicki, A.; Orelovitch, O.; )

    2006-01-01

    Synthesis of nano- and microstructures of materials inside the pores of specific template-track membranes can be used to obtain nano- and microwires or nano- and microtubes. It is important for these applications to know the inner geometry of the pores like sizes, shape and surface morphology. Scanning electron microscopy technique (SEM) was used predominantly for this kind of membrane characterisation. The use of other methods of sample preparation as electron, gamma rays or UV irradiation allows to make them more brittle. In present paper authors describe preliminary results of the tensile measurements of membranes after UV irradiation. Poly(ethylene terephthalate) (PET) membrane 10 μm thick with pore diameter 1.0 μm were prepared t the Joint Institute for Nuclear Research (Dubna, Russia) using the standard procedure. The samples were irradiated with UV light with energy flux 2.8 W/cm 2 during different periods of time. The tensile measurements of the initial and irradiated materials were carried in the Institute of Nuclear Chemistry and Technology (Warsaw, Poland). In conclusion, authors claim that it is possible to find the dose of UV irradiation that ensures the fracture without elastic deformation. In the case when the time of UV irradiation increases up to 90 h, the PET membrane breaks without distortion of its channel structure

  19. Optical cryptography with biometrics for multi-depth objects.

    Science.gov (United States)

    Yan, Aimin; Wei, Yang; Hu, Zhijuan; Zhang, Jingtao; Tsang, Peter Wai Ming; Poon, Ting-Chung

    2017-10-11

    We propose an optical cryptosystem for encrypting images of multi-depth objects based on the combination of optical heterodyne technique and fingerprint keys. Optical heterodyning requires two optical beams to be mixed. For encryption, each optical beam is modulated by an optical mask containing either the fingerprint of the person who is sending, or receiving the image. The pair of optical masks are taken as the encryption keys. Subsequently, the two beams are used to scan over a multi-depth 3-D object to obtain an encrypted hologram. During the decryption process, each sectional image of the 3-D object is recovered by convolving its encrypted hologram (through numerical computation) with the encrypted hologram of a pinhole image that is positioned at the same depth as the sectional image. Our proposed method has three major advantages. First, the lost-key situation can be avoided with the use of fingerprints as the encryption keys. Second, the method can be applied to encrypt 3-D images for subsequent decrypted sectional images. Third, since optical heterodyning scanning is employed to encrypt a 3-D object, the optical system is incoherent, resulting in negligible amount of speckle noise upon decryption. To the best of our knowledge, this is the first time optical cryptography of 3-D object images has been demonstrated in an incoherent optical system with biometric keys.

  20. Morphologic, biometric, and isoenzyme characterization of Trichuris suis.

    Science.gov (United States)

    Oliveros, R; Cutillas, C; Arias, P; Guevara, D

    1998-06-01

    Trichuris suis isolates were collected from the cecum of Sus scrofa domestica (pig) and S. s. scrofa (wild boar). Morphology and biometry studies were carried out. Morphology studies showed the existence of typical caudal papillae in males of T. suis from wild boars, but no other difference was observed in the biometric parameters (total length, esophageal length, posterior-portion body length, and spicular length) of T. suis isolated from either host. Individual extracts were subjected to malate dehydrogenase (MDH), malic enzyme (ME), glucose 6-phosphate dehydrogenase (G6PD), lactate dehydrogenase (LDH), and superoxide dismutase (SOD) isoenzyme analysis following starch-gel electrophoresis, and the isoenzyme patterns were compared with those obtained from other species of trichurids. MDH, ME, G6PD, LDH, and SOD isoenzyme patterns were identical for T. suis from both hosts. MDH isoenzyme patterns were characterized by the presence of one cathodic isoenzyme. ME, G6PD, and LDH isoenzyme patterns indicated the presence of three phenotypes, whereas the SOD isoenzyme pattern showed only one phenotype characterized by the existence of two (anodic and cathodic) bands. Different LDH and SOD isoenzyme patterns observed for T. suis, T. ovis, and T. skrjabini confirm once more that isoenzyme patterns have potential as a diagnostic tool for differentiation of different species of Trichuris.

  1. Clinical value of detection of HPL-expressing intermediate trophoblasts in abortion or curettage-obtained specimens for diagnosis of intrauterine or ectopic pregnancies

    International Nuclear Information System (INIS)

    He Xiaomei; Wang Yuping; Wang Lisha; Yang Jingxiu; Gao Xueyan

    2005-01-01

    Objective: To investigate the value of detection of HPL-expressing intermediate trophoblasts in endometrial specimens for diagnosis of intrauterine and ectopic pregnancies. Methods: The examined specimens included: (1) Group I, 35 specimens with suspected intermediate trophoblast in decidua (2) Group II, 30 specimens with decidua-like plump endometrial stroma cells and/ or A-S phenomena in glandular epithelium (3) 30 specimens from proven intrauterine pregnancies serving as controls. Histochemistry (SP method) was used for HPL detection in all these specimens. Results: In the 30 proven intrauterine pregnancies, decidua and villa were present in all the specimens. Only 24 of the 30 were found to be HPL(+) with 6 HPL negatives (20%). In Group I , 28 of the 35 specimens were found to be HPL(+) and all of 28 were from intrauterine pregnancies: Of the 7 HPL negative cases, 5 were later confirmed as with ectopic pregnancy, the remaining 2 were with intrauterine pregnancy. In Group II, 22 of 30 specimens were HPL(+) and all were from intrauterine pregnancy. Of the 8 HPL negative cases, 6 were later confirmed as with ectopic pregnancy and 2 were with intrauterine pregnancy. Combining the data from Group I and II, we could see that in the total 15 HPL negative cases, 11 were with ectopic pregnancy (11/15=73.3%) and 4 were with intrauterine pregnancy (4/15=26.7%). Conclusion: In specimens of intrauterine contents, demonstration of HPL (+) cells could be regarded as confirmative evidence of intrauterine pregnancy. However, the reverse did not hold true. Many of the HPL negative specimens were from intrauterine pregnancies (in this study 4/15 or 26.7%). Therefore, in HPL negative cases, there was a high possibility of ectopic pregnancy but further examinations were required to ascertain the diagnosis. (authors)

  2. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  3. Compressed sensing approach for wrist vein biometrics.

