WorldWideScience

Sample records for face biometric systems

  1. Multimodal biometrics system based on face profile and ear

    Science.gov (United States)

    Youssef, Iman S.; Abaza, Ayman A.; Rasmy, Mohamed E.; Badawi, Ahmed M.

    2014-05-01

    Face recognition from a side profile view, has recently received significant attention in the literature. Even though current face recognition systems have reached a certain level of maturity at angles up to 30 degrees, their success is still limited with side profile angles. This paper presents an efficient technique for the fusion of face profile and ear biometrics. We propose to use a Block-based Local Binary Pattern (LBP) to generate the features for recognition from face profile images and ear images. These feature distributions are then fused at the score level using simple mean rule. Experimental results show that the proposed multimodal system can achieve 97:98% recognition performance, compared to unimodal biometrics of face profile 96.76%, and unimodal biometrics of ear 96.95%, details in the Experimental Results Section. Comparisons with other multimodal systems used in the literature, like Principal Component Analysis (PCA), Full-space Linear Discriminant Analysis (FSLDA) and Kernel Fisher discriminant analysis (KFDA), are presented in the Experimental Results Section.

  2. Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-08-01

    Full Text Available The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The deployment of biometric technologies, countries need to test and evaluate its systems since the International Civil Aviation Organization (ICAO provides the guidelines, but the implementation is up to each issuing country. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

  3. 3D face analysis for demographic biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Tokola, Ryan A [ORNL; Mikkilineni, Aravind K [ORNL; Boehnen, Chris Bensing [ORNL

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  4. Cross Disciplinary Biometric Systems

    CERN Document Server

    Liu, Chengjun

    2012-01-01

    Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance.  Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their face publicly every day. Face recognition systems display superb performance when they capitalize on the innovative ideas across color science, mathematics, and computer science (e.g., pattern recognition, machine learning, and image processing). The novel ideas lead to the development of new color models and effective ...

  5. Face Recognition (Patterns Matching & Bio-Metrics

    Directory of Open Access Journals (Sweden)

    Jignesh Dhirubhai Hirapara

    2012-08-01

    Full Text Available Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today’s safety mechanisms. Badge or password-based authentication procedures are too easy to hack. Biometrics represents a valid alternative but they suffer of drawbacks as well. Iris scanning, for example, is very reliable but too intrusive; fingerprints are socially accepted, but not applicable to non-con sentient people. On the other hand, face recognition represents a good compromise between what’s socially acceptable and what’s reliable, even when operating under controlled conditions. In last decade, many algorithms based on linear/nonlinear methods, neural networks, wavelets, etc. have been proposed. Nevertheless, Face Recognition Vendor Test 2002 shown that most of these approaches encountered problems in outdoor conditions. This lowered their reliability compared to state of the art biometrics.

  6. Modular Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor)

    2017-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to control communication of data, via the bus, with each of the plurality of data acquisition modules.

  7. Multimodal Biometric Systems - Study to Improve Accuracy and Performance

    CERN Document Server

    Sasidhar, K; Ramakrishna, Kolikipogu; KailasaRao, K

    2010-01-01

    Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies show that Unimodal biometric systems had many disadvantages regarding performance and accuracy. Multimodal biometric systems perform better than unimodal biometric systems and are popular even more complex also. We examine the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off- The-Shelf (COTS) products. Here we discuss fingerprint and face biometric systems, decision and fusion techniques used in these systems. We also discuss their advantage over unimodal biometric systems.

  8. Biometric systems technology, design and performance evaluation

    CERN Document Server

    Wayman, James; Maltoni, Davide

    2005-01-01

    A reference book for anyone involved in the design, management or implementation of biometric systems, and provides all the information needed to a build reliable system. It focuses on the four most widely used types of biometric technology - speech, fingerprint, iris and face recognition.

  9. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  10. Product of Likelihood Ratio Scores Fusion of Dynamic Face, Text Independent Speech and On-line Signature Based Biometrics Verification Application Systems

    Directory of Open Access Journals (Sweden)

    Mohamed SOLTANE

    2015-09-01

    Full Text Available In this paper, the use of finite Gaussian mixture modal (GMM tuned using Expectation Maximization (EM estimating algorithms for score level data fusion is proposed. Automated biometric systems for human identification measure a “signature” of the human body, compare the resulting characteristic to a database, and render an application dependent decision. These biometric systems for personal authentication and identification are based upon physiological or behavioral features which are typically distinctive, Multi-biometric systems, which consolidate information from multiple biometric sources, are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data, large intra-user variations and susceptibility to spoof attacks that are commonly encountered in mono modal biometric systems. Simulation result show that finite mixture modal (GMM is quite effective in modelling the genuine and impostor score densities, fusion based the product of Likelihood Ratio achieves a significant performance on eNTERFACE 2005 multi-biometric database based on dynamic face, on-line signature and text independent speech modalities.

  11. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Qian; Veldhuis, Raymond

    2010-01-01

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fu

  12. An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

    CERN Document Server

    Nageshkumar, M; Swamy, M N S

    2009-01-01

    Biometrics based personal identification is regarded as an effective method for automatically recognizing, with a high confidence a person's identity. A multimodal biometric systems consolidate the evidence presented by multiple biometric sources and typically better recognition performance compare to system based on a single biometric modality. This paper proposes an authentication method for a multimodal biometric system identification using two traits i.e. face and palmprint. The proposed system is designed for application where the training data contains a face and palmprint. Integrating the palmprint and face features increases robustness of the person authentication. The final decision is made by fusion at matching score level architecture in which features vectors are created independently for query measures and are then compared to the enrolment template, which are stored during database preparation. Multimodal biometric system is developed through fusion of face and palmprint recognition.

  13. Multimodal Biometric System Based on the Recognition of Face and Both Irises

    Directory of Open Access Journals (Sweden)

    Yeong Gon Kim

    2012-09-01

    Our study has the following novel features. First, the device proposed acquires images of the face and both irises simultaneously. The proposed device consists of a face camera, two iris cameras, near‐infrared illuminators and cold mirrors. Second, fast and accurate iris detection is based on two circular edge detections, which are accomplished in the iris image on the basis of the size of the iris detected in the face image. Third, the combined accuracy is enhanced by combining each score for the face and both irises using a support vector machine. The experimental results show that the equal error rate for the proposed method is 0.131%, which is lower than that of face or iris recognition and other fusion methods.

  14. Biometric Authentication System using Non-Linear Chaos

    Directory of Open Access Journals (Sweden)

    Dr.N.Krishnan

    2010-08-01

    Full Text Available A major concern nowadays for any Biometric Credential Management System is its potential vulnerability to protect its information sources; i.e. protecting a genuine user’s template from both internal and external threats. These days’ biometric authentication systems face various risks. One of the most serious threats is the ulnerability of the template's database. An attacker with access to a reference template could try to impersonate a legitimate user by reconstructing the biometric sample and by creating a physical spoof.Susceptibility of the database can have a disastrous impact on the whole authentication system. The potential disclosure of digitally stored biometric data raises serious concerns about privacy and data protection. Therefore, we propose a method which would integrate conventional cryptography techniques with biometrics. In this work, we present a biometric crypto system which encrypts the biometric template and the encryption is done by generating pseudo random numbers, based on non-linear dynamics.

  15. Robust Multi biometric Recognition Using Face and Ear Images

    CERN Document Server

    Boodoo, Nazmeen Bibi

    2009-01-01

    This study investigates the use of ear as a biometric for authentication and shows experimental results obtained on a newly created dataset of 420 images. Images are passed to a quality module in order to reduce False Rejection Rate. The Principal Component Analysis (eigen ear) approach was used, obtaining 90.7 percent recognition rate. Improvement in recognition results is obtained when ear biometric is fused with face biometric. The fusion is done at decision level, achieving a recognition rate of 96 percent.

  16. Generating One Biometric Feature from Another: Faces from Fingerprints

    Directory of Open Access Journals (Sweden)

    Seref Sagiroglu

    2010-04-01

    Full Text Available This study presents a new approach based on artificial neural networks for generating one biometric feature (faces from another (only fingerprints. An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces.

  17. Generating one biometric feature from another: faces from fingerprints.

    Science.gov (United States)

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces.

  18. Soft Biometrics Database: A Benchmark For Keystroke Dynamics Biometric Systems

    OpenAIRE

    Syed Idrus, Syed Zulkarnain; Cherrier, Estelle; Rosenberger, Christophe; Bours, Patrick

    2013-01-01

    International audience; Among all the existing biometric modalities, authentication systems based on keystroke dynamics are particularly interesting for usability reasons. Many researchers proposed in the last decades some algorithms to increase the efficiency of this biometric modality. Propose in this paper: a benchmark testing suite composed of a database containing multiple data (keystroke dynamics templates, soft biometric traits . . . ), which will be made available for the research com...

  19. A Multimodal Approach to Improve the Performance of Biometric System

    Directory of Open Access Journals (Sweden)

    Chander Kant

    2015-08-01

    Full Text Available Biometric systems have very success rate in identifying an individual based on ones biological traits. In biometric history some features like weight, age, height etc. are also there to provide user recognition to some extent but not fully upto the mark because of their changing nature according to time and environment. These features are called soft biometric traits. Soft biometric traits are lack of permanence but they have some positive aspects in respect of enhancing the biometric system performance. Here in this paper, we have also highlighting the similar point but with a new aspect that is integrating the soft biometrics with fingerprint and face for improving the performance of biometric system. Here we have proposed an architecture of three different sensors to evaluate the system performance. The approach includes soft biometrics, fingerprint and face features, we have also proven the efficiency of proposed system regarding FAR (False Acceptance Ratio and total response time, with the help of MUBI tool (Multimodal Biometrics Integration.

  20. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    Science.gov (United States)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the

  1. Multispectral biometrics systems and applications

    CERN Document Server

    Zhang, David; Gong, Yazhuo

    2016-01-01

    Describing several new biometric technologies, such as high-resolution fingerprint, finger-knuckle-print, multi-spectral backhand, 3D fingerprint, tongueprint, 3D ear, and multi-spectral iris recognition technologies, this book analyzes a number of efficient feature extraction, matching and fusion algorithms and how potential systems have been developed. Focusing on how to develop new biometric technologies based on the requirements of applications, and how to design efficient algorithms to deliver better performance, the work is based on the author’s research with experimental results under different challenging conditions described in the text. The book offers a valuable resource for researchers, professionals and postgraduate students working in the fields of computer vision, pattern recognition, biometrics, and security applications, amongst others.

  2. 3D biometrics systems and applications

    CERN Document Server

    Zhang, David

    2013-01-01

    Includes discussions on popular 3D imaging technologies, combines them with biometric applications, and then presents real 3D biometric systems Introduces many efficient 3D feature extraction, matching, and fusion algorithms Techniques presented have been supported by experimental results using various 3D biometric classifications

  3. Multimodal biometric approach for cancelable face template generation

    Science.gov (United States)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  4. Improving Existing e-payment Systems by Implementing the Concept of Cancelable Biometrics

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ghosh

    2010-07-01

    Full Text Available Biometric Security Systems have numerous problems because of the fact that the biometric data of a person is stored in the system. These problems would arise when that data is compromised. The standard password based security systems have the ability to cancel the compromised password and reissue a new one. The biometrics cannot becanceled or changed which can be their advantage and a disadvantage in this particular situation. The concept of cancelable biometrics can improve the biometric security system so that it gains the advantages of the password based security system, by not losing the inherent superiority. This paper proposes a novel approach by utilizing cancelable biometric features for securely storing the fingerprint template by generating Secured Feature Matrix and keys for cryptographic techniques applied for data Encryption or Decryption. The conservative techniques rely on biometric features such as face, fingerprint, hand geometry, iris, signature, keystroke, voice, etc for extracting key information. If a Biometric Key is lost or stolen, it is lost forever and perhaps for every application where the biometric is used, because a biometric is enduringly linked with a user and cannot be changed. The use of cancelable biometric features enhances the robustness and reliability of the cryptography technique. There are several biometric systems invented for cryptography, but the proposed cancelable biometric cryptography technique fashions novel biometric systems to generate Cryptographic Key.

  5. Direct Problems and Inverse Problems in Biometric Systems

    Directory of Open Access Journals (Sweden)

    Mihailescu Marius Iulian

    2013-10-01

    Full Text Available The article purpose is to describe the two sides of biometrics technologies, direct problems and inverse problems. The advance that we face today in field of Information Technology makes Information Security an inseparable part. The authentication has a huge role when we deal about security. The problems that can appear in implementing and developing biometrics systems is raising many problems, and one of the goal of this article is to focus on direct and inverse problems which is a new and challenging branch in biometrics technologies.

  6. Towards a General Definition of Biometric Systems

    CERN Document Server

    Schatten, Markus; Cubrilo, Mirko

    2009-01-01

    A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In the end a Unified Modeling Language model is developed showing the connections between the two perspectives.

  7. Elastic Face, An Anatomy-Based Biometrics Beyond Visible Cue

    Energy Technology Data Exchange (ETDEWEB)

    Tsap, L V; Zhang, Y; Kundu, S J; Goldgof, D B; Sarkar, S

    2004-03-29

    This paper describes a face recognition method that is designed based on the consideration of anatomical and biomechanical characteristics of facial tissues. Elastic strain pattern inferred from face expression can reveal an individual's biometric signature associated with the underlying anatomical structure, and thus has the potential for face recognition. A method based on the continuum mechanics in finite element formulation is employed to compute the strain pattern. Experiments show very promising results. The proposed method is quite different from other face recognition methods and both its advantages and limitations, as well as future research for improvement are discussed.

  8. An Efficient Human Identification through MultiModal Biometric System

    Directory of Open Access Journals (Sweden)

    K. Meena

    Full Text Available ABSTRACT Human identification is essential for proper functioning of society. Human identification through multimodal biometrics is becoming an emerging trend, and one of the reasons is to improve recognition accuracy. Unimodal biometric systems are affected by various problemssuch as noisy sensor data,non-universality, lack of individuality, lack of invariant representation and susceptibility to circumvention.A unimodal system has limited accuracy. Hence, Multimodal biometric systems by combining more than one biometric feature in different levels are proposed in order to enhance the performance of the system. A supervisor module combines the different opinions or decisions delivered by each subsystem and then make a final decision. In this paper, a multimodal biometrics authentication is proposed by combining face, iris and finger features. Biometric features are extracted by Local Derivative Ternary Pattern (LDTP in Contourlet domain and an extensive evaluation of LDTP is done using Support Vector Machine and Nearest Neighborhood Classifier. The experimental evaluations are performed on a public dataset demonstrating the accuracy of the proposed system compared with the existing systems. It is observed that, the combination of face, fingerprint and iris gives better performance in terms of accuracy, False Acceptance Rate, False Rejection Rate with minimum computation time.

  9. Transfer Function Control for Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodinsky, Carlos M. (Inventor)

    2015-01-01

    A modular apparatus for acquiring biometric data may include circuitry operative to receive an input signal indicative of a biometric condition, the circuitry being configured to process the input signal according to a transfer function thereof and to provide a corresponding processed input signal. A controller is configured to provide at least one control signal to the circuitry to programmatically modify the transfer function of the modular system to facilitate acquisition of the biometric data.

  10. 融合指纹和人脸的生物特征身份认证方法%Multiplex Biometric Verification System Based on Fingerprint and Face

    Institute of Scientific and Technical Information of China (English)

    王小雪; 杨会成

    2013-01-01

    The main algorithms of two single-mode authentication system,based on face,fingerprint identification were introduced respectively.In fingerprint identification subsystem,the improved algorithm of OPTA(One-Pass Thinning Algorithm) was applied to thinning binary image of the fingerprint image.Then,the feature images were matched by the Hough transform.And in the face identification subsystem,a method combined the way of feature extraction based on 2D Gabor filter with the matching algorithm of 3 D face was applied.One two-mode biometrics fusion system was proposed.The linear fusion approach about the matching rate of each subsystem was applied in decision-making level.The experimental results demonstrate that the established system works safer with low False Acceptance Rate.%在指纹识别模块中采用改进的OPTA算法对指纹图像进行二值化和细化,采用基于Hough变换点模式匹配算法对特征图像进行匹配;在人脸识别模块中,采用基于二维Gabor滤波的特征提取法和三维人脸匹配方法相结合的识别方法.建立了融合指纹和人脸两种生物特征的识别系统,利用单一特征匹配的结果分数,在决策层采用线性方法进行融合.实验结果表明:建立的融合系统降低了错误接受率,提高了系统的安全级别.

  11. An Adaptive Multimodal Biometrics System using PSO

    Directory of Open Access Journals (Sweden)

    Ola M. Aly

    2013-08-01

    Full Text Available Multimodal biometric systems which fuse information from a number of biometrics, are gaining more attentions lately because they are able to overcome limitations in unimodal biometric systems. These systems are suited for high security applications. Most of the proposed multibiometric systems offer one level of security. In this paper a new approach for adaptive combination of multiple biometrics has been proposed to ensure multiple levels of security. The score level fusion rule is adapted using (PSO Particle Swarm Optimization to ensure the desired system performance corresponding to the desired level of security. The experimental results prove that the proposed multimodal biometric system is appropriate for applications that require different levels of security.