    Science.gov (United States)

    Lantsov, Aleksey; Ryabko, Maxim; Shchekin, Aleksey

    2018-04-01

    The work describes features of the compressed sensing (CS) approach utilized for development of a wearable system for wrist vein recognition with single-pixel detection; we consider this system useful for biometrics authentication purposes. The CS approach implies use of a spatial light modulation (SLM) which, in our case, can be performed differently-with a liquid crystal display or diffusely scattering medium. We show that compressed sensing combined with above-mentioned means of SLM allows us to avoid using an optical system-a limiting factor for wearable devices. The trade-off between the 2 different SLM approaches regarding issues of practical implementation of CS approach for wrist vein recognition purposes is discussed. A possible solution of a misalignment problem-a typical issue for imaging systems based upon 2D arrays of photodiodes-is also proposed. Proposed design of the wearable device for wrist vein recognition is based upon single-pixel detection. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Improving energy efficiency in handheld biometric applications

    Science.gov (United States)

    Hoyle, David C.; Gale, John W.; Schultz, Robert C.; Rakvic, Ryan N.; Ives, Robert W.

    2012-06-01

    With improved smartphone and tablet technology, it is becoming increasingly feasible to implement powerful biometric recognition algorithms on portable devices. Typical iris recognition algorithms, such as Ridge Energy Direction (RED), utilize two-dimensional convolution in their implementation. This paper explores the energy consumption implications of 12 different methods of implementing two-dimensional convolution on a portable device. Typically, convolution is implemented using floating point operations. If a given algorithm implemented integer convolution vice floating point convolution, it could drastically reduce the energy consumed by the processor. The 12 methods compared include 4 major categories: Integer C, Integer Java, Floating Point C, and Floating Point Java. Each major category is further divided into 3 implementations: variable size looped convolution, static size looped convolution, and unrolled looped convolution. All testing was performed using the HTC Thunderbolt with energy measured directly using a Tektronix TDS5104B Digital Phosphor oscilloscope. Results indicate that energy savings as high as 75% are possible by using Integer C versus Floating Point C. Considering the relative proportion of processing time that convolution is responsible for in a typical algorithm, the savings in energy would likely result in significantly greater time between battery charges.

  5. Biometric Analysis of Hunteria umbellata (K.Schum.) Hallier f and ...

    African Journals Online (AJOL)

    Biometric Analysis of Hunteria umbellata (K.Schum.) ... Username, Password, Remember me, or Register ... The biometric analysis of data from five diabetic patients that were placed on herbal treatment were taken daily for a period of 3 weeks ...

  6. Biometric security and privacy opportunities & challenges in the big data era

    CERN Document Server

    Al-maadeed, Somaya; Bouridane, Ahmed; Crookes, Prof; Beghdadi, Azeddine

    2017-01-01

    This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.

  7. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    National Research Council Canada - National Science Library

    Morgan, Daniel; Krouse, William

    2005-01-01

    .... This report provides an overview of biometric technologies and the major U.S. biometric border screening systems, including US-VISIT, and discusses issues such as cost, performance, and user acceptance...

  8. Evolução morfométrica dos anexos embrionários e fetais bovinos obtidos por monta natural, com 10 a 70 dias da gestação Biometrics evolution of the embryonic and fetal annexes in cows obtained by natural mating, at 10 to 70 days of gestation

    Directory of Open Access Journals (Sweden)

    Antônio C. de Assis Neto

    2009-10-01

    Full Text Available O período inicial da gestação de bovinos é caracterizado por grandes perdas embrionárias. Considerando a importância deste fator no âmbito da reprodução animal foram estudados os anexos embrionários e fetais bovinos fecundados por monta natural de 15-70 dias de gestação, com o objetivo de estabelecer parâmetros morfométricos da placenta na fase inicial da gestação. Com uso de um paquímetro foram realizadas mensurações do comprimento (crânio caudal, largura (latero lateral e altura (dorso ventral das membranas corioalantóide e amniótica. O início da formação dos cotilédones foi observado e quantificado, assim como, o peso placentário. O peso médio do saco gestacional aumentou com o evoluir da idade gestacional, entretanto, o crescimento foi acelerado a partir de 20-30 dias de gestação. O comprimento crânio caudal e dorso ventral da membrana corioalantóide e do âmnio apresentaram crescimento lento e gradual com o evoluir dos períodos gestacionais analisados. Com 30-40 dias de gestação, os primeiro cotilédones já eram visualizados e contatos com facilidade na superfície coriônica. Os períodos de crescimento coincidiram com os maiores índices de perdas gestacionais em bovinos. Os parâmetros aqui analisados poderão servir para futuras investigações dos anexos embrionários de organismos manipulados em laboratório.The main goal of this morphometrical study was to characterize the development of the extra-embryonic membranes of 15 to 70-day-old bovine embryos obtained by natural mating. With a millimeter paquimeter the cranio-caudal, latero-lateral and dorso-ventral measurements of chorion and amnion were determined. The development of the cotyledons and weight of the gestational sac were observed and quantified. The weight of the gestational sac increased during gestation; however, the growth was faster then 20 to 30 days. The cranial-caudal and dorsal-ventral length of the choriallantois and the amnion

  9. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  10. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    Science.gov (United States)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  11. Atmospheric turbulence and sensor system effects on biometric algorithm performance

    Science.gov (United States)

    Espinola, Richard L.; Leonard, Kevin R.; Byrd, Kenneth A.; Potvin, Guy

    2015-05-01

    Biometric technologies composed of electro-optical/infrared (EO/IR) sensor systems and advanced matching algorithms are being used in various force protection/security and tactical surveillance applications. To date, most of these sensor systems have been widely used in controlled conditions with varying success (e.g., short range, uniform illumination, cooperative subjects). However the limiting conditions of such systems have yet to be fully studied for long range applications and degraded imaging environments. Biometric technologies used for long range applications will invariably suffer from the effects of atmospheric turbulence degradation. Atmospheric turbulence causes blur, distortion and intensity fluctuations that can severely degrade image quality of electro-optic and thermal imaging systems and, for the case of biometrics technology, translate to poor matching algorithm performance. In this paper, we evaluate the effects of atmospheric turbulence and sensor resolution on biometric matching algorithm performance. We use a subset of the Facial Recognition Technology (FERET) database and a commercial algorithm to analyze facial recognition performance on turbulence degraded facial images. The goal of this work is to understand the feasibility of long-range facial recognition in degraded imaging conditions, and the utility of camera parameter trade studies to enable the design of the next generation biometrics sensor systems.

  12. Behavioral and physical biometric characteristics modeling used for ITS security improvement

    Directory of Open Access Journals (Sweden)

    Miroslav BAČA

    2009-01-01

    Full Text Available Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, database size, as well as environmental factors. By using our ontology-based framework for adequacy of biometric systems, we introduce a model for using biometric technologies in ITS. Such technologies increase security, safety and protection of ITS.

  13. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    OpenAIRE

    Arvind Selwal; Sunil Kumar Gupta; Surender Kumar

    2016-01-01

    Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric mod...

  14. Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault

    OpenAIRE

    Meenakshi, V. S.; Padmavathi, G.

    2010-01-01

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the original biometric templates transformed templates can be stored. Whenever the transformation function ...

  15. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    OpenAIRE

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to c...

  16. Clinical utility of apparent diffusion coefficient values obtained using high b-value when diagnosing prostate cancer using 3 tesla MRI: comparison between ultra-high b-value (2000 s/mm²) and standard high b-value (1000 s/mm²).

    Science.gov (United States)

    Kitajima, Kazuhiro; Takahashi, Satoru; Ueno, Yoshiko; Yoshikawa, Takeshi; Ohno, Yoshiharu; Obara, Makoto; Miyake, Hideaki; Fujisawa, Masato; Sugimura, Kazuro

    2012-07-01

    To determine whether the apparent diffusion coefficient (ADC) obtained using b = 2000 s/mm(2) upon 3 Tesla (T) diffusion-weighted MRI is superior to b = 1000 s/mm(2) for discriminating malignant from normal prostate tissue and predicting the aggressiveness of prostate cancer, using histopathological findings of radical prostatectomy as a reference. Eighty prostate cancer patients underwent preoperative 3T MRI including diffusion weighted imaging with b-values of 0, 1000, and 2000 s/mm(2) . ADCs were measured for malignant lesions and normal sites on three sets of ADC maps calculated with monoexponential fitting between b = 0 and 1000, 0 and 2000, and 1000 and 2000, respectively. The relationship between the ADC and Gleason score was evaluated. The areas under the ROC curves for b = 0,1000, b = 0,2000, and b = 1000,2000 were 0.896, 0.937, and 0.857, respectively, in the peripheral zone (PZ) and 0.877, 0.889, and 0.731, respectively, in the transition zone (TZ). The difference between b = 0,1000 and b = 0,2000 was significant in PZ (P = 0.033), but not in TZ (P = 0.84). Weak but significant negative correlations were identified between ADCs and Gleason score in both PZ and TZ cancer at b = 0,1000 and b = 0,2000 (r = -0.323 to -0.341). For 3T MRI, ADCs using b = 0,2000 are more accurate than b = 0,1000 for diagnosing PZ cancer, and as accurate for TZ cancer. Copyright © 2012 Wiley Periodicals, Inc.

  17. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    International Nuclear Information System (INIS)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  18. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    Energy Technology Data Exchange (ETDEWEB)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L, E-mail: franciscogiacometto@unicesar.edu.co [Laboratorio de Optica e Informatica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Cesar (Colombia)

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  19. [Biometric ranging of the corpses destroyed at the site of a catastrophe in terms of gender, longitudinal and circumferencial dimensions, and the degree of subcutaneous fat distribution].

    Science.gov (United States)

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    The quantitative criteria for biometric ranging of destroyed corpses in terms of anatomical localization, gender, longitudinal length, trunk circumference, and the folds of subcutaneous fat are proposed. The wealth of anthropometric materials obtained in the studies of various Caucasoid populations was used to calculate the normative tables for biometric ranging of the decomposed corpses. The proposed technology excludes the subjective assessments for the purpose of such classification at the sites of catastrophes. Moreover, it promotes the accumulation of the variety of valuable information, such as the size of the collar, headwear, and footwear, clothing size and height, and portrait features, that can be used for victim identification.