  12. Biometric-based personal identity-authentication system and security analysis

    Institute of Scientific and Technical Information of China (English)

    LI Chao; YANG Yi-xian; NIU Xin-xin

    2006-01-01

    The traditional authentication system is based on the secret key, and is mainly based on public key infrastructure (PKI). Unfortunately, a key has many disadvantages, for example, the key can be forgotten or stolen, and can be easily cracked. Nowadays, authentication systems using biometric technology have become more prevalent because of the advantages over password-based authentication systems. In this article, several biometric authentication models are presented,upon which most biometric authentication systems are based.Biometric authentication systems based-on these models provide high security for access control in non-face-to-face environment such as e-commerce, over open network.

  13. Biometric Systems: Evolution, Applications and Technology

    Directory of Open Access Journals (Sweden)

    Deepti

    2014-11-01

    Full Text Available Biometrics is a futuristic and yet a current technology, with an ever bigger role in the future. Biometrics will not be able to replace passwords, swipe cards, or pin numbers etc., rather work with them in enhancing security in a simple, reliable, and cost effective way. Biometrics revolution has led to over 1 billion people being already covered by biometric identification programs in the lower middle income countries. Biometric system covers application pertaining to Authentication, Transaction, Access Privilege and it relies on Credentials, Demographics and Sensor data to get a match score with certain degree of confidence using biometric recognition tools. Biometrics systems are extremely useful due to its traits such as security (stop unauthorised person from getting access, convenience (No need to carry credentials like Identity proofs etc., Audit trail (creates an audit trail for say bank vault access etc., Fraud prevention (verifying if credit card holder is rightful owner at PoS, and de-duplication (One person, one documentation. India’s well known and ambitious pan-India project of Adhaar Card is one good example relying on biometric application for generating unique identification and de-duplication for wide ranging government schemes

  14. BIOMETRIC SYSTEMS: EVOLUTION, APPLICATIONS AND TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    Deepti Kumar

    2015-10-01

    Full Text Available Biometrics is a futuristic and yet a current technology, with an ever bigger role in the future. Biometrics will not be able to replace passwords, swipe cards, or pin numbers etc., rather work with them in enhancing security in a simple, reliable, and cost effective way. Biometrics revolution has led to over 1 billion people being already covered by biometric identification programs in the lower middle income countries. Biometric system covers application pertaining to Authentication, Transaction, Access Privilege and it relies on Credentials, Demographics and Sensor data to get a match score with certain degree of confidence using biometric recognition tools. Biometrics systems are extremely useful due to its traits such as security (stop unauthorised person from getting access, convenience (No need to carry credentials like Identity proofs etc., Audit trail (creates an audit trail for say bank vault access etc., Fraud prevention (verifying if credit card holder is rightful owner at PoS, and de-duplication (One person, one documentation. India’s well known and ambitious pan-India project of Adhaar Card is one good example relying on biometric application for generating unique identification and de-duplication for wide ranging government schemes.

  15. A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system.

    Science.gov (United States)

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  16. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Min-Gu Kim

    2012-01-01

    Full Text Available Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  17. A Vein Map Biometric System

    Directory of Open Access Journals (Sweden)

    Felix Fuentes

    2013-08-01

    Full Text Available There is increasing demand world-wide, from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but userfriendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed negatively because of many cultural and hygienic issues associated with them. Comparatively, mapping veins as a human barcode, a new technology, has many advantages over older technologies. Specifically, reproducing a three-dimensional model of a human vein system is impossible to replicate. Vein map technology is distinctive because of its state-of-the-art sensors are only able to recognize vein patterns if hemoglobin is actively flowing through the person

  18. Data Acquisition for Modular Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodsinsky, Carlos M. (Inventor)

    2014-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to collect data asynchronously, via the bus, from the memory of the plurality of data acquisition modules according to a relative fullness of the memory of the plurality of data acquisition modules.

  19. Enhanced ATM Security System using Biometrics

    Directory of Open Access Journals (Sweden)

    Selina Oko

    2012-09-01

    Full Text Available Because biometrics-based authentication offers several advantages over other authentication methods, there hasbeen a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine system has been improved by integrating the fingerprint of the user into the banks database as to further authenticate it. This was achieved by modelling and building an ATM simulator that will mimic a typical ATM system. The end result is an enhanced biometric authenticated ATM system that ensures greater security and increased customers confidence in the banking sector.

  20. Enhanced ATM Security System using Biometrics

    OpenAIRE

    Selina Oko; Jane Oruh

    2012-01-01

    Because biometrics-based authentication offers several advantages over other authentication methods, there hasbeen a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine) system has been improved by integrating the fingerprint of the user into the banks database as to further authenticate it. This was achieved by modelling and building an ATM simulator that will mimic a typical ATM system. ...

  1. Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-02-01

    Full Text Available Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics face and fingerprints. The privacy and security implications of this impending worldwide experiment in biometrics face and fingerprints authentication technology. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and face and fingerprint biometric passport using ASP.Net.

  2. Feature Level Fusion of Face and Fingerprint Biometrics

    CERN Document Server

    Rattani, Ajita; Bicego, Manuele; Tistarelli, Massimo

    2010-01-01

    The aim of this paper is to study the fusion at feature extraction level for face and fingerprint biometrics. The proposed approach is based on the fusion of the two traits by extracting independent feature pointsets from the two modalities, and making the two pointsets compatible for concatenation. Moreover, to handle the problem of curse of dimensionality, the feature pointsets are properly reduced in dimension. Different feature reduction techniques are implemented, prior and after the feature pointsets fusion, and the results are duly recorded. The fused feature pointset for the database and the query face and fingerprint images are matched using techniques based on either the point pattern matching, or the Delaunay triangulation. Comparative experiments are conducted on chimeric and real databases, to assess the actual advantage of the fusion performed at the feature extraction level, in comparison to the matching score level.

  3. Protection of Biometric Information

    Science.gov (United States)

    Kevenaar, Tom

    The field of biometrics is concerned with recognizing individuals by means of unique physiological or behavioral characteristics. In practical systems, several biometric modalities are used, such as fingerprint, face, iris, hand geometry, and so forth. Recently, biometric systems are becoming increasingly popular because they potentially offer more secure solutions than other identification means such as PIN codes and security badges because a biometric is tightly linked to an individual. For the same reason, biometrics can prevent the use of several identities by a single individual. Finally, biometrics are also more convenient because, unlike passwords and PIN codes, they cannot be forgotten and are always at hand.

  4. Is spectral reflectance of the face a reliable biometric?

    Science.gov (United States)

    Uzair, Muhammad; Mahmood, Arif; Shafait, Faisal; Nansen, Christian; Mian, Ajmal

    2015-06-15

    Over a decade ago, Pan et al. [IEEE TPAMI 25, 1552 (2003)] performed face recognition using only the spectral reflectance of the face at six points and reported around 95% recognition rate. Since their database is private, no one has been able to replicate these results. Moreover, due to the unavailability of public datasets, there has been no detailed study in the literature on the viability of facial spectral reflectance for person identification. In this study, we introduce a new public database of facial spectral reflectance profiles measured with a high precision spectrometer. For each of the 40 subjects, spectral reflectance was measured at the same six points as Pan et al. [IEEE TPAMI 25, 1552 (2003)] in multiple sessions and with time lapse. Furthermore, we sample the facial spectral reflectance from two public hyperspectral face image datasets and analyzed the data using state of the art face classification techniques. The best performing classifier achieved the maximum rank-1 identification rate of 53.8%. We conclude that facial spectral reflectance alone is not a reliable biometric for unconstrained face recognition.

  5. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    Science.gov (United States)

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  6. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  7. Biometric Security - Fingerprint Recognition System

    Directory of Open Access Journals (Sweden)

    Alexandra Emanuela Vacarus

    2015-03-01

    Full Text Available The paper presents an application, FingerTouch that provides a secure method of storing usernames and passwords for different types of accounts by using biometric fingerprint authentication. Recent developments in the smartphone area regarding fingerprint authentication on mobile devices is discussed. The purpose of the application and the technologies that were used in the development are described. The features, architecture and implementation of the application are analyzed.

  8. GREYC Keystroke: a Benchmark for Keystroke Dynamics Biometric Systems

    OpenAIRE

    Giot, Romain; El-Abed, Mohamad; Rosenberger, Christophe

    2009-01-01

    International audience; Even if the market penetration rate of biometric technologies is still far below its potential, many biometric systems are used in our daily real-life. One of the main reasons to its low proliferation is the lack of a generic and complete approach that quantifies the performance of biometric systems taking into account individuals' perception among the process. Among all the existing biometric modalities, authentication systems based on keystroke dynamics are particula...

  9. The biometric-based module of smart grid system

    Science.gov (United States)

    Engel, E.; Kovalev, I. V.; Ermoshkina, A.

    2015-10-01

    Within Smart Grid concept the flexible biometric-based module base on Principal Component Analysis (PCA) and selective Neural Network is developed. The formation of the selective Neural Network the biometric-based module uses the method which includes three main stages: preliminary processing of the image, face localization and face recognition. Experiments on the Yale face database show that (i) selective Neural Network exhibits promising classification capability for face detection, recognition problems; and (ii) the proposed biometric-based module achieves near real-time face detection, recognition speed and the competitive performance, as compared to some existing subspaces-based methods.

  10. Challenges at different stages of an iris based biometric system

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2012-04-01

    Full Text Available Iris recognition has been used for authentication for the past few years and is capable of positive/negative authenticationof an individual without any physical contact or intervention. This technique is being used mainly because of its uniqueness,stability, and reliability but still many challenges are being faced an the iris based recognition system. This paperpresents the difficulties faced in different modules, like the sensor module, preprocessing module, feature extraction module,and matching module of an iris biometric system.

  11. Fusion of footsteps and face biometrics on an unsupervised and uncontrolled environment

    Science.gov (United States)

    Vera-Rodriguez, Ruben; Tome, Pedro; Fierrez, Julian; Ortega-Garcia, Javier

    2012-06-01

    This paper reports for the first time experiments on the fusion of footsteps and face on an unsupervised and not controlled environment for person authentication. Footstep recognition is a relatively new biometric based on signals extracted from people walking over floor sensors. The idea of the fusion between footsteps and face starts from the premise that in an area where footstep sensors are installed it is very simple to place a camera to capture also the face of the person that walks over the sensors. This setup may find application in scenarios like ambient assisted living, smart homes, eldercare, or security access. The paper reports a comparative assessment of both biometrics using the same database and experimental protocols. In the experimental work we consider two different applications: smart homes (small group of users with a large set of training data) and security access (larger group of users with a small set of training data) obtaining results of 0.9% and 5.8% EER respectively for the fusion of both modalities. This is a significant performance improvement compared with the results obtained by the individual systems.

  12. A Survey of Security of Multimodal Biometric Systems

    Directory of Open Access Journals (Sweden)

    Suvarnsing G. Bhable

    2015-12-01

    Full Text Available A biometric system is essentially a pattern recognition system being used in adversarial environment. Since, biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate data to make the system ineffective by compromising its integrity. Current theory and design methods of biometric systems do not take into account the vulnerability to such adversary attacks. Therefore, evaluation of classical design methods is an open problem to investigate whether they lead to design secure systems. In order to make biometric systems secure it is necessary to understand and evaluate the threats and to thus develop effective countermeasures and robust system designs, both technical and procedural, if necessary. Accordingly, the extension of theory and design methods of biometric systems is mandatory to safeguard the security and reliability of biometric systems in adversarial environments.

  13. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    Institute of Scientific and Technical Information of China (English)

    Jun Won AN

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  14. Method to assess the temporal persistence of potential biometric features: Application to oculomotor, gait, face and brain structure databases

    Science.gov (United States)

    Nixon, Mark S.; Komogortsev, Oleg V.

    2017-01-01

    We introduce the intraclass correlation coefficient (ICC) to the biometric community as an index of the temporal persistence, or stability, of a single biometric feature. It requires, as input, a feature on an interval or ratio scale, and which is reasonably normally distributed, and it can only be calculated if each subject is tested on 2 or more occasions. For a biometric system, with multiple features available for selection, the ICC can be used to measure the relative stability of each feature. We show, for 14 distinct data sets (1 synthetic, 8 eye-movement-related, 2 gait-related, and 2 face-recognition-related, and one brain-structure-related), that selecting the most stable features, based on the ICC, resulted in the best biometric performance generally. Analyses based on using only the most stable features produced superior Rank-1-Identification Rate (Rank-1-IR) performance in 12 of 14 databases (p = 0.0065, one-tailed), when compared to other sets of features, including the set of all features. For Equal Error Rate (EER), using a subset of only high-ICC features also produced superior performance in 12 of 14 databases (p = 0. 0065, one-tailed). In general, then, for our databases, prescreening potential biometric features, and choosing only highly reliable features yields better performance than choosing lower ICC features or than choosing all features combined. We also determined that, as the ICC of a group of features increases, the median of the genuine similarity score distribution increases and the spread of this distribution decreases. There was no statistically significant similar relationships for the impostor distributions. We believe that the ICC will find many uses in biometric research. In case of the eye movement-driven biometrics, the use of reliable features, as measured by ICC, allowed to us achieve the authentication performance with EER = 2.01%, which was not possible before. PMID:28575030

  15. A review of data acquisition and difficulties in sensor module of biometric systems

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2013-10-01

    Full Text Available Biometrics refers to the recognition of individuals based on their physiological and/or behavioral characteristics. Thebiometric traits which may be considered for the authentication of a person are face, hand geometry, finger print, vein, iris,etc. A competent selection of a sensor, its mechanism and adaptability is required, as the absence of these will leave thebiometric sensor deceptive to information sensing. Selecting a sensor for a biometric application from the large number ofavailable sensors with different technologies always brought the issue of performance and accuracy. Therefore, various errorrates and sensibility contention differentiate the available biometric sensors. This paper presents the difficulties faced in thesensor module of the biometric system and the incomparable alternatives on the basis of availability of information at sensormodule of the various systems.

  16. Biometrics Theory, Methods, and Applications

    CERN Document Server

    Boulgouris, N V; Micheli-Tzanakou, Evangelia

    2009-01-01

    An in-depth examination of the cutting edge of biometrics. This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:. Multilinear discriminant analysis for biometric signal recognition;. Biometric identity authentication techniques based on neural networks;. Multimodal biometrics and design of classifiers for biometric fusion;. Feature selection and facial aging modeling for face recognition;. Geometrical and

  17. Curvelet and Ridgelet-based Multimodal Biometric Recognition System using Weighted Similarity Approach

    Directory of Open Access Journals (Sweden)

    S. Arivazhagan

    2014-03-01

    Full Text Available Biometric security artifacts for establishing the identity of a person with high confidence have evoked enormous interest in security and access control applications for the past few years. Biometric systems based solely on unimodal biometrics often suffer from problems such as noise, intra-class variations and spoof attacks. This paper presents a novel multimodal biometric recognition system by integrating three biometric traits namely iris, fingerprint and face using weighted similarity approach. In this work, the multi-resolution features are extracted independently from query images using curvelet and ridgelet transforms, and are then compared to the enrolled templates stored in the database containing features of each biometric trait. The final decision is made by normalizing the feature vectors, assigning different weights to the modalities and fusing the computed scores using score combination techniques. This system is tested with the public unimodal databases such as CASIA–Iris-V3-Interval, FVC2004, ORL and self-built multimodal databases. Experimental results obtained shows that the designed system achieves an excellent recognition rate of 98.75 per cent and 100 per cent for the public and self-built databases respectively and provides ultra high security than unimodal biometric systems.Defence Science Journal, 2014, 64(2, pp. 106-114. DOI: http://dx.doi.org/10.14429/dsj.64.3469

  18. Real Time Implementation Of Face Recognition System

    Directory of Open Access Journals (Sweden)

    Megha Manchanda

    2014-10-01

    Full Text Available This paper proposes face recognition method using PCA for real time implementation. Nowadays security is gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such implementations however, are becoming less secure and practical, also is becoming more problematic thus leading to an increasing interest in techniques related to biometrics systems. Face recognition system is amongst important subjects in biometrics systems. This system is very useful for security in particular and has been widely used and developed in many countries. This study aims to achieve face recognition successfully by detecting human face in real time, based on Principal Component Analysis (PCA algorithm.

  19. Physiological Biometric Authentication Systems Advantages Disadvantages And Future Development A Review

    Directory of Open Access Journals (Sweden)

    Israa M. Alsaadi

    2015-08-01

    Full Text Available Abstract With the fast increasing of the electronic crimes and their related issues deploying a reliable user authentication system became a significant task for both of access control and securing users private data. Human biometric characteristics such as face finger iris scanning voice signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages disadvantages and future developments of each method is provided in this paper.

  20. Multimodal Biometric-based Secured Authentication System using Steganography

    Directory of Open Access Journals (Sweden)

    S. Swamynathan

    2012-01-01

    Full Text Available Problem statement: The main challenge in the design of a security system for high security mobile ad OC network is how to prevent the attacks against data modification and authentication. Approach: In this novel proposed system the messages communicated between the users are encrypted by the cancellable cryptographic key generated from fingerprint features of the receiver by applying genetic operators and are embedded inside the scrambled face biometrics of the sender using steganography method. Results: The receiver first unscrambles the facial image of the sender and separates the facial image and the encrypted data. Then he verifies the sender by using an Eigen face recognition algorithm and if he is a genuine sender he decrypts the cipher text with the key generated using the receiver’s fingerprint biometric. Conclusion/Recommendations: By this way, the receiver ensures the genuineness of the sender and data confidentiality. Revocability is also guaranteed since we apply genetic operator to randomize the cryptographic key whenever it is necessary. By simulation results, we also show that the proposed method is more efficient mechanism for authentication and security.

  1. Biometric Authentication System based on Iris Patterns

    Directory of Open Access Journals (Sweden)

    G. Sathish

    2012-01-01

    Full Text Available In the present age of digital impersonation, biometrictechniques are being used increasingly to prevaricateagainst identity thefts. Iris recognition is a proven,accurate means to identify people. Iris is regarded as themost reliable biometric feature in terms of its uniquenessand robustness. The objective of this work is to present abiometric authentication system for high securityphysical access control based on iris pattern. Theproposed iris recognition with improvement in segmentation and matching stages using Hamming distance provides match for iris pattern if hamming distance is below 0.15. The CASIA IRIS image database of Chinese Academy of Sciences Institute of Automation is used and the system is implemented in MATLAB. The proposed approach found to report higher verification accuracy of 99.2%.

  2. Biometric verification with correlation filters

    Science.gov (United States)

    Vijaya Kumar, B. V. K.; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-01

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification.

  3. Review: Biometric and GSM Security for Lockers

    Directory of Open Access Journals (Sweden)

    Sagar S. Palsodkar

    2014-12-01

    Full Text Available In this review paper we will develop biometric (finger or face and GSM technology for bank lockers. Because in this system bank will collect the biometric data of each person for accessing the lockers because in this system only authenticated person recover the money, documents from the lockers. So the biometric and GSM security has more advantages then other system. Because biometric is stored individual identity of a person and GSM is used for sending and receiving message.

  4. Biometric template revocation

    Science.gov (United States)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  5. INTEGRATED EXPRESSIONAL AND COLOR INVARIANT FACIAL RECOGNITION SCHEME FOR HUMAN BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    M.Punithavalli

    2013-09-01

    Full Text Available In many practical applications like biometrics, video surveillance and human computer interaction, face recognition plays a major role. The previous works focused on recognizing and enhancing the biometric systems based on the facial components of the system. In this work, we are going to build Integrated Expressional and Color Invariant Facial Recognition scheme for human biometric recognition suited to different security provisioning public participation areas.At first, the features of the face are identified and processed using bayes classifier with RGB and HSV color bands. Second, psychological emotional variance are identified and linked with the respective human facial expression based on the facial action code system. Finally, an integrated expressional and color invariant facial recognition is proposed for varied conditions of illumination, pose, transformation, etc. These conditions on color invariant model are suited to easy and more efficient biometric recognition system in public domain and high confidential security zones. The integration is made derived genetic operation on the color and expression components of the facial feature system. Experimental evaluation is planned to done with public face databases (DBs such as CMU-PIE, Color FERET, XM2VTSDB, SCface, and FRGC 2.0 to estimate the performance of the proposed integrated expressional facial and color invariant recognition scheme [IEFCIRS]. Performance evaluation is done based on the constraints like recognition rate, security and evalaution time.

  6. Development of Palmprint Verification System Using Biometrics

    Institute of Scientific and Technical Information of China (English)

    G. Shobha; M. Krishna; S.C. Sharma

    2006-01-01

    Palmprint verification system using Biometrics is one of the emerging technologies, which recognizes a person based on the principle lines, wrinkles and ridges on the surface of the palm. These line structures are stable and remain unchanged throughout the life of an individual. More importantly, no two palmprints from different individuals are the same, and normally people do not feel uneasy to have their palmprint images taken for testing. Therefore palmprint recognition offers a promising future for medium-security access control systems. In this paper, a new approach for personal authentication using hand images is discussed. Gray-Scale palm images are captured using a digital camera at a resolution of 640′480. Each of these gray-scale images is aligned and then used to extract palmprint and hand geometry features. These features are then used for authenticating users. The image acquisition setup used here is inherently simple and it does not employ any special illumination nor does it use any pegs that might cause any inconvenience to users. Experimental results show that the designed system achieves an acceptable level of performance.

  7. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  8. A new Watermarking System based on Discrete Cosine Transform (DCT) in color biometric images.

    Science.gov (United States)

    Dogan, Sengul; Tuncer, Turker; Avci, Engin; Gulten, Arif

    2012-08-01

    This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.

  9. Mathematical and information maintenance of biometric systems

    Science.gov (United States)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  10. Biometric citizenship and alienage

    DEFF Research Database (Denmark)

    Stenum, Helle

    Biometric identifiers (finger prints, face scans, iris scans etc.) have increasingly become a key element in technology of EU border and migration management. SIS II, EURODAC and VIS are centralized systems that contain fingerprints of different groups of non-EU citizen, and the biometric...... identifier is stored in order to link a specific body to specific information related to status (asylum seeker, entry banned, convicted etc.). Finger prints are also integrated in passports in the EU, but this biometric information is restricted to establish only the link between the body and the passport....... This paper asks if and how biometric techniques are the basis of a re-structuring of management of migration and mobility: Is the suggestion of biometric identifiers reflecting the withdrawal from the principle of rights applied to human beings as an abstract of the universal individual all being equal...

  11. Biometric Authentication Systems: Religious Ideology and ...

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... ultimately centralizes software management. Computer ... computers, a pool of information resource. The internet ... some of the examples of a peculiar biometric ... African attitude to issues and situations today ... various ethnic groups fought wars to prevent ... Britain, US, Malaysia, Australia, India, Saudi.

  12. Modelling of Biometric Identification System with Given Parameters Using Colored Petri Nets

    Science.gov (United States)

    Petrosyan, G.; Ter-Vardanyan, L.; Gaboutchian, A.

    2017-05-01

    Biometric identification systems use given parameters and function on the basis of Colored Petri Nets as a modelling language developed for systems in which communication, synchronization and distributed resources play an important role. Colored Petri Nets combine the strengths of Classical Petri Nets with the power of a high-level programming language. Coloured Petri Nets have both, formal intuitive and graphical presentations. Graphical CPN model consists of a set of interacting modules which include a network of places, transitions and arcs. Mathematical representation has a well-defined syntax and semantics, as well as defines system behavioural properties. One of the best known features used in biometric is the human finger print pattern. During the last decade other human features have become of interest, such as iris-based or face recognition. The objective of this paper is to introduce the fundamental concepts of Petri Nets in relation to tooth shape analysis. Biometric identification systems functioning has two phases: data enrollment phase and identification phase. During the data enrollment phase images of teeth are added to database. This record contains enrollment data as a noisy version of the biometrical data corresponding to the individual. During the identification phase an unknown individual is observed again and is compared to the enrollment data in the database and then system estimates the individual. The purpose of modeling biometric identification system by means of Petri Nets is to reveal the following aspects of the functioning model: the efficiency of the model, behavior of the model, mistakes and accidents in the model, feasibility of the model simplification or substitution of its separate components for more effective components without interfering system functioning. The results of biometric identification system modeling and evaluating are presented and discussed.

  13. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  14. Atmospheric turbulence and sensor system effects on biometric algorithm performance

    Science.gov (United States)

    Espinola, Richard L.; Leonard, Kevin R.; Byrd, Kenneth A.; Potvin, Guy

    2015-05-01

    Biometric technologies composed of electro-optical/infrared (EO/IR) sensor systems and advanced matching algorithms are being used in various force protection/security and tactical surveillance applications. To date, most of these sensor systems have been widely used in controlled conditions with varying success (e.g., short range, uniform illumination, cooperative subjects). However the limiting conditions of such systems have yet to be fully studied for long range applications and degraded imaging environments. Biometric technologies used for long range applications will invariably suffer from the effects of atmospheric turbulence degradation. Atmospheric turbulence causes blur, distortion and intensity fluctuations that can severely degrade image quality of electro-optic and thermal imaging systems and, for the case of biometrics technology, translate to poor matching algorithm performance. In this paper, we evaluate the effects of atmospheric turbulence and sensor resolution on biometric matching algorithm performance. We use a subset of the Facial Recognition Technology (FERET) database and a commercial algorithm to analyze facial recognition performance on turbulence degraded facial images. The goal of this work is to understand the feasibility of long-range facial recognition in degraded imaging conditions, and the utility of camera parameter trade studies to enable the design of the next generation biometrics sensor systems.

  15. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  16. Security System for Mobile Voting with Biometrics

    Directory of Open Access Journals (Sweden)

    Laurentiu Marinescu

    2015-09-01

    Full Text Available For centuries, voting has been a democratic right and way to choose our politicians. Nowadays, the voting process became a major issue in order to avoid crucial vulnerabilities like multiple voting, missing ballot papers, electoral fraud and miscount votes in an election. To prevent those leaks in our current voting system and to improve other factors like time-consuming and reducing cost of resources, I decided to implement a secured mobile voting system on android.In today’s era, the number of people that possess a smart-phone is larger and larger and also the advanced stage of technology can concur to a reliable solution for voting.The architecture of this system will contain the mobile application that need to be installed on a mobile device, also will contain a server to compute multiple operations (face detection, face recognition and matching the face with the existing ones, matching unique id of the smart-phone with the one stored in database based on user personal identification number and a server database. Firstly, an introduction about the subject and system is presented. Problem formulation will contain a research about this topic. Solution of the problem is presented in four subsections: architecture of the system, implementation, face recognition verifier and other solutions.

  17. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  18. Palmprint and Face Multi-Modal Biometric Recognition Based on SDA-GSVD and Its Kernelization

    Directory of Open Access Journals (Sweden)

    Jing-Yu Yang

    2012-04-01

    Full Text Available When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person’s overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA. Specifically, one person’s different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance.

  19. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... of a mobile biometric authentication system based on electroencephalogram (EEG) recordings in combination with already proven technologies such as facial detection and near-field communication (NFC). The overall goal of this work is to fill the gap between mobile web technologies and wireless EEG devices...

  20. Multimodal biometrics approach using face and ear recognition to overcome adverse effects of pose changes

    Science.gov (United States)

    Wang, Yu; He, Dejian; Yu, Chongchong; Jiang, Tongqiang; Liu, Zaiwen

    2012-10-01

    A personal identification method is proposed which uses face and ear together to overcome mass information loss resulting from pose changes. Several aspects are mainly considered: First, ears are at both sides of the face. Their physiological position is approximately orthogonal and their information is complementary to each other when the head pose changes. Therefore, fusing the face and ear is reasonable. Second, the texture feature is extracted using a uniform local binary pattern (ULBP) descriptor which is more compact. Third, Haar wavelet transform, blocked-based, and multiscale ideas are taken into account to further strengthen the extracted texture information. Finally, texture features of face and ear are fused using serial strategy, parallel strategy, and kernel canonical correlation analysis to further increase the recognition rate. Experimental results show that it is both fast and robust to use ULBP to extract texture features. Haar wavelet transform, block-based, and multiscale methods can effectively enhance texture information of the face or ear ULBP descriptor. Multimodal biometrics fusion about face and ear is feasible and effective. The recognition rates of the proposed approach outperform remarkably those of the classic principal component analysis (PCA), kernel PCA, or Gabor texture feature extraction method especially when sharp pose change happens.

  1. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  2. Optimization of a Biometric System Based on Acoustic Images

    Science.gov (United States)

    Izquierdo Fuente, Alberto; Del Val Puente, Lara; Villacorta Calvo, Juan J.; Raboso Mateos, Mariano

    2014-01-01

    On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced. PMID:24616643

  3. Optimization of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Alberto Izquierdo Fuente

    2014-01-01

    Full Text Available On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced.

  4. RANK LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS

    Directory of Open Access Journals (Sweden)

    N. Radha

    2011-12-01

    Full Text Available Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN or Passwords and key devices such as Smart cards are not presently sufficient in few situations. The biometric improves the capability to recognize the persons. A biometric identificationsystem is an automatic recognition system that recognizes a person based on the physiological (e.g., fingerprints,face, retina, iris, ear or behavioral (e.g., gait, signature, voice characteristics. In many real-world applications,unimodal biometric systems often face has significant limitations due to sensitivity to noise, intra classvariability, data quality, non-universality, and other factors. Multimodal biometric systems overcome some of these limitations. Multimodal biometric system provides more accuracy when compared to unimodal biometric system. The main goal of multimodal biometric system is to develop the security system for the areas that require high level of security. The proposed system focused on developing a multimodal biometrics system,which uses biometrics such as fingerprint and iris. Fusion of biometrics is performed by means of rank level fusion. The features from the biometrics are obtained by using the FLD (Fisher Linear Discriminant. The experimental result shows the performance of the proposed multimodal biometrics system. In this paper, the decision is made using rank level fusion and the ranks of individual persons are calculated using the Borda count, and Logistic regression approaches.

  5. Performance of Personal Identification System Technique Using Iris Biometrics Technology

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2013-04-01

    Full Text Available The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris recognition uses iris patterns for personnel identification. The system steps are capturing iris patterns; determining the location of iris boundaries; converting the iris boundary to the stretched polar coordinate system; extracting iris code based on texture analysis. The system has been implemented and tested using dataset of number of samples of iris data with different contrast quality. The developed algorithm performs satisfactorily on the images, provides 93% accuracy. Experimental results show that the proposed method has an encouraging performance.

  6. Performance Evaluation of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Juan J. Villacorta

    2011-10-01

    Full Text Available An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side. Two Uniform Linear Arrays (ULA with 15 l/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR/False Non-Match Rate (FNMR parameters and the Receiver Operating Characteristic (ROC curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications.

  7. An Observed Voting System Based On Biometric Technique

    Directory of Open Access Journals (Sweden)

    B. Devikiruba

    2015-08-01

    Full Text Available ABSTRACT This article describes a computational framework which can run almost on every computer connected to an IP based network to study biometric techniques. This paper discusses with a system protecting confidential information puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is becoming a competitor for current identification mechanisms. The experimentation section focuses on biometric verification specifically based on fingerprints. This article should be read as a warning to those thinking of using methods of identification without first examine the technical opportunities for compromising mechanisms and the associated legal consequences. The development is based on the java language that easily improves software packages that is useful to test new control techniques.

  8. Accuracy, security, and processing time comparisons of biometric fingerprint recognition system using digital and optical enhancements

    Science.gov (United States)

    Alsharif, Salim; El-Saba, Aed; Jagapathi, Rajendarreddy

    2011-06-01

    Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Besides cost, issues related to accuracy, security, and processing time in practical biometric recognition systems represent the most critical factors that makes these systems widely acceptable. Accurate and secure biometric systems often require sophisticated enhancement and encoding techniques that burdens the overall processing time of the system. In this paper we present a comparison between common digital and optical enhancementencoding techniques with respect to their accuracy, security and processing time, when applied to biometric fingerprint systems.

  9. Evaluation of biometric security systems against artificial fingers

    OpenAIRE

    2003-01-01

    Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods. Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification. In this report biometric secu...

  10. Biometric identification systems: the science of transaction facilitation

    Science.gov (United States)

    Rogers, Robert R.

    1994-10-01

    The future ofthe "secure transaction" and the success ofall undertakings that depend on absolute certainty that the individuals involved really are who and what they represent themselves to be is dependent upon the successful development of absolutely accurate, low-cost and easy-to-operate Biometric Identification Systems. Whether these transactions are political, military, financial or administrative (e.g. health cards, drivers licenses, welfare entitlement, national identification cards, credit card transactions, etc.), the need for such secure and positive identification has never been greater -and yet we are only at the beginning ofan era in which we will see the emergence and proliferation of Biometric Identification Systems in nearly every field ofhuman endeavor. Proper application ofthese systems will change the way the world operates, and that is precisely the goal ofComparator Systems Corporation. Just as with the photo-copier 40 years ago and the personal computer 20 years ago, the potential applications for positive personal identification are going to make the Biometric Identification System a commonplace component in the standard practice ofbusiness, and in interhuman relationships ofall kinds. The development of new and specific application hardware, as well as the necessary algorithms and related software required for integration into existing operating procedures and newly developed systems alike, has been a more-than-a-decade-long process at Comparator -and we are now on the verge of delivering these systems to the world markets so urgently in need of them. An individual could feel extremely confident and satisfied ifhe could present his credit, debit, or ATM card at any point of sale and, after inserting his card, could simply place his finger on a glass panel and in less than a second be positively accepted as being the person that the card purported him to be; not to mention the security and satisfaction of the vendor involved in knowing that

  11. Biometric technology overview

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Biometrics was identified as one amongst 10 emerging technologies which would change the world in the twenty-first century. Components and processes of biometric system and the relevant technologies are explained in this article. Examples of biometric applications and trends of biometric research, together with industry development,are introduced, which illustrate the challenges and opportunities of this technology.