  20. Estimation of biometric parameters from cattle rump using free-hand scanning and a 3D data processing algorithm

    OpenAIRE

    Viana, Joao; Hinduja, Srichand; Da Silva Bartolo, Paulo Jorge

    2016-01-01

    The quantity and quality of phenotypic data recovered from farm animals became a bottleneck for breeding programmes, and new tools are required to overcome this problem. This study evaluated the use of a portable structured light scanner and a 3D modelling to recover biometric information of the rump region in cattle. Virtual 3D models were created based on coordinates extracted from the points-cloud obtained through reverse engineering. A MATLAB algorithm was implemented to identify referenc...

  1. BioTwist : overcoming severe distortions in ridge-based biometrics for succesful identification

    NARCIS (Netherlands)

    Kotzerke, J.

    2016-01-01

    This thesis focuses on ridge-based and highly distorted biometrics, the different chal-lenges involved in a verification of identity scenario, and how to overcome them. More specifically, we work on ridge-based biometrics in two different contexts: (i) newborn and infant biometrics and (ii) quality

  2. Error checking and near matching in helper data systems for biometric authentication

    NARCIS (Netherlands)

    Papatsimpa, Charikleia; Linnartz, Jean-Paul; de Groot, Joep; Skoric, B.; Ignatenko, T.

    2014-01-01

    Helper data systems mitigate the risk that biometric templates are stolen from a biometric data base. Yet, current systems face the drawback that strong Error Correction is needed in order to mitigate variations in the measured biometric during verification. Error correction codes are not always

  3. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Garcia Molina, Gary; Breebaart, Jeroen; Veldhuis, Raymond N.J.; Kevenaar, Tom A.M.; Jonker, Willem

    In recent years, the protection of biometric data has gained increased interest from the scientific community. Methods such as the fuzzy commitment scheme, helper-data system, fuzzy extractors, fuzzy vault, and cancelable biometrics have been proposed for protecting biometric data. Most of these

  4. Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Molina, G.; Kevenaar, T.A.M.; Veldhuis, Raymond N.J.; Jonker, Willem

    2008-01-01

    In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic

  5. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Breebaart, Jeroen; Buhan, I.R.; Veldhuis, Raymond N.J.; Vijaya Kumar, B.V.K.; Prabhakar, Salil; Ross, Arun A.

    2010-01-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved

  6. European securitization and biometric identification: the uses of genetic profiling.

    Science.gov (United States)

    Johnson, Paul; Williams, Robin

    2007-01-01

    The recent loss of confidence in textual and verbal methods for validating the identity claims of individual subjects has resulted in growing interest in the use of biometric technologies to establish corporeal uniqueness. Once established, this foundational certainty allows changing biographies and shifting category memberships to be anchored to unchanging bodily surfaces, forms or features. One significant source for this growth has been the "securitization" agendas of nation states that attempt the greater control and monitoring of population movement across geographical borders. Among the wide variety of available biometric schemes, DNA profiling is regarded as a key method for discerning and recording embodied individuality. This paper discusses the current limitations on the use of DNA profiling in civil identification practices and speculates on future uses of the technology with regard to its interoperability with other biometric databasing systems.

  7. Estimating Body Related Soft Biometric Traits in Video Frames

    Directory of Open Access Journals (Sweden)

    Olasimbo Ayodeji Arigbabu

    2014-01-01

    Full Text Available Soft biometrics can be used as a prescreening filter, either by using single trait or by combining several traits to aid the performance of recognition systems in an unobtrusive way. In many practical visual surveillance scenarios, facial information becomes difficult to be effectively constructed due to several varying challenges. However, from distance the visual appearance of an object can be efficiently inferred, thereby providing the possibility of estimating body related information. This paper presents an approach for estimating body related soft biometrics; specifically we propose a new approach based on body measurement and artificial neural network for predicting body weight of subjects and incorporate the existing technique on single view metrology for height estimation in videos with low frame rate. Our evaluation on 1120 frame sets of 80 subjects from a newly compiled dataset shows that the mentioned soft biometric information of human subjects can be adequately predicted from set of frames.

  8. New surveillance technologies and their publics: A case of biometrics.

    Science.gov (United States)

    Martin, Aaron K; Donovan, Kevin P

    2015-10-01

    Before a newly-elected government abandoned the project in 2010, for at least eight years the British state actively sought to introduce a mandatory national identification scheme for which the science and technology of biometrics was central. Throughout the effort, government representatives attempted to portray biometrics as a technology that was easily understandable and readily accepted by the public. However, neither task was straightforward. Instead, particular publics emerged that showed biometric technology was rarely well understood and often disagreeable. In contrast to some traditional conceptualizations of the relationship between public understanding and science, it was often those entities that best understood the technology that found it least acceptable, rather than those populations that lacked knowledge. This paper analyzes the discourses that pervaded the case in order to untangle how various publics are formed and exhibit differing, conflicting understandings of a novel technology. © The Author(s) 2014.

  9. Biometric feature extraction using local fractal auto-correlation

    International Nuclear Information System (INIS)

    Chen Xi; Zhang Jia-Shu

    2014-01-01

    Image texture feature extraction is a classical means for biometric recognition. To extract effective texture feature for matching, we utilize local fractal auto-correlation to construct an effective image texture descriptor. Three main steps are involved in the proposed scheme: (i) using two-dimensional Gabor filter to extract the texture features of biometric images; (ii) calculating the local fractal dimension of Gabor feature under different orientations and scales using fractal auto-correlation algorithm; and (iii) linking the local fractal dimension of Gabor feature under different orientations and scales into a big vector for matching. Experiments and analyses show our proposed scheme is an efficient biometric feature extraction approach. (condensed matter: structural, mechanical, and thermal properties)

  10. The use of biometrics in the Personal Health Record (PHR).

    Science.gov (United States)

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR.