  12. A New Multimodal Biometric System Based on Finger Vein and Hand Vein Recognition

    OpenAIRE

    Randa Boukhris Trabelsi; Alima Damak Masmoudi; Dorra Sellami Masmoudi

    2013-01-01

    As a reliable and robust biological characteristic, the vein pattern increases more and more the progress in biometric researches. Generally, it was shown that single biometric modality recognition is not able to meet high performances. In this paper, we propose a new multimodal biometric system based on fusion of both hand vein and finger vein modalities. For finger vein recognition, we employ the Monogenic Local Binary Pattern (MLBP), and for hand vein recognitionan Improved Gaussian Matche...

  13. A lightweight approach for biometric template protection

    Science.gov (United States)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  14. The biometric menagerie.

    Science.gov (United States)

    Yager, Neil; Dunstone, Ted

    2010-02-01

    It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.

  15. An Efficient Secure Biometric System with Non-Invertible Gabor Transform

    Directory of Open Access Journals (Sweden)

    N.Radha

    2011-09-01

    Full Text Available Biometric scheme are being widely employed because their security merits over the earlier authentication system based on records that can be easily lost, guessed or forged. High scale employments and the related template storage have increased the requirement to guard the biometric data stored in the system. Theft of biometric information is a negotiation of the users privacy. In Addition, the stolen biometric information can be used to access other biometric systems that have the similar feature provided for the user. Several alternative functions have been identified in literature for creating revocable or non-invertible biometric templates. Although, their security examination either disregards the distribution of biometric features or uses inefficient feature matching. This generally shows the way to unrealistic approximation of security. In this paper a novel approach for the Non-Invertible biometric system is proposed to secure the biometric template. Security of a feature transformation method can be assessed according to the two main factors: i non-invertibility, and ii diversity. Non-invertibility represents the complexity in obtaining the original biometric when the secure template is provided and diversity represents the complexity in guessing one secure template when a different secure template created from the identical biometric is provided. The proposed Non-invertible Gabor transform possess both the non invertible and diversity features which enhances the security of the system to a large extent. The proposed approach is very much resistant to minor translation error and rotation distortion. The experimental result shows the better performance of the proposed technique compared to the existing system.

  16. Dental orthopantomogram biometrics system for human identification.

    Science.gov (United States)

    Singh, Sandeep; Bhargava, Darpan; Deshpande, Ashwini

    2013-07-01

    Fingerprinting is the most widely accepted method of identification of people. But in cases of disfigured, decomposed, burnt or fragmented bodies, it is of limited value. Teeth and dental restorations on the other hand are extremely resistant to destruction by fire. They retain a number of their original characteristics, which are often unique and hence offer a possibility of rather accurate and legally acceptable identification of such remains. This study was undertaken to evaluate the utility of orthopantomography for human identification and propose a coding system for orthopantomogram (OPG), which can be utilized as an identification tool in forensic sciences.

  17. A High Performance Biometric System Based on Image Morphological Analysis

    Directory of Open Access Journals (Sweden)

    Marco Augusto Rocchietti

    2014-09-01

    Full Text Available At present, many of the algorithms used and proposed for digital imaging biometric systems are based on mathematical complex models, and this fact is directly related to the performance of any computer implementation of these algorithms. On the other hand, as they are conceived for general purpose digital imaging, these algorithms do not take advantage of any common morphological features from its given domains. In this paper we developed a novel algorithm for the segmentation of the pupil and iris in human eye images, whose improvement’s hope lies in the use of morphological features of the images of the human eye. Based on the basic structure of a standard biometric system we developed and implemented an innovation for each phase of the system, avoiding the use of mathematical complex models and exploiting some common features in any digital image of the human eye from the dataset that we used. Finally, we compared the testing results against other known state of the art works developed over the same dataset.

  18. Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication

    Science.gov (United States)

    Pishva, Davar

    This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.

  19. Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-based Improved K-Medoids Partitioning

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2010-01-01

    This paper presents a feature level fusion approach which uses the improved K-medoids clustering algorithm and isomorphic graph for face and palmprint biometrics. Partitioning around medoids (PAM) algorithm is used to partition the set of n invariant feature points of the face and palmprint images into k clusters. By partitioning the face and palmprint images with scale invariant features SIFT points, a number of clusters is formed on both the images. Then on each cluster, an isomorphic graph is drawn. In the next step, the most probable pair of graphs is searched using iterative relaxation algorithm from all possible isomorphic graphs for a pair of corresponding face and palmprint images. Finally, graphs are fused by pairing the isomorphic graphs into augmented groups in terms of addition of invariant SIFT points and in terms of combining pair of keypoint descriptors by concatenation rule. Experimental results obtained from the extensive evaluation show that the proposed feature level fusion with the improve...

  20. Atm Client Authentication System Using Biometric Identifier & Otp

    Directory of Open Access Journals (Sweden)

    Jaydeep Shamdasani

    2014-04-01

    Full Text Available In this paper we propose a design, to add more security to the current ATM systems by using biometric and GSM technology. In conventional method identification is done based on ID cards and static 4 digit password. Whereas in our purposed system, Bankers will collect the customer fingerprints and mobile number at the time of opening the accounts then only customer will be able to access ATM machine. The primary step of this project is to verify currently scanned fingerprint with the fingerprint which is registered in the bank during the account opening time. If the two fingerprints get matched, then a message will be delivered to the user’s mobile which is the random 4 digit pin number to access the account. For every transaction new pin numbers will be send to the user’s mobile thus there will not be fixed pin number for every transaction. Thus, Pin number will vary during each transaction .

  1. An Authentication Protocol Based on Combined RFID-Biometric System

    Directory of Open Access Journals (Sweden)

    Mohamed Benmohammed

    2012-04-01

    Full Text Available Radio Frequency Identification (RFID and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …. Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Our protocol requires a PRNG (Pseud-Random Number Generator, a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.

  2. Challenges and Specifications for Robust Face and Gait Recognition Systems for Surveillance Application

    Directory of Open Access Journals (Sweden)

    BUCIU Ioan

    2014-05-01

    Full Text Available Automated person recognition (APR based on biometric signals addresses the process of automatically recognize a person according to his physiological traits (face, voice, iris, fingerprint, ear shape, body odor, electroencephalogram – EEG, electrocardiogram, or hand geometry, or behavioural patterns (gait, signature, hand-grip, lip movement. The paper aims at briefly presenting the current challenges for two specific non-cooperative biometric approaches, namely face and gait biometrics as well as approaches that consider combination of the two in the attempt of a more robust system for accurate APR, in the context of surveillance application. Open problems from both sides are also pointed out.

  3. The research and application of multi-biometric acquisition embedded system

    Science.gov (United States)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  4. Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system

    Directory of Open Access Journals (Sweden)

    S. Anu H. Nair

    2015-12-01

    Full Text Available Digital image watermarking is a major domain for hiding the biometric information, in which the watermark data are made to be concealed inside a host image imposing imperceptible change in the picture. Due to the advance in digital image watermarking, the majority of research aims to make a reliable improvement in robustness to prevent the attack. The reversible invisible watermarking scheme is used for fingerprint and iris multimodal biometric system. A novel approach is used for fusing different biometric modalities. Individual unique modalities of fingerprint and iris biometric are extracted and fused using different fusion techniques. The performance of different fusion techniques is evaluated and the Discrete Wavelet Transform fusion method is identified as the best. Then the best fused biometric template is watermarked into a cover image. The various watermarking techniques such as the Discrete Cosine Transform (DCT, Singular Value Decomposition (SVD and Bacterial Foraging Optimization Algorithm (BFOA are implemented to the fused biometric feature image. Performance of watermarking systems is compared using different metrics. It is found that the watermarked images are found robust over different attacks and they are able to reverse the biometric template for Bacterial Foraging Optimization Algorithm (BFOA watermarking technique.

  5. A MEMS-based, wireless, biometric-like security system

    Science.gov (United States)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  6. A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance

    CERN Document Server

    Khan, Aamir; Khurshid, Aasim; Akram, Adeel

    2012-01-01

    Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become necessary to protect sensitive and personal data. This paper proposes a multimodal biometric system which incorporates more than one biometric trait to attain higher security and to handle failure to enroll situations for some users. This paper is aimed at investigating a multimodal biometric identity system using Linear Discriminant Analysis as backbone to both facial and speech recognition and implementing such system in real-time using SignalWAVE.

  7. A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance

    Directory of Open Access Journals (Sweden)

    Aamir Khan

    2011-11-01

    Full Text Available Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become necessary to protect sensitive and personal data. This paper proposes a multimodal biometric system which incorporates more than one biometric trait to attain higher security and to handle failure to enroll situations for some users. This paper is aimed at investigating a multimodal biometric identity system using Linear Discriminant Analysis as backbone to both facial and speech recognition and implementing such system in real-time using SignalWAVE.

  8. Biometric iris image acquisition system with wavefront coding technology

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Yang, Hsi-Wen; Huang, Shao-Hung; Li, Yung-Hui; Tien, Chung-Hao

    2013-09-01

    Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on; the other scenario is dependent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code

  9. Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biometric System

    Directory of Open Access Journals (Sweden)

    S. Anu H Naira

    2015-01-01

    Full Text Available The multimodal Biometric System using multiple sources of information has been widely recognized. However computational models for multimodal biometrics recognition have only recently received attention. In this paper the fingerprint and palmprint images are chosen and fused together using image fusion methods. The biometric features are subjected to modality extraction. Different fusion methods like average fusion, minimum fusion, maximum fusion, discrete wavelet transform fusion and stationary wavelet transformfusion are implemented for the fusion of extracting modalities. The best fused template is analyzed by applying various fusion metrics. Here the DWT fused image provided better results.

  10. A reference system for animal biometrics: application to the northern leopard frog

    Science.gov (United States)

    Petrovska-Delacretaz, D.; Edwards, A.; Chiasson, J.; Chollet, G.; Pilliod, D.S.

    2014-01-01

    Reference systems and public databases are available for human biometrics, but to our knowledge nothing is available for animal biometrics. This is surprising because animals are not required to give their agreement to be in a database. This paper proposes a reference system and database for the northern leopard frog (Lithobates pipiens). Both are available for reproducible experiments. Results of both open set and closed set experiments are given.

  11. Are Haar-like Rectangular Features for Biometric Recognition Reducible?

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2013-01-01

    which have usually been used for object detection were introduced for biometric recognition resulting in systems that are robust against most of the mentioned degradations [9]. The problem with these features is that one can define many different such features for a given biometric signal......? This paper proposes total sensitivity analysis about the mean for this purpose for two different biometric traits, iris and face. Experimental results on multiple public databases show the superiority of the proposed system, using the found influential features, compared to state-of-the-art biometric...

  12. Using Face Recognition System in Ship Protection Process

    Directory of Open Access Journals (Sweden)

    Miroslav Bača

    2006-03-01

    Full Text Available The process of security improvement is a huge problem especiallyin large ships. Terrorist attacks and everyday threatsagainst life and property destroy transport and tourist companies,especially large tourist ships. Every person on a ship can berecognized and identified using something that the personknows or by means of something the person possesses. The bestresults will be obtained by using a combination of the person'sknowledge with one biometric characteristic. Analyzing theproblem of biometrics in ITS security we can conclude that facerecognition process supported by one or two traditional biometriccharacteristics can give very good results regarding ship security.In this paper we will describe a biometric system basedon face recognition. Special focus will be given to crew member'sbiometric security in crisis situation like kidnapping, robbelyor illness.

  13. Local gradient Gabor pattern (LGGP) with applications in face recognition, cross-spectral matching, and soft biometrics

    Science.gov (United States)

    Chen, Cunjian; Ross, Arun

    2013-05-01

    Researchers in face recognition have been using Gabor filters for image representation due to their robustness to complex variations in expression and illumination. Numerous methods have been proposed to model the output of filter responses by employing either local or global descriptors. In this work, we propose a novel but simple approach for encoding Gradient information on Gabor-transformed images to represent the face, which can be used for identity, gender and ethnicity assessment. Extensive experiments on the standard face benchmark FERET (Visible versus Visible), as well as the heterogeneous face dataset HFB (Near-infrared versus Visible), suggest that the matching performance due to the proposed descriptor is comparable against state-of-the-art descriptor-based approaches in face recognition applications. Furthermore, the same feature set is used in the framework of a Collaborative Representation Classification (CRC) scheme for deducing soft biometric traits such as gender and ethnicity from face images in the AR, Morph and CAS-PEAL databases.

  14. An optical authentication system based on encryption technique and multimodal biometrics

    Science.gov (United States)

    Yuan, Sheng; Zhang, Tong; Zhou, Xin; Liu, Xuemei; Liu, Mingtang

    2013-12-01

    A major concern nowadays for a biometric credential management system is its potential vulnerability to protect its information sources. To prevent a genuine user's templates from both internal and external threats, a novel and simple method combined optical encryption with multimodal biometric authentication technique is proposed. In this method, the standard biometric templates are generated real-timely by the verification keys owned by legal user so that they are unnecessary to be stored in a database. Compared with the traditional recognition algorithms, storage space and matching time are greatly saved. In addition, the verification keys are difficult to be forged due to the utilization of optical encryption technique. Although the verification keys are lost or stolen, they are useless for others in absence of the legal owner's biometric. A series of numerical simulations are performed to demonstrate the feasibility and performance of this method.

  15. Biometric Person Identification System: A Multimodal Approach Employing Spectral Graph Characteristics of Hand Geometry and Palmprint

    Directory of Open Access Journals (Sweden)

    Shanmukhappa A. Angadi

    2016-03-01

    Full Text Available Biometric authentication systems operating in real world environments using a single modality are found to be insecure and unreliable due to numerous limitations. Multimodal biometric systems have better accuracy and reliability due to the use of multiple biometric traits to authenticate a claimed identity or perform identification. In this paper a novel method for person identification using multimodal biometrics with hand geometry and palmprint biometric traits is proposed. The geometrical information embedded in the user hand and palmprint images are brought out through the graph representations. The topological characterization of the image moments, represented as the virtual nodes of the palmprint image graph is a novel feature of this work. The user hand and palmprint images are represented as weighted undirected graphs and spectral characteristics of the graphs are extracted as features vectors. The feature vectors of the hand geometry and palmprint are fused at feature level to obtain a graph spectral feature vector to represent the person. User identification is performed by using a multiclass support vector machine (SVM classifier. The experimental results demonstrate, an appreciable performance giving identification rate of 99.19% for multimodal biometric after feature level fusion of hand geometry and palmprint modalities. The performance is investigated by conducting the experiments separately for handgeometry, palmprint and fused feature vectors for person identification. Experimental results show that the proposed multimodal system achieves better performance than the unimodal cues, and can be used in high security applications. Further comparison show that it is better than similar other multimodal techniques.

  16. On Hunting Animals of the Biometric Menagerie for Online Signature

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database. PMID:27054836

  17. A Multi-Modal Recognition System Using Face and Speech

    Directory of Open Access Journals (Sweden)

    Samir Akrouf

    2011-05-01

    Full Text Available Nowadays Person Recognition has got more and more interest especially for security reasons. The recognition performed by a biometric system using a single modality tends to be less performing due to sensor data, restricted degrees of freedom and unacceptable error rates. To alleviate some of these problems we use multimodal biometric systems which provide better recognition results. By combining different modalities, such us speech, face, fingerprint, etc., we increase the performance of recognition systems. In this paper, we study the fusion of speech and face in a recognition system for taking a final decision (i.e., accept or reject identity claim. We evaluate the performance of each system differently then we fuse the results and compare the performances.

  18. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  19. Acoustic Biometric System Based on Preprocessing Techniques and Linear Support Vector Machines.

    Science.gov (United States)

    del Val, Lara; Izquierdo-Fuente, Alberto; Villacorta, Juan J; Raboso, Mariano

    2015-06-17

    Drawing on the results of an acoustic biometric system based on a MSE classifier, a new biometric system has been implemented. This new system preprocesses acoustic images, extracts several parameters and finally classifies them, based on Support Vector Machine (SVM). The preprocessing techniques used are spatial filtering, segmentation-based on a Gaussian Mixture Model (GMM) to separate the person from the background, masking-to reduce the dimensions of images-and binarization-to reduce the size of each image. An analysis of classification error and a study of the sensitivity of the error versus the computational burden of each implemented algorithm are presented. This allows the selection of the most relevant algorithms, according to the benefits required by the system. A significant improvement of the biometric system has been achieved by reducing the classification error, the computational burden and the storage requirements.