  11. Impact of environmental factors on biometric matching during human decomposition

    Energy Technology Data Exchange (ETDEWEB)

    Bolme, David S [ORNL; Tokola, Ryan A [ORNL; Boehnen, Chris Bensing [ORNL; Saul, Tiffany B [ORNL; Sauerwein, Kelly A [ORNL; Steadman, Dawnie W [ORNL

    2016-01-01

    Automatic recognition systems are a valuable tool for identifying unknown deceased individuals. Immediately af- ter death fingerprint and face biometric samples are easy to collect using standard sensors and cameras and can be easily matched to anti-mortem biometric samples. Even though post-mortem fingerprints and faces have been used for decades, there are no studies that track these biomet- rics through the later stages of decomposition to determine the length of time the biometrics remain viable. This paper discusses a multimodal dataset of fingerprints, faces, and irises from 14 human cadavers that decomposed outdoors under natural conditions. Results include predictive models relating time and temperature, measured as Accumulated Degree Days (ADD), and season (winter, spring, summer) to the predicted probably of automatic verification using a commercial algorithm.

  12. Multiple-stage pure phase encoding with biometric information

    Science.gov (United States)

    Chen, Wen

    2018-01-01

    In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.

  13. Modeling and prototyping of biometric systems using dataflow programming

    Science.gov (United States)

    Minakova, N.; Petrov, I.

    2018-01-01

    The development of biometric systems is one of the labor-intensive processes. Therefore, the creation and analysis of approaches and techniques is an urgent task at present. This article presents a technique of modeling and prototyping biometric systems based on dataflow programming. The technique includes three main stages: the development of functional blocks, the creation of a dataflow graph and the generation of a prototype. A specially developed software modeling environment that implements this technique is described. As an example of the use of this technique, an example of the implementation of the iris localization subsystem is demonstrated. A variant of modification of dataflow programming is suggested to solve the problem related to the undefined order of block activation. The main advantage of the presented technique is the ability to visually display and design the model of the biometric system, the rapid creation of a working prototype and the reuse of the previously developed functional blocks.

  14. Biometric Subject Verification Based on Electrocardiographic Signals

    Science.gov (United States)

    Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor)

    2014-01-01

    A method of authenticating or declining to authenticate an asserted identity of a candidate-person. In an enrollment phase, a reference PQRST heart action graph is provided or constructed from information obtained from a plurality of graphs that resemble each other for a known reference person, using a first graph comparison metric. In a verification phase, a candidate-person asserts his/her identity and presents a plurality of his/her heart cycle graphs. If a sufficient number of the candidate-person's measured graphs resemble each other, a representative composite graph is constructed from the candidate-person's graphs and is compared with a composite reference graph, for the person whose identity is asserted, using a second graph comparison metric. When the second metric value lies in a selected range, the candidate-person's assertion of identity is accepted.

  15. Biometric observations of newborn Crocodylus acutus (Cuvier, 1807 obtained in captivity in, Tumbes, Peru

    Directory of Open Access Journals (Sweden)

    Oswaldo Pérez

    2013-05-01

    Full Text Available In this paper, length and weigth measurements of 20 newborn Crocodylus acutus (Cuvier, 1807 hached in a pilot farm-bred of the aquaculture center La Tuna Carranza, Puerto Pizarro, Tumbes, Peru, in 2001 are presented. The information is compared with similar reports from others places.

  16. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  17. Sir Ronald A. Fisher and the International Biometric Society.

    Science.gov (United States)

    Billard, Lynne

    2014-06-01

    The year 2012 marks the 50th anniversary of the death of Sir Ronald A. Fisher, one of the two Fathers of Statistics and a Founder of the International Biometric Society (the "Society"). To celebrate the extraordinary genius of Fisher and the far-sighted vision of Fisher and Chester Bliss in organizing and promoting the formation of the Society, this article looks at the origins and growth of the Society, some of the key players and events, and especially the roles played by Fisher himself as the First President. A fresh look at Fisher, the man rather than the scientific genius is also presented. © 2014, The International Biometric Society.

  18. Novel biometric flow slab design for improvement of PEMFC performance

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chin-Tsan; Hu, Yuh-Chung; Zheng, Pei-Lun [Department of Mechanical and Electro-Mechanical Engineering, Center of Green Technology, National I Lan University, I Lan 26047 (China)

    2010-04-15

    Designing a better flow slab is important to cell performance because of its significant influence on the total pressure drop and flow uniformity. Two novel biometric flow slabs, BFF1 and BFF2, which are addressed in this study, are believed to enhance the capability of oxygen transportation and promote the liquid water removal. Hence, its possession of a higher flow uniformity and lower pressure drop would produce a better power performance than the serpentine and parallel flow. These findings with respect to the design of biometric flow slab could be useful to promote the cell performance of PEMFC, and could even be expanded to other cell types. (author)

  19. Societal and ethical implications of anti-spoofing technologies in biometrics.

    Science.gov (United States)

    Rebera, Andrew P; Bonfanti, Matteo E; Venier, Silvia

    2014-03-01

    Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a 'spoofing attack' an artificial replica of an individual's biometric trait is used to induce a system to falsely infer that individual's presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against such threats. Unlike biometrics in general, the societal and ethical issues raised by spoofing and anti-spoofing techniques have not received much attention. This paper examines these issues.

  20. Prospective study on the behaviour of values obtained by organ function studies, in particular scintiscan studies of pulmonary perfusion, during treatment of little to moderately advanced tuberculosis, shown by X-rays to involve one lobe of the lung

    International Nuclear Information System (INIS)

    Schaffartzik, W.