  20. Acoustic Biometric System Based on Preprocessing Techniques and Linear Support Vector Machines

    Directory of Open Access Journals (Sweden)

    Lara del Val

    2015-06-01

    Full Text Available Drawing on the results of an acoustic biometric system based on a MSE classifier, a new biometric system has been implemented. This new system preprocesses acoustic images, extracts several parameters and finally classifies them, based on Support Vector Machine (SVM. The preprocessing techniques used are spatial filtering, segmentation—based on a Gaussian Mixture Model (GMM to separate the person from the background, masking—to reduce the dimensions of images—and binarization—to reduce the size of each image. An analysis of classification error and a study of the sensitivity of the error versus the computational burden of each implemented algorithm are presented. This allows the selection of the most relevant algorithms, according to the benefits required by the system. A significant improvement of the biometric system has been achieved by reducing the classification error, the computational burden and the storage requirements.

  1. Acoustic Biometric System Based on Preprocessing Techniques and Linear Support Vector Machines

    Science.gov (United States)

    del Val, Lara; Izquierdo-Fuente, Alberto; Villacorta, Juan J.; Raboso, Mariano

    2015-01-01

    Drawing on the results of an acoustic biometric system based on a MSE classifier, a new biometric system has been implemented. This new system preprocesses acoustic images, extracts several parameters and finally classifies them, based on Support Vector Machine (SVM). The preprocessing techniques used are spatial filtering, segmentation—based on a Gaussian Mixture Model (GMM) to separate the person from the background, masking—to reduce the dimensions of images—and binarization—to reduce the size of each image. An analysis of classification error and a study of the sensitivity of the error versus the computational burden of each implemented algorithm are presented. This allows the selection of the most relevant algorithms, according to the benefits required by the system. A significant improvement of the biometric system has been achieved by reducing the classification error, the computational burden and the storage requirements. PMID:26091392

  2. FLIR biometrics

    Science.gov (United States)

    O'Kane, Barbara L.; Krzywicki, Alan T.

    2009-04-01

    Biometrics are generally thought of as anatomical features that allow positive identification of a person. This paper describes biometrics that are also physiological in nature. The differences between anatomy and physiology have to do with the fact that physiology is dynamic, functioning, and changing with the state or actions of a person whereas anatomy is generally more stable. Biometrics in general usually refers to a trait, whereas the new type of biometrics discussed in this paper refer to a state, which is temporary, and often even transitory. By state, what is meant is the condition of a person at a particular time relative to their psychological, physical, medical, or physiological status. The present paper describes metrics that are cues to the state of a functioning individual observable through a thermal camera video system. An inferred state might then be tied to the positive identification of the person. Using thermal for this purpose is significant because the thermal signature of a human is dynamic and changes with physical and emotional state, while also revealing underlying anatomical structures. A new method involving the counting of open pores on the skin is discussed as a way of observing the Electrodermal Activity (EDA) of the skin, a primary component of the polygraph.

  3. Improving the recognition of fingerprint biometric system using enhanced image fusion

    Science.gov (United States)

    Alsharif, Salim; El-Saba, Aed; Stripathi, Reshma

    2010-04-01

    Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more reliable and secure compared to traditional ID cards or personal passwords methods. Fingerprint pattern fusion improves the performance of a fingerprint recognition system in terms of accuracy and security. This paper presents digital enhancement and fusion approaches that improve the biometric of the fingerprint recognition system. It is a two-step approach. In the first step raw fingerprint images are enhanced using high-frequency-emphasis filtering (HFEF). The second step is a simple linear fusion process between the raw images and the HFEF ones. It is shown that the proposed approach increases the verification and identification of the fingerprint biometric recognition system, where any improvement is justified using the correlation performance metrics of the matching algorithm.

  4. FACELOCK-Lock Control Security System Using Face Recognition-

    Science.gov (United States)

    Hirayama, Takatsugu; Iwai, Yoshio; Yachida, Masahiko

    A security system using biometric person authentication technologies is suited to various high-security situations. The technology based on face recognition has advantages such as lower user’s resistance and lower stress. However, facial appearances change according to facial pose, expression, lighting, and age. We have developed the FACELOCK security system based on our face recognition methods. Our methods are robust for various facial appearances except facial pose. Our system consists of clients and a server. The client communicates with the server through our protocol over a LAN. Users of our system do not need to be careful about their facial appearance.

  5. Internet Passport Authentication System Using Multiple Biometric Identification Technology

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2013-02-01

    Full Text Available Electronic passports (e-Passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper consider only those passport scenarios whose passport protocols base on public-key cryptography, certificates, and a public key infrastructure without addressing the protocols itself detailed, but this is no strong constraint. Furthermore assume the potential passport applier to use ordinary PCs with Windows or Linux software and an arbitrary connection to the Internet. Technological securities issues are to be found in several dimension, but below paper focus on hardware, software, and infrastructure as some of the most critical issues.

  6. Machine Learning for Biometrics

    NARCIS (Netherlands)

    A.A. Salah (Albert Ali); E. Soria; J.D. Martin; R. Magdalena; M. Martinez; A.J. Serrano

    2009-01-01

    htmlabstractBiometrics aims at reliable and robust identification of humans from their personal traits, mainly for security and authentication purposes, but also for identifying and tracking the users of smarter applications. Frequently considered modalities are fingerprint, face, iris, palmprint

  7. Method for secure electronic voting system: face recognition based approach

    Science.gov (United States)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  8. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    Science.gov (United States)

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  9. Biometric system for user authentication based on Hough transform and Neural Network

    Directory of Open Access Journals (Sweden)

    Rahul Dubey Dheeraj Agrawal

    2011-10-01

    Full Text Available Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as

  10. Hybrid Level Integration of Biometric Traits for Security Applications

    Directory of Open Access Journals (Sweden)

    Manjunath S Gabasavalagi

    2013-09-01

    Full Text Available In reality the security is to be provided in different levels based on the application and requirement. In attendance related applications require low level security, banking applications may need medium level security and defence applications require high level security. This paper presents a hybrid-modal (Unimodal or Multimodal biometric system which is used to provide better security to applications based on their requirement. Based on the security level, the system uses both single evidence (unimodal for lower level and multiple evidences (multimodal for higher level security. The developed hybrid-modal system employs one or more biometric modalities such as face, voice and fingerprint by alleviating some of the challenges identified in fingerprint, face and voice biometrics modalities. These biometric modalities are selected as they are independent, non-intrusive and robust. Depends on the applications security level requirements like low, medium and high, the number of biometric modalities are provided as evidence to the system. The developed system is tested for 60 users. The accuracy for low level security applications using either fingerprint or face or voice the accuracy of around 94%, 93% and 82% respectively have achieved. The accuracy for medium level security applications using face & fingerprint, face & voice and voice & fingerprint are 91%, 81% and 88% respectively. Further, for high level security using all the three biometric traits the accuracy of 80% is achieved. The developed system provides promising results for all level of security applications.

  11. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... COMMISSION Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys... Energy Corp. because it has not filed any periodic reports since the period ended December 31, 2006. It... concerning the securities of Biomedical Waste Systems, Inc. because it has not filed any periodic reports...

  12. Systems and methods for remote long standoff biometric identification using microwave cardiac signals

    Science.gov (United States)

    McGrath, William R. (Inventor); Talukder, Ashit (Inventor)

    2012-01-01

    Systems and methods for remote, long standoff biometric identification using microwave cardiac signals are provided. In one embodiment, the invention relates to a method for remote biometric identification using microwave cardiac signals, the method including generating and directing first microwave energy in a direction of a person, receiving microwave energy reflected from the person, the reflected microwave energy indicative of cardiac characteristics of the person, segmenting a signal indicative of the reflected microwave energy into a waveform including a plurality of heart beats, identifying patterns in the microwave heart beats waveform, and identifying the person based on the identified patterns and a stored microwave heart beats waveform.

  13. Can We Do Better in Unimodal Biometric Systems? A Rank-Based Score Normalization Framework.

    Science.gov (United States)

    Moutafis, Panagiotis; Kakadiaris, Ioannis A

    2015-12-01

    Biometric systems use score normalization techniques and fusion rules to improve recognition performance. The large amount of research on score fusion for multimodal systems raises an important question: can we utilize the available information from unimodal systems more effectively? In this paper, we present a rank-based score normalization framework that addresses this problem. Specifically, our approach consists of three algorithms: 1) partition the matching scores into subsets and normalize each subset independently; 2) utilize the gallery versus gallery matching scores matrix (i.e., gallery-based information); and 3) dynamically augment the gallery in an online fashion. We invoke the theory of stochastic dominance along with results of prior research to demonstrate when and why our approach yields increased performance. Our framework: 1) can be used in conjunction with any score normalization technique and any fusion rule; 2) is amenable to parallel programming; and 3) is suitable for both verification and open-set identification. To assess the performance of our framework, we use the UHDB11 and FRGC v2 face datasets. Specifically, the statistical hypothesis tests performed illustrate that the performance of our framework improves as we increase the number of samples per subject. Furthermore, the corresponding statistical analysis demonstrates that increased separation between match and nonmatch scores is obtained for each probe. Besides the benefits and limitations highlighted by our experimental evaluation, results under optimal and pessimal conditions are also presented to offer better insights.

  14. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  15. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  16. A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems

    CERN Document Server

    Wang, Ye; Draper, Stark C; Ishwar, Prakash

    2011-01-01

    We present a theoretical framework for the analysis of privacy and security tradeoffs in secure biometric authentication systems. We use this framework to conduct a comparative information-theoretic analysis of two biometric systems that are based on linear error correction codes, namely fuzzy commitment and secure sketches. We derive upper bounds for the probability of false rejection ($P_{FR}$) and false acceptance ($P_{FA}$) for these systems. We use mutual information to quantify the information leaked about a user's biometric identity, in the scenario where one or multiple biometric enrollments of the user are fully or partially compromised. We also quantify the probability of successful attack ($P_{SA}$) based on the compromised information. Our analysis reveals that fuzzy commitment and secure sketch systems have identical $P_{FR}, P_{FA}, P_{SA}$ and information leakage, but secure sketch systems have lower storage requirements. We analyze both single-factor (keyless) and two-factor (key-based) varian...

  17. A false rejection oriented threat model for the design of biometric authentication systems

    NARCIS (Netherlands)

    Buhan, Ileana; Bazen, Asker; Hartel, Pieter; Veldhuis, Raymond

    2005-01-01

    For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the 'standard' architecture of a biometric system is extended by adding components like crypto, audi

  18. Biometrics Bodies, Technologies, Biopolitics

    CERN Document Server

    Pugliese, Joseph

    2012-01-01

    Biometric technologies, such as finger- or facial-scan, are being deployed across a variety of social contexts in order to facilitate and guarantee identity verification and authentication. In the post-9/11 world, biometric technologies have experienced an extraordinary period of growth as concerns about security and screening have increased. This book analyses biometric systems in terms of the application of biopolitical power - corporate, military and governmental - on the human body. It deploys cultural theory in examining the manner in which biometric technologies constitute the body as a

  19. Development of Crypto-Biometric E-Banking System

    Directory of Open Access Journals (Sweden)

    A.O. Afolabi

    2012-11-01

    Full Text Available The Internet has played a key role in changing how we interact with other people and how we do business today. As a result of the Internet, electronic commerce has emerged, allowing businesses to more effectively interact with their customers and other corporations inside and outside their industries. One industry that is using this new communication channel to reach its customers is the banking industry. The challenges that oppose electronic banking are the concerns of security and privacy of information. It is not enough for an e-banking system to just provide information to their customers but to provide it to the right customers and at the right time. This project focuses on developing a secured e-banking system using encryption and face recognition as the two levels of security mechanism since the username and password security mechanism are easily breached by mere guess work. This E-banking system was designed using MATLAB as well as face recognition and encryption.

  20. Enhancing E-Voting Systems By Leveraging Biometric Key Generation (Bkg

    Directory of Open Access Journals (Sweden)

    V. C. Ossai

    2013-10-01

    Full Text Available The adoption of e-voting methods in electioneering processes will effectively reduce cost as well as enhance election activities. What makes an e-voting model reliable and acceptable is its ability to properly authenticate voters and provide a secure means through which a voter can express his/her franchise. This paper therefore proposes a design of an e-voting system that leverages a Biometric Encryption scheme known as Biometric key Generation (BKG which is a secured strategy that entails using of biometrics to generate secure cryptographic keys. The main objective of this research is to improve on the already existing E-voting systems adopting a secured bio-cryptographic technique vis Biometric key Generation (BKG as well as using a secure transmission channel for confidential datasets of a voting process. This work develops a simulation model of an E-voting system which adopts relevant algorithms with emphasis on biometric key generation schemes. The simulation of a prototype model of the electronic voting system is developed using Proteus 7.6 application software. The prototype model would consist of electronic kiosk polling booths that are all networked to the state electoral collection center and collection centers that are networked to the national electoral collection center via a VPN backbone. The proposed e-voting system uses a Virtual Private Network (VPN as the means of communication between the various polling booths and collection points. The results of validation show that the proposed model facilitates the adoption of E-governance in the developing countries.

  1. Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR System

    Directory of Open Access Journals (Sweden)

    G. Nouskalis

    2011-01-01

    Full Text Available The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of “war” against the so-called unlawful combatants of the “enemy”. Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, “ECHR”. According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  2. Biometrics, e-identity, and the balance between security and privacy: case study of the passenger name record (PNR) system.

    Science.gov (United States)

    Nouskalis, G

    2011-03-01

    The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR) system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of "war" against the so-called unlawful combatants of the "enemy". Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, "ECHR"). According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  3. Iris Segmentation using Gradient Magnitude and Fourier Descriptor for Multimodal Biometric Authentication System

    Directory of Open Access Journals (Sweden)

    Defiana Sulaeman

    2016-12-01

    Full Text Available Perfectly segmenting the area of the iris is one of the most important steps in iris recognition. There are several problematic areas that affect the accuracy of the iris segmentation step, such as eyelids, eyelashes, glasses, pupil (due to less accurate iris segmentation, motion blur, and lighting and specular reflections. To solve these problems, gradient magnitude and Fourier descriptor are employed to do iris segmentation in the proposed Multimodal Biometric Authentication System (MBAS. This approach showed quite promising results, i.e. an accuracy rate of 97%. The result of the iris recognition system was combined with the result of an open-source fingerprint recognition system to develop a multimodal biometrics authentication system. The results of the fusion between iris and fingerprint authentication were 99% accurate. Data from Multimedia Malaysia University (MMUI and our own prepared database, the SGU-MB-1 dataset, were used to test the accuracy of the proposed system.

  4. Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms

    NARCIS (Netherlands)

    Poh, N.; Bourlai, T.; Kittler, J.; Allano, L.; Alonso-Fernandez, F.; Ambekar, O.; Baker, J.; Dorizzi, B.; Fatukasi, O.; Fierrez, J.; Ganster, H.; Ortegia-Garcia, J.; Maurer, D.; Salah, A.A.; Scheidat, T.; Vielhauer, C.

    2009-01-01

    Automatically verifying the identity of a person by means of biometrics (e.g. face and fingerprint) is an important application in our to-day activities such as accessing banking services and security control in airports. To increase the system reliability, several biometric devices are often used.

  5. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  6. Non-intrusive face verification by a virtual mirror interface using fractal codes

    NARCIS (Netherlands)

    Dr. Johan Tangelder; B.A.M. Ben Schouten

    2005-01-01

    Key factors in the public acceptance of biometric systems are non-intrusiveness, ease of use, and trust. In this paper we propose a biometric identity verification system consisting of a non-intrusive virtual mirror interface, and a face verifier using fractal coding to store the biometric template

  7. Biometrics and Security

    Science.gov (United States)

    Govindaraju, Venu

    The science of Biometrics is concerned with recognizing people based on their physiological or behavioral characteristics. It has emerged as a vibrant field of research in today's security conscious society. In this talk we will introduce the important research challenges in Biometrics and specifically address the following topics: i) unobtrusive people tracking using a novel evolutionary recognition paradigm, ii) efficient indexing and searching of large fingerprint databases, iii) cancelability of templates where the task is to ensure that enrolled biometric templates can be revoked and new templates issued, and iv) fusion of fingerprints with other biometric modalities such as face where we will explore optimal trainable functions that operate on the scores returned by individual matchers.

  8. An improved biometrics-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  9. Edge detection of iris of the eye for human biometric identification system

    Directory of Open Access Journals (Sweden)

    Kateryna O. Tryfonova

    2015-03-01

    Full Text Available Method of human biometric identification by iris of the eye is considered as one of the most accurate and reliable methods of identification. Aim of the research is to solve the problem of edge detection of digital image of the human eye iris to be able to implement human biometric identification system by means of mobile device. To achieve this aim the algorithm of edge detection by Canny is considered in work. It consists of the following steps: smoothing, finding gradients, non-maximum suppression, double thresholding with hysteresis. The software implementation of the Canny algorithm is carried out for the Android mobile platform with the use of high level programming language Java.

  10. Multi-biometric templates using fingerprint and voice

    Science.gov (United States)

    Camlikaya, Eren; Kholmatov, Alisher; Yanikoglu, Berrin

    2008-03-01

    As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class variations. To tackle both problems, a multimodal biometric verification system combining fingerprint and voice modalities is proposed. The system combines the two modalities at the template level, using multibiometric templates. The fusion of fingerprint and voice data successfully diminishes privacy concerns by hiding the minutiae points from the fingerprint, among the artificial points generated by the features obtained from the spoken utterance of the speaker. Equal error rates are observed to be under 2% for the system where 600 utterances from 30 people have been processed and fused with a database of 400 fingerprints from 200 individuals. Accuracy is increased compared to the previous results for voice verification over the same speaker database.