    1987-01-01

    Prospective study on the behaviour of values obtained by organ function studies, in particular scintiscan studies of pulmonary perfusion, during treatment of little to moderately advanced tuberculosis, shown by X-rays to involve one lobe of the lung. This prospective study analyses features of global and regional pulmonary function in 14 patients with little to moderately pronounced tuberculosis, shown by X-rays to involve one lobe of the lung. At the beginning of treatment, the global function values were not different from the values generally accepted as normal. Disturbed perfusion was determined in pulmonary sections where the X-ray pictures had revealed the presence of tuberculous foci. After therapy and inactivation of the tuberculosis the values were seen to remain unchanged. (MBC) [de

  1. Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.

    Science.gov (United States)

    Sidek, Khairul Azami; Khalil, Ibrahim

    2013-01-01

    Electrocardiogram (ECG) based biometric matching suffers from high misclassification error with lower sampling frequency data. This situation may lead to an unreliable and vulnerable identity authentication process in high security applications. In this paper, quality enhancement techniques for ECG data with low sampling frequency has been proposed for person identification based on piecewise cubic Hermite interpolation (PCHIP) and piecewise cubic spline interpolation (SPLINE). A total of 70 ECG recordings from 4 different public ECG databases with 2 different sampling frequencies were applied for development and performance comparison purposes. An analytical method was used for feature extraction. The ECG recordings were segmented into two parts: the enrolment and recognition datasets. Three biometric matching methods, namely, Cross Correlation (CC), Percent Root-Mean-Square Deviation (PRD) and Wavelet Distance Measurement (WDM) were used for performance evaluation before and after applying interpolation techniques. Results of the experiments suggest that biometric matching with interpolated ECG data on average achieved higher matching percentage value of up to 4% for CC, 3% for PRD and 94% for WDM. These results are compared with the existing method when using ECG recordings with lower sampling frequency. Moreover, increasing the sample size from 56 to 70 subjects improves the results of the experiment by 4% for CC, 14.6% for PRD and 0.3% for WDM. Furthermore, higher classification accuracy of up to 99.1% for PCHIP and 99.2% for SPLINE with interpolated ECG data as compared of up to 97.2% without interpolation ECG data verifies the study claim that applying interpolation techniques enhances the quality of the ECG data. Crown Copyright © 2012. Published by Elsevier Ireland Ltd. All rights reserved.

  2. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  3. Comparison of the T2-star Values of Placentas Obtained from Pre-eclamptic Patients with Those of a Control Group: an Ex-vivo Magnetic Resonance Imaging Study.

    Science.gov (United States)

    Yurttutan, Nursel; Bakacak, Murat; Kızıldağ, Betül

    2017-09-29

    Endotel dysfunction, vasoconstriction, and oxidative stress are described in the pathophysiology of pre-eclampsia, but its aetiology has not been revealed clearly. To examine whether there is a difference between the placentas of pre-eclamptic pregnant women and those of a control group in terms of their T2 star values. Case-control study. Twenty patients diagnosed with pre-eclampsia and 22 healthy controls were included in this study. The placentas obtained after births performed via Caesarean section were taken into the magnetic resonance imaging area in plastic bags within the first postnatal hour, and imaging was performed via modified DIXON-Quant sequence. Average values were obtained by performing T2 star measurements from four localisations on the placentas. T2 star values measured in the placentas of the control group were found to be significantly lower than those in the pre-eclampsia group (pstar value in the pre-eclamptic group was found to be 37.48 ms (standard deviation ± 11.3), this value was 28.74 (standard deviation ± 8.08) in the control group. The cut-off value for the T2 star value, maximising the accuracy of diagnosis, was 28.59 ms (area under curve: 0.741; 95% confidence interval: 0.592-0.890); sensitivity and specificity were 70% and 63.6%, respectively. This study, the T2 star value, which is an indicator of iron amount, was found to be significantly lower in the control group than in the pre-eclampsia group. This may be related to the reduction in blood flow to the placenta due to endothelial dysfunction and vasoconstriction, which are important in pre-eclampsia pathophysiology.

  4. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    Science.gov (United States)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  5. A novel feature ranking algorithm for biometric recognition with PPG signals.

    Science.gov (United States)

    Reşit Kavsaoğlu, A; Polat, Kemal; Recep Bozkurt, M

    2014-06-01

    This study is intended for describing the application of the Photoplethysmography (PPG) signal and the time domain features acquired from its first and second derivatives for biometric identification. For this purpose, a sum of 40 features has been extracted and a feature-ranking algorithm is proposed. This proposed algorithm calculates the contribution of each feature to biometric recognition and collocates the features, the contribution of which is from great to small. While identifying the contribution of the features, the Euclidean distance and absolute distance formulas are used. The efficiency of the proposed algorithms is demonstrated by the results of the k-NN (k-nearest neighbor) classifier applications of the features. During application, each 15-period-PPG signal belonging to two different durations from each of the thirty healthy subjects were used with a PPG data acquisition card. The first PPG signals recorded from the subjects were evaluated as the 1st configuration; the PPG signals recorded later at a different time as the 2nd configuration and the combination of both were evaluated as the 3rd configuration. When the results were evaluated for the k-NN classifier model created along with the proposed algorithm, an identification of 90.44% for the 1st configuration, 94.44% for the 2nd configuration, and 87.22% for the 3rd configuration has successfully been attained. The obtained results showed that both the proposed algorithm and the biometric identification model based on this developed PPG signal are very promising for contactless recognizing the people with the proposed method. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Effect of morphological and functional changes in the secundines on biometric parameters of newborns from dichorionic twin pregnancies.

    Science.gov (United States)

    Waszak, Małgorzata; Cieślik, Krystyna; Pietryga, Marek; Lewandowski, Jacek; Chuchracki, Marek; Nowak-Markwitz, Ewa; Bręborowicz, Grzegorz

    2016-01-01

    The aim of the study was to determine if, and to what extent, structural and functional changes of the secundines influence biometric parameters of neonates from dichorionic twin pregnancies. The study included neonates from dichorionic, diamniotic twin pregnancies, along with their secundines. Based on histopathological examination of the secundines, the mass and dimensions of the placenta, length and condition of the umbilical cord, chorionicity, focal lesions, and microscopic placental abnormalities were determined for 445 pairs of twins. Morphological development of examined twins was characterized on the basis of their six somatic traits, while birth status of the newborns was assessed based on their Apgar scores. Statistical analysis included Student t-tests, Snedecor's F-tests, post-hoc tests, non-parametric chi-squared Pearson's tests, and determination of Spearman coefficients of rank correlation. The lowest values of analyzed somatic traits were observed in twins who had placentas with velamentous or marginal cord insertion. Inflammatory lesions in the placenta and placental abruption turned out to have the greatest impact of all analyzed abnormalities of the secundines. Inflammatory lesions in the placenta were associated with lower values of biometric parameters and a greater likelihood of preterm birth. Neonates with a history of placental abruption were characterized by significantly lower birth weight and smaller chest circumference. Morphological changes in the secundines have a limited impact on biometric parameters of neonates from dichorionic twin pregnancies. In turn, functional changes exert a significant effect and more often contribute to impaired fetal development.

  7. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  8. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  9. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Science.gov (United States)

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing. PMID:22919273

  10. A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system.

    Science.gov (United States)

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  11. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Min-Gu Kim

    2012-01-01

    Full Text Available Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  12. Fusion of footsteps and face biometrics on an unsupervised and uncontrolled environment

    Science.gov (United States)

    Vera-Rodriguez, Ruben; Tome, Pedro; Fierrez, Julian; Ortega-Garcia, Javier

    2012-06-01

    This paper reports for the first time experiments on the fusion of footsteps and face on an unsupervised and not controlled environment for person authentication. Footstep recognition is a relatively new biometric based on signals extracted from people walking over floor sensors. The idea of the fusion between footsteps and face starts from the premise that in an area where footstep sensors are installed it is very simple to place a camera to capture also the face of the person that walks over the sensors. This setup may find application in scenarios like ambient assisted living, smart homes, eldercare, or security access. The paper reports a comparative assessment of both biometrics using the same database and experimental protocols. In the experimental work we consider two different applications: smart homes (small group of users with a large set of training data) and security access (larger group of users with a small set of training data) obtaining results of 0.9% and 5.8% EER respectively for the fusion of both modalities. This is a significant performance improvement compared with the results obtained by the individual systems.

  13. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    Science.gov (United States)

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  14. Left ventricle ejection fraction obtained by radioisotopic angiocardiography. Correlation between the values of the conventional ventriclegraphy. Fracao de ejecao do ventriculo esquerdo obtida por angiocardiografia radioisotopica. Correlacao com os valores fornecidos pela ventriculografia convencional

    Energy Technology Data Exchange (ETDEWEB)

    Ascer, E; Pimentel Filho, W A; Martins, L R.F.; Marioni Filho, H; Queiroga Filho, A F; Alonso, G; Germek, O A; Thom, A F; Souza, J E.M.R. [Instituto Dante Pazzanese de Cardiologia, Sao Paulo, SP (Brazil)

    1983-02-01

    Forty-two patients with clinical signs of coronary insuficiency underwent cineangiographic and radioisotopic examinations with the purpose of analysing the correlation between the values of left ventricle ejection fraction (LVEF) obtained by both methods. The values of EF obtained by the hemodynamic method (HEMO) ranged from 0.14 to 0.85 (x-bar = 0.566) and by radioisotopic method (RM) from 0.22 to 0.89 (x-bar = 0.573). The Student T test did not demonstrate statistically significant differences between the two methods (mean of differences = 0.007; t = 0.38 and p {ge} 0.353). A regression equation was obtained in order to estimate the EF by HEMO deriving from results obtained by RM (y = 0.11 + 0.80x) and to estimate the EF through RN from the results obtained by HEMO (x = 0.08 + 0.86y), where y = hemodynamic method and x = radioisotopic method. The authors conclude that the calculation of the EF by the methods used showed a good correlation and that this fact is evidenced by the elevated Pearson's correlation coefficient (r = 0.833). (author).

  15. Correlations of third-trimester hiatal biometry obtained using our-dimensional translabial ultrasonography with the delivery route in nulliparous pregnant women

    Energy Technology Data Exchange (ETDEWEB)

    Temtanakitpaisan, Teerayut [Dept. of Obstetrics and Gynaecology, Faculty of Medicine, Khon Kaen University, Khon Kaen (Thailand); Chantarason, Varisara [Dept. of Obstetrics and Gynaecology, Bumrungrad Hospital, Bangkok (Thailand); Bunyavejchevin, Suvit [Dept. of Obstetrics and Gynaecology, Faculty of Medicine, Chulalongkorn University, Bangkok (Thailand)

    2016-01-15

    The goal of this study was to evaluate normal hiatal dimensions in the third trimester in nulliparous Thai pregnant women and to establish which biometric factors were associated with various pregnancy outcomes. Fifty-seven consecutive nulliparous pregnant Thai women in their third trimester were recruited on a voluntary basis from April to October 2014. All subjects underwent four-dimensional (4D) translabial ultrasonography. Hiatal biometric parameters were measured at rest, while performing a Valsalva maneuver, and during contraction. Information about the patients’ eventual deliveries was obtained from their medical records. The mean values of the patients’ age, body mass index, and gestational age at the time of examination were 27.4±5.47 years, 26.7±3.48 kg/m{sup 2}, and 36.6±1.49 weeks, respectively. No subjects had vaginal lumps or experienced prolapse greater than stage 1 of the Pelvic Organ Prolapse Quantification system. Ultrasonography showed that the mean values of the hiatal area at rest, while performing a Valsalva maneuver, and during contraction were 13.10±2.92 cm{sup 2}, 17.50±4.81 cm{sup 2}, and 9.69±2.09 cm{sup 2}, respectively. The hiatal area at rest, the axial measurement at rest, and the axial measurement while performing a Valsalva maneuver were significantly associated with the route of delivery (P=0.02, P=0.04, and P=0.03, respectively). The route of delivery was associated with hiatal biometric values measured using 4D translabial ultrasonography, based on the results of nulliparous Thai women in the third trimester.