  11. A dynamically weighted multi-modal biometric security system

    CSIR Research Space (South Africa)

    Brown, Dane

    2016-09-01

    Full Text Available dataset [11] were used in the experiments discussed in Section IV. The five samples per 100 individuals used for training and testing can be summarized as follows: 1) Face – The faces consisted of frontal poses with the following expressions and props... or fingerprints with poor ridge and valley contrast. The solution used in this paper applies an edge preserving non-local means (NL-means) filter [14] before applying Poincare´. A ROI can also be determined for facial images. The key points are the eyes, nose...

  12. Biometrics and international migration.

    Science.gov (United States)

    Redpath, Jillyanne

    2007-01-01

    This paper will focus on the impact of the rapid expansion in the use of biometric systems in migration management on the rights of individuals; it seeks to highlight legal issues for consideration in implementing such systems, taking as the starting point that the security interests of the state and the rights of the individual are not, and should not be, mutually exclusive. The first part of this paper briefly describes the type of biometric applications available, how biometric systems function, and those used in migration management. The second part examines the potential offered by biometrics for greater security in migration management, and focuses on developments in the use of biometrics as a result of September 11. The third part discusses the impact of the use of biometrics in the management of migration on the individual's right to privacy and ability to move freely and lawfully. The paper highlights the increasing need for domestic and international frameworks to govern the use of biometric applications in the migration/security context, and proposes a number of issues that such frameworks could address.

  13. Biometrics, identification and surveillance.

    Science.gov (United States)

    Lyon, David

    2008-11-01

    Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from the lived experience of the body including the orientation to others. It is proposed that creators of national ID systems in particular address these crucial deficiencies in their attempt to provide new modes of verification.

  14. Keystroke Dynamics Performance Enhancement With Soft Biometrics

    OpenAIRE

    Syed Idrus, Syed Zulkarnain; Cherrier, Estelle; Rosenberger, Christophe; Mondal, Soumik; Bours, Patrick

    2015-01-01

    International audience; It is accepted that the way a person types on a key-board contains timing patterns, which can be used to classify him/her, is known as keystroke dynamics. Keystroke dynamics is a behavioural biometric modality, whose perfor-mances, however, are worse than morphological modalities such as fingerprint, iris recognition or face recognition. To cope with this, we propose to combine keystroke dynamics with soft biometrics. Soft biometrics refers to biometric characteristics...

  15. A concatenated coding scheme for biometric template protection

    NARCIS (Netherlands)

    Shao, Xiaoying; Xu, Haiyun; Veldhuis, Raymond N.J.; Slump, Cornelis H.

    2012-01-01

    Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction algorith

  16. Biometrics and Kansei engineering

    CERN Document Server

    2012-01-01

    Includes a section on touchscreen devices Proposes a new mathematical model on Iris Recognition Introduces a new technological system dealing with human Kansei Covers the latest achievements in biometric application features

  17. Automated Face Recognition System

    Science.gov (United States)

    1992-12-01

    atestfOl.feature-vectjJ -averageljJ); for(j=l; <num-coefsj++) for(i= 5 num-train-faces;i++) sdlQjI -(btrainhil.feaure..vecU1- veagU (btraintil.feature- vecU ... vecU ])* (atest(O1.feature-vecUJ - btrain[iI.feature- vecU ]) + temp; btrain(ii.distance = sqrt ( (double) temp); I**** Store the k-nearest neighbors rank

  18. Beyond Biometrics

    NARCIS (Netherlands)

    van den Broek, Egon

    Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including

  19. Machine Learning for Biometrics

    NARCIS (Netherlands)

    Salah, A.A.; Soria, E.; Martin, J.D.; Magdalena, R.; Martinez, M.; Serrano, A.J.

    2009-01-01

    Biometrics aims at reliable and robust identification of humans from their personal traits, mainly for security and authentication purposes, but also for identifying and tracking the users of smarter applications. Frequently considered modalities are fingerprint, face, iris, palmprint and voice, but

  20. No age discrimination for biometrics

    CSIR Research Space (South Africa)

    Lessing, MM

    2008-07-01

    Full Text Available (Schneider 2005:24). Many hospitals traditionally had multiple systems, each requiring different logon credentials. Medical professionals needed to remember as many as six different passwords. In some cases, systems implemented single sign-on to solve... alternative, often more intrusive biometric technologies. 3.2.3 Biometric Implementations in Healthcare Worldwide Biometrical implementations in health care have been successful in the following: • A hospital in New York and an ambulance service...

  1. Use of Wearable Sensors and Biometric Variables in an Artificial Pancreas System

    Directory of Open Access Journals (Sweden)

    Kamuran Turksoy

    2017-03-01

    Full Text Available An artificial pancreas (AP computes the optimal insulin dose to be infused through an insulin pump in people with Type 1 Diabetes (T1D based on information received from a continuous glucose monitoring (CGM sensor. It has been recognized that exercise is a major challenge in the development of an AP system. The use of biometric physiological variables in an AP system may be beneficial for prevention of exercise-induced challenges and better glucose regulation. The goal of the present study is to find a correlation between biometric variables such as heart rate (HR, heat flux (HF, skin temperature (ST, near-body temperature (NBT, galvanic skin response (GSR, and energy expenditure (EE, 2D acceleration-mean of absolute difference (MAD and changes in glucose concentrations during exercise via partial least squares (PLS regression and variable importance in projection (VIP in order to determine which variables would be most useful to include in a future artificial pancreas. PLS and VIP analyses were performed on data sets that included seven different types of exercises. Data were collected from 26 clinical experiments. Clinical results indicate ST to be the most consistently important (important for six out of seven tested exercises variable over all different exercises tested. EE and HR are also found to be important variables over several types of exercise. We also found that the importance of GSR and NBT observed in our experiments might be related to stress and the effect of changes in environmental temperature on glucose concentrations. The use of the biometric measurements in an AP system may provide better control of glucose concentration.

  2. Use of Wearable Sensors and Biometric Variables in an Artificial Pancreas System.

    Science.gov (United States)

    Turksoy, Kamuran; Monforti, Colleen; Park, Minsun; Griffith, Garett; Quinn, Laurie; Cinar, Ali

    2017-03-07

    An artificial pancreas (AP) computes the optimal insulin dose to be infused through an insulin pump in people with Type 1 Diabetes (T1D) based on information received from a continuous glucose monitoring (CGM) sensor. It has been recognized that exercise is a major challenge in the development of an AP system. The use of biometric physiological variables in an AP system may be beneficial for prevention of exercise-induced challenges and better glucose regulation. The goal of the present study is to find a correlation between biometric variables such as heart rate (HR), heat flux (HF), skin temperature (ST), near-body temperature (NBT), galvanic skin response (GSR), and energy expenditure (EE), 2D acceleration-mean of absolute difference (MAD) and changes in glucose concentrations during exercise via partial least squares (PLS) regression and variable importance in projection (VIP) in order to determine which variables would be most useful to include in a future artificial pancreas. PLS and VIP analyses were performed on data sets that included seven different types of exercises. Data were collected from 26 clinical experiments. Clinical results indicate ST to be the most consistently important (important for six out of seven tested exercises) variable over all different exercises tested. EE and HR are also found to be important variables over several types of exercise. We also found that the importance of GSR and NBT observed in our experiments might be related to stress and the effect of changes in environmental temperature on glucose concentrations. The use of the biometric measurements in an AP system may provide better control of glucose concentration.

  3. Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems

    Science.gov (United States)

    Riley, Chris; Johnson, Graham; McCracken, Heather; Al-Saffar, Ahmed

    Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diverse range of contexts from immigration control, to banking and personal computing. As is often the case with emerging technologies, the usability aspects of system design have received less attention than technical aspects. Fingerprint systems pose a number of challenges for users and past research has identified issues with correct finger placement, system feedback and instruction. This paper describes the development of an interface for fingerprint systems using an iterative, participative design approach. During this process, several different methods for the presentation of instruction and feedback were identified. The different types of instruction and feedback were tested in a study involving 82 participants. The results showed that feedback had a statistically significant effect on overall system performance, but instruction did not. The design recommendations emerging from this study, and the use of participatory design in this context, are discussed.

  4. Impact of environmental factors on biometric matching during human decomposition

    Energy Technology Data Exchange (ETDEWEB)

    Bolme, David S [ORNL; Tokola, Ryan A [ORNL; Boehnen, Chris Bensing [ORNL; Saul, Tiffany B [ORNL; Sauerwein, Kelly A [ORNL; Steadman, Dawnie W [ORNL

    2016-01-01

    Automatic recognition systems are a valuable tool for identifying unknown deceased individuals. Immediately af- ter death fingerprint and face biometric samples are easy to collect using standard sensors and cameras and can be easily matched to anti-mortem biometric samples. Even though post-mortem fingerprints and faces have been used for decades, there are no studies that track these biomet- rics through the later stages of decomposition to determine the length of time the biometrics remain viable. This paper discusses a multimodal dataset of fingerprints, faces, and irises from 14 human cadavers that decomposed outdoors under natural conditions. Results include predictive models relating time and temperature, measured as Accumulated Degree Days (ADD), and season (winter, spring, summer) to the predicted probably of automatic verification using a commercial algorithm.

  5. A secure biometrics-based authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  6. Multimodal Biometrics using Feature Fusion

    Directory of Open Access Journals (Sweden)

    K. Krishneswari

    2012-01-01

    Full Text Available Problem statement: Biometrics is a unique, measurable physiological or behavioural characteristic of a person and finds extensive applications in authentication and authorization. Fingerprint, palm print, iris, voice, are some of the most widely used biometrics for personal identification. To reduce the error rates and enhance the usability of biometric system, multimodal biometric systems are used where more than one biometric characteristics are used. Approach: In this study it is proposed to investigate the performance of multimodal biometrics using palm print and fingerprint. Features are extracted using Discrete Cosine Transform (DCT and attributes selected using Information Gain (IG. Results and Conclusion: The proposed technique shows an average improvement of 8.52% compared to using palmprint technique alone. The processing time does not increase for verification compared to palm print techniques.

  7. Design and Development of Biometric Traffic Offence System (BTOS)

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... West African Journal of Industrial & Academic Research Vol.12 No.1 ... abdulhakimowolabi@gmail.com, Phone: 08067015567, ..... performance of the proposed system is ... can run on cell phones so that the offended.

  8. Multimodal biometrics for identity documents (MBioID).

    Science.gov (United States)

    Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej

    2007-04-11

    The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.

  9. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available : Biometrics ? CSIR 2012 Slide 2 ? Biometric Authentication ? Why Fingerprint Recognition? ? Fingerprint Recognition ? Africa Needs to Catch-up Part C: Biometrics & Smart Cards ? Fingerprint Recognition and Smart Cards ? Some Challenges Part D... ? These traits could be their iris, fingerprint, face, voice, gate, and others ? Fingerprint recognition is currently the most popular mode of biometric authentication Why Fingerprint Recognition? ? CSIR 2012 Slide 9 Biometric Recognition ? Africa Needs...

  10. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  11. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  12. Face recognition system and method using face pattern words and face pattern bytes

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Yufeng

    2014-12-23

    The present invention provides a novel system and method for identifying individuals and for face recognition utilizing facial features for face identification. The system and method of the invention comprise creating facial features or face patterns called face pattern words and face pattern bytes for face identification. The invention also provides for pattern recognitions for identification other than face recognition. The invention further provides a means for identifying individuals based on visible and/or thermal images of those individuals by utilizing computer software implemented by instructions on a computer or computer system and a computer readable medium containing instructions on a computer system for face recognition and identification.

  13. FaceID: A face detection and recognition system

    Energy Technology Data Exchange (ETDEWEB)

    Shah, M.B.; Rao, N.S.V.; Olman, V.; Uberbacher, E.C.; Mann, R.C.

    1996-12-31

    A face detection system that automatically locates faces in gray-level images is described. Also described is a system which matches a given face image with faces in a database. Face detection in an Image is performed by template matching using templates derived from a selected set of normalized faces. Instead of using original gray level images, vertical gradient images were calculated and used to make the system more robust against variations in lighting conditions and skin color. Faces of different sizes are detected by processing the image at several scales. Further, a coarse-to-fine strategy is used to speed up the processing, and a combination of whole face and face component templates are used to ensure low false detection rates. The input to the face recognition system is a normalized vertical gradient image of a face, which is compared against a database using a set of pretrained feedforward neural networks with a winner-take-all fuser. The training is performed by using an adaptation of the backpropagation algorithm. This system has been developed and tested using images from the FERET database and a set of images obtained from Rowley, et al and Sung and Poggio.

  14. Using Biometric Measurement in Real-Time as a Sympathetic System in Computer Games

    Science.gov (United States)

    Charij, Stephanie; Oikonomou, Andreas

    2013-01-01

    With the increasing potential for gaming hardware and peripherals to support biometrics, their application within the games industry for software and design should be considered. This paper assesses the ability to use a form of biometric measurement, heart rate, in real-time to improve the challenge and enjoyment of a game by catering it to…

  15. Cogntive Consistency Analysis in Adaptive Bio-Metric Authentication System Design

    Directory of Open Access Journals (Sweden)

    Gahangir Hossain

    2015-07-01

    Full Text Available Cognitive consistency analysis aims to continuously monitor one's perception equilibrium towards successful accomplishment of cognitive task. Opposite to cognitive flexibility analysis – cognitive consistency analysis identifies monotone of perception towards successful interaction process (e.g., biometric authentication and useful in generation of decision support to assist one in need. This study consider fingertip dynamics (e.g., keystroke, tapping, clicking etc. to have insights on instantaneous cognitive states and its effects in monotonic advancement towards successful authentication process. Keystroke dynamics and tapping dynamics are analyzed based on response time data. Finally, cognitive consistency and confusion (inconsistency are computed with Maximal Information Coefficient (MIC and Maximal Asymmetry Score (MAS, respectively. Our preliminary study indicates that a balance between cognitive consistency and flexibility are needed in successful authentication process. Moreover, adaptive and cognitive interaction system requires in depth analysis of user’s cognitive consistency to provide a robust and useful assistance.

  16. High-speed biometrics ultrasonic system for 3D fingerprint imaging

    Science.gov (United States)

    Maev, Roman G.; Severin, Fedar

    2012-10-01

    The objective of this research is to develop a new robust fingerprint identification technology based upon forming surface-subsurface (under skin) ultrasonic 3D images of the finger pads. The presented work aims to create specialized ultrasonic scanning methods for biometric purposes. Preliminary research has demonstrated the applicability of acoustic microscopy for fingerprint reading. The additional information from internal skin layers and dermis structures contained in the scan can essentially improve confidence in the identification. Advantages of this system include high resolution and quick scanning time. Operating in pulse-echo mode provides spatial resolution up to 0.05 mm. Technology advantages of the proposed technology are the following: • Full-range scanning of the fingerprint area "nail to nail" (2.5 x 2.5 cm) can be done in less than 5 sec with a resolution of up to 1000 dpi. • Collection of information about the in-depth structure of the fingerprint realized by the set of spherically focused 50 MHz acoustic lens provide the resolution ~ 0.05 mm or better • In addition to fingerprints, this technology can identify sweat porous at the surface and under the skin • No sensitivity to the contamination of the finger's surface • Detection of blood velocity using Doppler effect can be implemented to distinguish living specimens • Utilization as polygraph device • Simple connectivity to fingerprint databases obtained with other techniques • The digitally interpolated images can then be enhanced allowing for greater resolution • Method can be applied to fingernails and underlying tissues, providing more information • A laboratory prototype of the biometrics system based on these described principles was designed, built and tested. It is the first step toward a practical implementation of this technique.

  17. Multi-factor challenge/response approach for remote biometric authentication

    Science.gov (United States)

    Al-Assam, Hisham; Jassim, Sabah A.

    2011-06-01

    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.

  18. Trends in Biometric Technology

    African Journals Online (AJOL)

    Nafiisah

    Sensor: It is an acquisition device that captures the biometric data of an ..... Hand geometry is not sufficiently distinctive to allow 1-to-many searches and is .... difficulty is that veins move and flex as blood is pumped around the human body ... unlike visible light systems, infrared systems work accurately even in dim light or.

  19. Biometric features and privacy : condemned, based upon your finger print

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Veldhuis, Raymond

    2012-01-01

    What information is available in biometric features besides that needed for the biometric recognition process? What if a biometric feature contains Personally Identifiable Information? Will the whole biometric system become a threat to privacy? This paper is an attempt to quantifiy the link between

  20. Body, biometrics and identity.

    Science.gov (United States)

    Mordini, Emilio; Massari, Sonia

    2008-11-01

    According to a popular aphorism, biometrics are turning the human body into a passport or a password. As usual, aphorisms say more than they intend. Taking the dictum seriously, we would be two: ourself and our body. Who are we, if we are not our body? And what is our body without us? The endless history of identification systems teaches that identification is not a trivial fact but always involves a web of economic interests, political relations, symbolic networks, narratives and meanings. Certainly there are reasons for the ethical and political concerns surrounding biometrics but these reasons are probably quite different from those usually alleged.

  1. Sensor-fusion-based biometric identity verification

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W. [Sandia National Labs., Albuquerque, NM (United States); Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L. [New Mexico State Univ., Las Cruces, NM (United States). Electronic Vision Research Lab.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person`s identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm.

  2. Continuous verification using multimodal biometrics.

    Science.gov (United States)

    Sim, Terence; Zhang, Sheng; Janakiraman, Rajkumar; Kumar, Sandeep

    2007-04-01

    Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper, we present the theory, architecture, implementation, and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged-in user. Two modalities are currently used--face and fingerprint--but our theory can be readily extended to include more modalities. We show that continuous verification imposes additional requirements on multimodal fusion when compared to conventional verification systems. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for continuous verification and propose new metrics against which we benchmark our system.

  3. Histochemical and biometric study of the gastrointestinal system of Hyla orientalis (Bedriaga, 1890) (Anura, Hylidae).

    Science.gov (United States)

    Akat, E; Arıkan, H; Göçmen, B

    2014-11-28

    This study was carried out to assess the localization of hyaluronic acid (HA) and the distribution of glycoproteins in the gastrointestinal system of adult Hyla orientalis. Histochemical analysis of the gastrointestinal system in H. orientalis showed that mucous content included glycogene and/or oxidable dioles [periodic acid/Schiff (PAS)+], neutral or acid-rich (PAS/AB pH 2.5+), sialic acid residues (KOH/PAS+) and acid sulphate [Aldehyde fuchsin (AF)+] glycoproteins. However the mucus content was not the same in stomach, small and large intestine. The mucus content of stomach included only glycogene and/or oxidable dioles and sialic acid residues. Besides these histochemical methods, the localization of HA was detected using biotinylated hyaluronic acid binding protein labeled with streptavidin-fluorescein isothiocyanate (FITC). In the extracellular matrix of the submucosa, the reaction for HA was evident. Since HA was located in submucosa beneath the epithelial layer of gastrointestinal system, it has a significant role in hydric balance, and essential to provide the gastrointestinal system integrity and functionality. According to biometric results, there were statistical differences between small and large intestine in terms of the amount of material stained positive with PAS/AB, PAS, KOH/PAS and AF/AB. Additionally, number of goblet cells in the small and large intestine was significantly different.

  4. Motorcycle Start-stop System based on Intelligent Biometric Voice Recognition

    Science.gov (United States)

    Winda, A.; E Byan, W. R.; Sofyan; Armansyah; Zariantin, D. L.; Josep, B. G.

    2017-03-01

    Current mechanical key in the motorcycle is prone to bulgary, being stolen or misplaced. Intelligent biometric voice recognition as means to replace this mechanism is proposed as an alternative. The proposed system will decide whether the voice is belong to the user or not and the word utter by the user is ‘On’ or ‘Off’. The decision voice will be sent to Arduino in order to start or stop the engine. The recorded voice is processed in order to get some features which later be used as input to the proposed system. The Mel-Frequency Ceptral Coefficient (MFCC) is adopted as a feature extraction technique. The extracted feature is the used as input to the SVM-based identifier. Experimental results confirm the effectiveness of the proposed intelligent voice recognition and word recognition system. It show that the proposed method produces a good training and testing accuracy, 99.31% and 99.43%, respectively. Moreover, the proposed system shows the performance of false rejection rate (FRR) and false acceptance rate (FAR) accuracy of 0.18% and 17.58%, respectively. In the intelligent word recognition shows that the training and testing accuracy are 100% and 96.3%, respectively.

  5. Application of Biometric Security in Agent based Hotel Booking System - Android Environment

    Directory of Open Access Journals (Sweden)

    Wayne Lawrence

    2012-07-01

    Full Text Available Abstract — The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu. Booking of hotels is secured by the standard Secure Sockets Layer (SSL to confirm the identity of a website or server, encrypt data during transmission, and ensure the integrity of transmitted data. Even with this in place, hackers have broken the Secure Sockets Layer (SSL by targeting weaknesses in the MD5 algorithm.Recently good amount of work been carried in the use of Intelligent agents towards hotel search on J2ME based mobile handset which still has some weakness. So taking the weakness in the current agent based system, smart software agents been developed that overcomes the weakness in the previous system In addition to smart agent based system been developed and published elsewhere, we here propose to extend the system with the booking capability that allows the user to book a hotel of choice where the authenticity of the client may be determined securely using biometric security and information transmitted using Secure Sockets Layer (SSL (Server-Gated Cryptography (SGC on the internet which is novel and unique. This will be facilitated on Android 2.2-enabled mobile phone using JADE-LEAP Agent development kit.

  6. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  7. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  8. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    Science.gov (United States)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  9. Optical coherence tomography used for internal biometrics

    Science.gov (United States)

    Chang, Shoude; Sherif, Sherif; Mao, Youxin; Flueraru, Costel

    2007-06-01

    Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.

  10. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    Directory of Open Access Journals (Sweden)

    A. Drosou

    2011-01-01

    Full Text Available Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  11. Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

    Directory of Open Access Journals (Sweden)

    Maithili Arjunwadkar

    2012-11-01

    Full Text Available While there are various advantages of biometric authentication process, it is vulnerable to attacks, which can decline its security. To enhance the security of biometric process, Intrusion detection techniques are significantly useful. In this paper, we have designed intelligent agent as knowledge based Biometric Device Intrusion Detection tool which is an innovative design. This intelligent agent can be located on the Biometric device. It performs intrusion detection using Operating Systems audit trail and device manager information. The system consists of a user interface module, an inference engine, a knowledgebase of illegal transactions and certified biometric devices. Inference engine is implemented using JESS which is a Java Expert System Shell.

  12. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  13. Biometric authentication for ID cards with hologram watermarks

    Science.gov (United States)

    Croce Ferri, Lucilla; Mayerhoefer, Astrid; Frank, Marcus; Vielhauer, Claus; Steinmetz, Ralf

    2002-04-01

    We present an analysis of a new technique for the authentication of ID cardholders, based on the integration of a biometrics-based authentication system with digital watermarks. The chosen biometric authentication method is the dynamic signature verification of the ID cardholder, while we use a specific integrity watermark technique we developed, called Hologram Watermark, to embed and retrieve the off-line data onto an ID card. We take advantage of the fact, that two static biometric features (images of the user's face and signature) are already integral part of ID cards for manual verification and extent the stored biometric information by embedding on-line handwriting features of the signature as holographic watermarks in the overall image information of an ID card. Manipulation of any of the image information can be detected and will further disallow biometric verification of the forger. The Hologram Watermark technique produces content-related data using computer-generated hologram coding techniques. These data are embedded with watermarking techniques into the personal data printed on an ID card. The content-related data in this specific application are the dynamic features of the cardholder's signature. The main goal of this paper is to analyze the suitability of dynamic signature verification in combination with the Hologram Watermark technique, to facilitate automated user authentication based on information transparently embedded in ID cards.

  14. Literature Survey on Door Lock Security Systems

    National Research Council Canada - National Science Library

    Pradnya R Nehete; J P Chaudhari; S R Pachpande; K P Rane

    2016-01-01

    .... Due to the advancement in recent techniques, some door lock security systems are based on microcontroller, GSM, GPS, many sensors, software like MATLAB, PROTEUS, biometrics like face recognition...

  15. Emerging Biometric Modalities: Challenges and Opportunities

    Science.gov (United States)

    Gafurov, Davrondzhon

    Recent advances in sensor technology and wide spread use of various electronics (computers, PDA, mobile phones etc.) provide new opportunities for capturing and analyses of novel physiological and behavioural traits of human beings for biometric authentication. This paper presents an overview of several such types of human characteristics that have been proposed as alternatives to traditional types of biometrics. We refer to these characteristics as emerging biometrics. We survey various types of emerging modalities and techniques, and discuss their pros and cons. Emerging biometrics faces several limitations and challenges which include subject population coverage (focusing mostly on adults); unavailability of benchmark databases; little research with respect to vulnerability/robustness against attacks; and some privacy concerns they may arise. In addition, recognition performance of emerging modalities are generally less accurate compared to the traditional biometrics. Despite all of these emerging biometrics posses their own benefits and advantages compared to traditional biometrics which makes them still attractive for research. First of all, emerging biometrics can always serve as a complementary source for identity information; they can be suitable in applications where traditional biometrics are difficult or impossible to adapt such as continuous or periodic re-verification of the user's identity etc.

  16. AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation

    Science.gov (United States)

    Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd

    2016-11-01

    Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.

  17. Towards a Continuous Biometric System Based on ECG Signals Acquired on the Steering Wheel

    Directory of Open Access Journals (Sweden)

    João Ribeiro Pinto

    2017-09-01

    Full Text Available Electrocardiogram signals acquired through a steering wheel could be the key to seamless, highly comfortable, and continuous human recognition in driving settings. This paper focuses on the enhancement of the unprecedented lesser quality of such signals, through the combination of Savitzky-Golay and moving average filters, followed by outlier detection and removal based on normalised cross-correlation and clustering, which was able to render ensemble heartbeats of significantly higher quality. Discrete Cosine Transform (DCT and Haar transform features were extracted and fed to decision methods based on Support Vector Machines (SVM, k-Nearest Neighbours (kNN, Multilayer Perceptrons (MLP, and Gaussian Mixture Models - Universal Background Models (GMM-UBM classifiers, for both identification and authentication tasks. Additional techniques of user-tuned authentication and past score weighting were also studied. The method’s performance was comparable to some of the best recent state-of-the-art methods (94.9% identification rate (IDR and 2.66% authentication equal error rate (EER, despite lesser results with scarce train data (70.9% IDR and 11.8% EER. It was concluded that the method was suitable for biometric recognition with driving electrocardiogram signals, and could, with future developments, be used on a continuous system in seamless and highly noisy settings.

  18. Towards a Continuous Biometric System Based on ECG Signals Acquired on the Steering Wheel.

    Science.gov (United States)

    Pinto, João Ribeiro; Cardoso, Jaime S; Lourenço, André; Carreiras, Carlos

    2017-09-28

    Electrocardiogram signals acquired through a steering wheel could be the key to seamless, highly comfortable, and continuous human recognition in driving settings. This paper focuses on the enhancement of the unprecedented lesser quality of such signals, through the combination of Savitzky-Golay and moving average filters, followed by outlier detection and removal based on normalised cross-correlation and clustering, which was able to render ensemble heartbeats of significantly higher quality. Discrete Cosine Transform (DCT) and Haar transform features were extracted and fed to decision methods based on Support Vector Machines (SVM), k-Nearest Neighbours (kNN), Multilayer Perceptrons (MLP), and Gaussian Mixture Models - Universal Background Models (GMM-UBM) classifiers, for both identification and authentication tasks. Additional techniques of user-tuned authentication and past score weighting were also studied. The method's performance was comparable to some of the best recent state-of-the-art methods (94.9% identification rate (IDR) and 2.66% authentication equal error rate (EER)), despite lesser results with scarce train data (70.9% IDR and 11.8% EER). It was concluded that the method was suitable for biometric recognition with driving electrocardiogram signals, and could, with future developments, be used on a continuous system in seamless and highly noisy settings.

  19. Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2012-03-01

    Full Text Available Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure, biometric and Radio Frequency Identification to support various cryptographic, as this is considered the basic tools to prove the authenticity and integrity of the Machine Readable Travel Documents. The large-scale worldwide PKI is construction, by means of bilateral trust relationships between Countries. Investigate the good practices, which are essential for the establishment of a global identification scheme based on e-passports. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

  20. A Smart Spoofing Face Detector by Display Features Analysis

    National Research Council Canada - National Science Library

    Lai, ChinLun; Tai, ChiuYuan

    2016-01-01

    In this paper, a smart face liveness detector is proposed to prevent the biometric system from being "deceived" by the video or picture of a valid user that the counterfeiter took with a high definition handheld device (e.g...

  1. Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System

    CERN Document Server

    Ibidapo,; Omogbadegun, Zaccheous O; Oyelami, Olufemi M

    2011-01-01

    Security measures at banks can play a critical, contributory role in preventing attacks on customers. These measures are of paramount importance when considering vulnerabilities and causation in civil litigation. Banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. This paper focuses on vulnerabilities and the increasing wave of criminal activities occurring at Automated Teller Machines (ATMs) where quick cash is the prime target for criminals rather than at banks themselves. A biometric measure as a means of enhancing the security has emerged from the discourse. Keywords-Security, ATM, Biometric, Crime.

  2. Multibiometrics for face recognition

    NARCIS (Netherlands)

    Veldhuis, Raymond; Deravi, Farzin; Tao, Qian

    2008-01-01

    Fusion is a popular practice to combine multiple sources of biometric information to achieve systems with greater performance and flexibility. In this paper various approaches to fusion within a multibiometrics context are considered and an application to the fusion of 2D and 3D face information is

  3. Multibiometrics for face recognition

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.; Deravi, Farzin; Tao, Q.

    Fusion is a popular practice to combine multiple sources of biometric information to achieve systems with greater performance and flexibility. In this paper various approaches to fusion within a multibiometrics context are considered and an application to the fusion of 2D and 3D face information is

  4. Transfer learning for bimodal biometrics recognition

    Science.gov (United States)

    Dan, Zhiping; Sun, Shuifa; Chen, Yanfei; Gan, Haitao

    2013-10-01

    Biometrics recognition aims to identify and predict new personal identities based on their existing knowledge. As the use of multiple biometric traits of the individual may enables more information to be used for recognition, it has been proved that multi-biometrics can produce higher accuracy than single biometrics. However, a common problem with traditional machine learning is that the training and test data should be in the same feature space, and have the same underlying distribution. If the distributions and features are different between training and future data, the model performance often drops. In this paper, we propose a transfer learning method for face recognition on bimodal biometrics. The training and test samples of bimodal biometric images are composed of the visible light face images and the infrared face images. Our algorithm transfers the knowledge across feature spaces, relaxing the assumption of same feature space as well as same underlying distribution by automatically learning a mapping between two different but somewhat similar face images. According to the experiments in the face images, the results show that the accuracy of face recognition has been greatly improved by the proposed method compared with the other previous methods. It demonstrates the effectiveness and robustness of our method.

  5. Pain Expression as a Biometric

    DEFF Research Database (Denmark)

    Haque, Mohammad Ahsanul; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    Developing a vision-based efficient and automatic pain intensity measurement system requires the understanding of the relationship between self-reported pain intensity and pain expression in the facial videos. In this paper, we first demonstrate how pain expression in facial video frames may...... not match with the self-reported score. This is because the pain and non-pain frames are not always visually distinctive; though the self-report tells different story of having pain and non-pain status. On the other hand previous studies reported that general facial expressions can be used as biometrics....... Thus, in this paper we investigated the relevance of pain expression from facial video to be used as a biometric or soft-biometric trait. In order to do that, we employed a biometric person recognition scenario by using features obtained from the pain expression pattern found in the temporal axis...

  6. Multimodal Biometrics Recognition by Dimensionality Diminution Method

    Directory of Open Access Journals (Sweden)

    Suvarnsing Bhable

    2015-12-01

    Full Text Available Multimodal biometric system utilizes two or more character modalities, e.g., face, ear, and fingerprint, Signature, plamprint to improve the recognition accuracy of conventional unimodal methods. We propose a new dimensionality reduction method called Dimension Diminish Projection (DDP in this paper. DDP can not only preserve local information by capturing the intra-modal geometry, but also extract between-class relevant structures for classification effectively. Experimental results show that our proposed method performs better than other algorithms including PCA, LDA and MFA.

  7. Anomaly based intrusion detection for a biometric identification system using neural networks

    CSIR Research Space (South Africa)

    Mgabile, T

    2012-10-01

    Full Text Available detection technique that analyses the fingerprint biometric network traffic for evidence of intrusion. The neural network algorithm that imitates the way a human brain works is used in this study to classify normal traffic and learn the correct traffic...

  8. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  9. Cancelable biometrics realization with multispace random projections.

    Science.gov (United States)

    Teoh, Andrew Beng Jin; Yuang, Chong Tze

    2007-10-01

    Biometric characteristics cannot be changed; therefore, the loss of privacy is permanent if they are ever compromised. This paper presents a two-factor cancelable formulation, where the biometric data are distorted in a revocable but non-reversible manner by first transforming the raw biometric data into a fixed-length feature vector and then projecting the feature vector onto a sequence of random subspaces that were derived from a user-specific pseudorandom number (PRN). This process is revocable and makes replacing biometrics as easy as replacing PRNs. The formulation has been verified under a number of scenarios (normal, stolen PRN, and compromised biometrics scenarios) using 2400 Facial Recognition Technology face images. The diversity property is also examined.