  16. Correlations of third-trimester hiatal biometry obtained using our-dimensional translabial ultrasonography with the delivery route in nulliparous pregnant women

    International Nuclear Information System (INIS)

    Temtanakitpaisan, Teerayut; Chantarason, Varisara; Bunyavejchevin, Suvit

    2016-01-01

    The goal of this study was to evaluate normal hiatal dimensions in the third trimester in nulliparous Thai pregnant women and to establish which biometric factors were associated with various pregnancy outcomes. Fifty-seven consecutive nulliparous pregnant Thai women in their third trimester were recruited on a voluntary basis from April to October 2014. All subjects underwent four-dimensional (4D) translabial ultrasonography. Hiatal biometric parameters were measured at rest, while performing a Valsalva maneuver, and during contraction. Information about the patients’ eventual deliveries was obtained from their medical records. The mean values of the patients’ age, body mass index, and gestational age at the time of examination were 27.4±5.47 years, 26.7±3.48 kg/m 2 , and 36.6±1.49 weeks, respectively. No subjects had vaginal lumps or experienced prolapse greater than stage 1 of the Pelvic Organ Prolapse Quantification system. Ultrasonography showed that the mean values of the hiatal area at rest, while performing a Valsalva maneuver, and during contraction were 13.10±2.92 cm 2 , 17.50±4.81 cm 2 , and 9.69±2.09 cm 2 , respectively. The hiatal area at rest, the axial measurement at rest, and the axial measurement while performing a Valsalva maneuver were significantly associated with the route of delivery (P=0.02, P=0.04, and P=0.03, respectively). The route of delivery was associated with hiatal biometric values measured using 4D translabial ultrasonography, based on the results of nulliparous Thai women in the third trimester.

  17. Correlations of third-trimester hiatal biometry obtained using four-dimensional translabial ultrasonography with the delivery route in nulliparous pregnant women

    Directory of Open Access Journals (Sweden)

    Teerayut Temtanakitpaisan

    2016-01-01

    Full Text Available Purpose: The goal of this study was to evaluate normal hiatal dimensions in the third trimester in nulliparous Thai pregnant women and to establish which biometric factors were associated with various pregnancy outcomes. Methods: Fifty-seven consecutive nulliparous pregnant Thai women in their third trimester were recruited on a voluntary basis from April to October 2014. All subjects underwent four-dimensional (4D translabial ultrasonography. Hiatal biometric parameters were measured at rest, while performing a Valsalva maneuver, and during contraction. Information about the patients’ eventual deliveries was obtained from their medical records. Results: The mean values of the patients’ age, body mass index, and gestational age at the time of examination were 27.4±5.47 years, 26.7±3.48 kg/m2, and 36.6±1.49 weeks, respectively. No subjects had vaginal lumps or experienced prolapse greater than stage 1 of the Pelvic Organ Prolapse Quantification system. Ultrasonography showed that the mean values of the hiatal area at rest, while performing a Valsalva maneuver, and during contraction were 13.10±2.92 cm2, 17.50±4.81 cm2, and 9.69±2.09 cm2, respectively. The hiatal area at rest, the axial measurement at rest, and the axial measurement while performing a Valsalva maneuver were significantly associated with the route of delivery (P=0.02, P=0.04, and P=0.03, respectively. Conclusion: The route of delivery was associated with hiatal biometric values measured using 4D translabial ultrasonography, based on the results of nulliparous Thai women in the third trimester.

  18. The state of the art in abuse of biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Hartel, Pieter H.

    For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit

  19. A Biometric Study of Some Reproductive Components of the Male ...

    African Journals Online (AJOL)

    A biometrical study was conducted on some aspects of the reproductive system of 16 local breed Tom cats (Felis catus domestica) collected within Sokoto metropolis at different ages. The age of the cats was estimated from teeth eruption and wearing and grouped into groups A to E as A (3- 6 months), B(6 months - 1 year), ...

  20. The PLR-DTW method for ECG based biometric identification.

    Science.gov (United States)

    Shen, Jun; Bao, Shu-Di; Yang, Li-Cai; Li, Ye

    2011-01-01

    There has been a surge of research on electrocardiogram (ECG) signal based biometric for person identification. Though most of the existing studies claimed that ECG signal is unique to an individual and can be a viable biometric, one of the main difficulties for real-world applications of ECG biometric is the accuracy performance. To address this problem, this study proposes a PLR-DTW method for ECG biometric, where the Piecewise Linear Representation (PLR) is used to keep important information of an ECG signal segment while reduce the data dimension at the same time if necessary, and the Dynamic Time Warping (DTW) is used for similarity measures between two signal segments. The performance evaluation was carried out on three ECG databases, and the existing method using wavelet coefficients, which was proved to have good accuracy performance, was selected for comparison. The analysis results show that the PLR-DTW method achieves an accuracy rate of 100% for identification, while the one using wavelet coefficients achieved only around 93%.