  10. Protection of Patient Identity and Privacy Using Vascular Biometrics

    OpenAIRE

    C.Lakshmi Deepika; A.Kandaswamy; C.Vimal

    2010-01-01

    Biometric systems are being used in hospitals to streamline patient registration and identification, as an effective measure to protect patient privacy and prevent identity theft. Many Hospitals and Healthcare institutions are turning towards Vascular Biometrics which complement the biometric recognition with hygiene and improved accuracy. In this paper, a multimodal hand vein system and a multibiometric fingerprint-hand vein biometric system are proposed. The multimodal hand vein system is a...

  11. Rapid 3D measurement of human faces for biometric application by digital fringe projection with digital light projection (DLP®)

    Science.gov (United States)

    Benderoth, Christian; Bell, Rebecca L.; Frankowski, Gottfried

    2008-04-01

    Facial recognitions of people can be used for the identification of individuals, or can serve as verification e.g. for access controls. The process requires, that the facial data is captured and then compared with stored reference data. In this context, far better recognition performances can be expected from 3-dimensional facial recognition systems than can be from the 2-dimensional systems which are currently used. The accuracy with which the facial profile can be captured, depends on the speed off the measuring data acquisition i.e. the scanning speed and on the measuring accuracy of the measuring device i.e. the 3D scanner.

  12. Combining Facial Recognition, Automatic License Plate Readers and Closed Circuit Television to Create an Interstate Identification System for Wanted Subjects

    Science.gov (United States)

    2015-12-01

    implementation of this system? What agencies or 3 “Biometrics,” Biometric- Solutions , accessed...21 specific personal markers, to include hair color, 7 John D. Woodward, Biometrics: Facing Up to...Working Paper No. 10) ( Hull , UK: University of Hull , 2003). 31 McCahill and Norris, CCTV Systems in London, 2. 32 Nils Zurawski, “I Know Where You

  13. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  14. A Multi—View Face Recognition System

    Institute of Scientific and Technical Information of China (English)

    张永越; 彭振云; 等

    1997-01-01

    In many automatic face recognition systems,posture constraining is a key factor preventing them from application.In this paper a series of strategies will be described to achieve a system which enables face recognition under varying pose.These approaches include the multi-view face modeling,the threschold image based face feature detection,the affine transformation based face posture normalization and the template matching based face identification.Combining all of these strategies,a face recognition system with the pose invariance is designed successfully,Using a 75MHZ Pentium PC and with a database of 75 individuals,15 images for each person,and 225 test images with various postures,a very good recognition rate of 96.89% is obtained.

  15. Secure Biometric Multi-Logon System Based on Current Authentication Technologies

    Science.gov (United States)

    Tait, Bobby L.

    The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.

  16. Contact-free and pose-invariant hand-biometric-based personal identification system using RGB and depth data

    Institute of Scientific and Technical Information of China (English)

    Can WANG; Hong LIU; Xing LIU

    2014-01-01

    Hand-biometric-based personal identifi cation is considered to be an effective method for automatic recognition. However, existing systems require strict constraints during data acquisition, such as costly devices, specifi ed postures, simple background, and stable illumination. In this paper, a contactless personal identifi cation system is proposed based on matching hand geometry features and color features. An inexpensive Kinect sensor is used to acquire depth and color images of the hand. During image acquisition, no pegs or surfaces are used to constrain hand position or posture. We segment the hand from the background through depth images through a process which is insensitive to illumination and background. Then fi nger orientations and landmark points, like fi nger tips or fi nger valleys, are obtained by geodesic hand contour analysis. Geometric features are extracted from depth images and palmprint features from intensity images. In previous systems, hand features like fi nger length and width are normalized, which results in the loss of the original geometric features. In our system, we transform 2D image points into real world coordinates, so that the geometric features remain invariant to distance and perspective effects. Extensive experiments demonstrate that the proposed hand-biometric-based personal identifi cation system is effective and robust in various practical situations.

  17. Biometric Secured Result Processing Software For Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Oladipo Oluwasegun

    2015-08-01

    Full Text Available Abstract One of the challenges facing result processing in Nigerian tertiary institutions is the problem of insecurity. Untraceable changes are made to students result and this result to various disasters such as innocent people losing their jobs since their innocence cannot be proven. Biometric based systems operate on behavioral and physiological biometric data to identify a person and grant required access to a user. Physiological characteristics such as fingerprint remains unchanged throughout an individuals life time and thus it can serve as a viable means of identifying and authenticating users who are to access a system. In this study fingerprint biometric based result processing software is developed to ensure that users are well authenticated and are made to see only what they are pre-configured to see and work with. The fingerprint authentication system was developed using visual basic.net. Staff fingerprints were enrolled into the system to form a biometric template which the system validates against at every login attempt on the result processing software. The digital personal one touch ID sdk and other libraries were used in developing the authentication system. The result processing software also ensures that all write transactions to the database are confirmed and identified by forcing another biometric authentication at the point of making a write request to the web server and associated database. This ensures that the exact person initiating the transaction was the same user who logged in to the application. The users identified at login and various confirmation milestones set for write transactions are logged into a table for future reference and audit trail. Conclusively the developed system has helped to eradicate the problem of user impersonation by ensuring only authorized users are made to access the software and in-turn participate in result processing activities.

  18. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    Science.gov (United States)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  19. Tongue prints: A novel biometric and potential forensic tool

    Science.gov (United States)

    Radhika, T.; Jeddy, Nadeem; Nithya, S.

    2016-01-01

    Tongue is a vital internal organ well encased within the oral cavity and protected from the environment. It has unique features which differ from individual to individual and even between identical twins. The color, shape, and surface features are characteristic of every individual, and this serves as a tool for identification. Many modes of biometric systems have come into existence such as fingerprint, iris scan, skin color, signature verification, voice recognition, and face recognition. The search for a new personal identification method secure has led to the use of the lingual impression or the tongue print as a method of biometric authentication. Tongue characteristics exhibit sexual dimorphism thus aiding in the identification of the person. Emerging as a novel biometric tool, tongue prints also hold the promise of a potential forensic tool. This review highlights the uniqueness of tongue prints and its superiority over other biometric identification systems. The various methods of tongue print collection and the classification of tongue features are also elucidated. PMID:28123263

  20. Tongue prints: A novel biometric and potential forensic tool

    Directory of Open Access Journals (Sweden)

    T Radhika

    2016-01-01

    Full Text Available Tongue is a vital internal organ well encased within the oral cavity and protected from the environment. It has unique features which differ from individual to individual and even between identical twins. The color, shape, and surface features are characteristic of every individual, and this serves as a tool for identification. Many modes of biometric systems have come into existence such as fingerprint, iris scan, skin color, signature verification, voice recognition, and face recognition. The search for a new personal identification method secure has led to the use of the lingual impression or the tongue print as a method of biometric authentication. Tongue characteristics exhibit sexual dimorphism thus aiding in the identification of the person. Emerging as a novel biometric tool, tongue prints also hold the promise of a potential forensic tool. This review highlights the uniqueness of tongue prints and its superiority over other biometric identification systems. The various methods of tongue print collection and the classification of tongue features are also elucidated.

  1. Investigation of New Techniques for Face detection

    OpenAIRE

    Abdallah, Abdallah Sabry

    2007-01-01

    The task of detecting human faces within either a still image or a video frame is one of the most popular object detection problems. For the last twenty years researchers have shown great interest in this problem because it is an essential pre-processing stage for computing systems that process human faces as input data. Example applications include face recognition systems, vision systems for autonomous robots, human computer interaction systems (HCI), surveillance systems, biometric based a...

  2. Advent of Biometric Sensors in Field of Access Control

    Directory of Open Access Journals (Sweden)

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  3. Identifying People with Soft-Biometrics at Fleet Week

    Science.gov (United States)

    2013-03-01

    Forensics , Security and Intelligence, Firenze, Italy, 2010, pp. 25-30. [7] U. Park and A. Jain, "Face matching and retrieval using soft biometrics ...Identifying People with Soft- Biometrics at Fleet Week Eric Martinson NRC Post-Doctoral Fellow US Naval Research Laboratory Washington, DC...number of different features by which people can be identified. This work describes three alternative, soft biometrics (clothing, complexion, and

  4. Biometrics for electronic health records.

    Science.gov (United States)

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.

  5. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Science.gov (United States)

    Chen, C.; Veldhuis, R. N. J.; Kevenaar, T. A. M.; Akkermans, A. H. M.

    2009-12-01

    Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA) principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP) approach and a greedy search (GS) approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  6. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Directory of Open Access Journals (Sweden)

    C. Chen

    2009-01-01

    Full Text Available Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP approach and a greedy search (GS approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  7. Biometric and intelligent decision making support

    CERN Document Server

    Kaklauskas, Arturas

    2015-01-01

    This book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people’s needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master’s degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities fo...

  8. Methodology of the determination of the uncertainties by using the biometric device the broadway 3D

    Science.gov (United States)

    Jasek, Roman; Talandova, Hana; Adamek, Milan

    2016-06-01

    The biometric identification by face is among one of the most widely used methods of biometric identification. Due to it provides a faster and more accurate identification; it was implemented into area of security 3D face reader by Broadway manufacturer was used to measure. It is equipped with the 3D camera system, which uses the method of structured light scanning and saves the template into the 3D model of face. The obtained data were evaluated by software Turnstile Enrolment Application (TEA). The measurements were used 3D face reader the Broadway 3D. First, the person was scanned and stored in the database. Thereafter person has already been compared with the stored template in the database for each method. Finally, a measure of reliability was evaluated for the Broadway 3D face reader.

  9. Towards automatic forensic face recognition

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Luuk; Veldhuis, Raymond

    2011-01-01

    In this paper we present a methodology and experimental results for evidence evaluation in the context of forensic face recognition. In forensic applications, the matching score (hereafter referred to as similarity score) from a biometric system must be represented as a Likelihood Ratio (LR). In our

  10. Mobile networks for biometric data analysis

    CERN Document Server

    Madrid, Natividad; Seepold, Ralf; Orcioni, Simone

    2016-01-01

    This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient’s prevention pl...

  11. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  12. 基于移动平台的多重生物识别系统%MULTI-MODAL BIOMETRIC AUTHENTICATION SYSTEM BASED ON MOBILE PLATFORM

    Institute of Scientific and Technical Information of China (English)

    黄轩; 范京晔

    2015-01-01

    随着智能手机在人们日常生活中的广泛使用,移动端的信息安全问题已经不容忽视. 提出一套基于移动端的多重生物特征识别系统,定义多重安全等级,并使用输入习惯识别、脸部识别、说话人身份识别三种生物识别技术取代传统的密码技术来识别手机用户的身份. 实验表明该系统在面对低安全需求时可以提供方便快捷的识别服务;而在高安全等级时,可以实现良好的安全性(最高安全等级错误接受率为0.014%). 相比传统的移动识别模式,该系统不仅更加智能,而且提高了移动身份识别的安全性和实用性.%With the extensive use of smartphones in people's daily life, the information security problem in mobile terminals should no lon-ger be overlooked.This paper presents a mobile terminals-based multi-modal biometric authentication system, it defines multi-level security grade and uses three kinds of biometric recognition technologies, the typing behaviour recognition, the face recognition and the speaker identity recognition, to replace traditional cryptography to authenticate the identity of mobile phone users.Experiments show that the multi-modal authentication system is able to provide convenient and rapid authentication services at low security level.While the security level is high, the system can realise good security performance (with highest security grade of false acceptance rate 0.014%).Compared with tradi-tional mobile authentication model, the proposed multi-modal system is more intelligent, and raises the security and practicability of mobile identity authentication.

  13. Automatic Age Estimation System for Face Images

    OpenAIRE

    Chin-Teng Lin; Dong-Lin Li; Jian-Hao Lai; Ming-Feng Han; Jyh-Yeong Chang

    2012-01-01

    Humans are the most important tracking objects in surveillance systems. However, human tracking is not enough to provide the required information for personalized recognition. In this paper, we present a novel and reliable framework for automatic age estimation based on computer vision. It exploits global face features based on the combination of Gabor wavelets and orthogonal locality preserving projections. In addition, the proposed system can extract face aging features automatically in rea...

  14. Autopoietic Theory as a Framework for Biometrics

    Directory of Open Access Journals (Sweden)

    Markus Schatten

    2009-01-01

    Full Text Available Autopoietic theory which represents a framework for describing complex non-linear and especially living systems is described in a context of biometric characteristics. It is argued that any living system by performing an internal process of reproducing its structural components yields physical biometric characteristics. Likewise any living system when structurally coupling to another (eventually allopoietic system yields a behavioral or psychological characteristic of the living system. It is shown that any system that can be considered as autopoietic can potentially be measured, authenticated and/or identified using adequate biometric methods, and thus biometrics is applicable to any autopoietic system: living beings, groups of living beings, social systems, organizations as well as information systems. In the end implications of such a conceptualization are discussed as well as possible applications.

  15. Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris

    Directory of Open Access Journals (Sweden)

    Mr.P.Balakumar

    2011-09-01

    Full Text Available Exact and automatic recognition and authentication of users are a essential difficulty in all systems. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart cards are not presently sufficient in few situations. What is required is a system that could authenticate that the person is actually the person. The biometrics is improving the capability to recognize the persons. The usage of biometrics system permits the recognition of a living person according to the physiological features or behavioral features to be recognized without human involvement. This leads to the world wide usage of biometrics to secure the system. The various biometrics used in securing system are fingerprint, iris, retina, etc. The construction of cryptographic key from biometrics is used generally to secure the system. The efficiency and the flexibility of the cryptographic make it suitable for securing purpose. In some times, biometrics can be stolen; this makes the attackers to access the system for any time. This problem is diminished in this paper by using two biometrics features. The biometrics used in this paper is fingerprint and iris. These two features are combined with the help of fusion algorithm. From the combined features, cryptographic key is generated. The experimental result shows that the proposed techniques results in better security than the existing techniques.

  16. A Study on EMG-based Biometrics

    Directory of Open Access Journals (Sweden)

    Jin Su Kim

    2017-05-01

    Full Text Available Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG, electromyogram (EMG, and electroencephalogram (EEG. Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-based biometrics and implement a motion recognition and personal identification system. The system extracted features using non-uniform filter bank and Waveform Length (WL, and reduces the dimension using Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA. Afterward, it classified the features using Euclidean Distance (ED, Support Vector Machine (SVM and K Nearest Neighbors (KNN. As a result of the motion recognition experiment, 95% of acquired EMG data and 84.66% of UCI data were obtained and as a result of the personal recognition experiment, 85% of acquired EMG data and 88.66% of UCI data were obtained.

  17. Biometric Passport Validation Scheme using Radio Frequency Identification

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2013-04-01

    Full Text Available Biometric passports issued nowadays have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris. The electronic passport is the privacy and security risks that arise by embedding RFID technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.

  18. Use of synthetic data to test biometric algorithms

    Science.gov (United States)

    Murphy, Thomas M.; Broussard, Randy; Rakvic, Ryan; Ngo, Hau; Ives, Robert W.; Schultz, Robert; Aguayo, Joseph T.

    2016-07-01

    For digital imagery, face detection and identification are functions of great importance in wide-ranging applications, including full facial recognition systems. The development and evaluation of unique and existing face detection and face identification applications require a significant amount of data. Increased availability of such data volumes could benefit the formulation and advancement of many biometric algorithms. Here, the utility of using synthetically generated face data to evaluate facial biometry methodologies to a precision that would be unrealistic for a parametrically uncontrolled dataset, is demonstrated. Particular attention is given to similarity metrics, symmetry within and between recognition algorithms, discriminatory power and optimality of pan and/or tilt in reference images or libraries, susceptibilities to variations, identification confidence, meaningful identification mislabelings, sensitivity, specificity, and threshold values. The face identification results, in particular, could be generalized to address shortcomings in various applications and help to inform the design of future strategies.

  19. Realistic Measurement of Student Attendance in LMS Using Biometrics

    Directory of Open Access Journals (Sweden)

    Elisardo Gonzalez-Agulla

    2010-10-01

    Full Text Available In this paper we propose a solution to obtain useful and reliable student session logs in a Learning Management System (LMS combining current logs with biometrics-based logs that show the student behaviour during the whole learning session. The aims of our solution are to guarantee that the online student is who he/she claims to be, and also to know exactly how much time he/she spends in front of the computer reading each LMS content. Even when the proposed solution does not completely avoid cheating, the use of biometric data during authentication and face tracking provides additional help to validate student performance during learning sessions. In this way it is possible to improve security for specific contents, to gain feedback of the student effort and to check the actual time spent in learning.

  20. Playful biometrics: controversial technology through the lens of play.

    Science.gov (United States)

    Ellerbrok, Ariane

    2011-01-01

    This article considers the role of play in the context of technological emergence and expansion, particularly as it relates to recently emerging surveillance technologies. As a case study, I consider the trajectory of automated face recognition—a biometric technology of numerous applications, from its more controversial manifestations under the rubric of national security to a clearly emerging orientation toward play. This shift toward “playful” biometrics—or from a technology traditionally coded as “hard” to one now increasingly coded as “soft”—is critical insofar as it renders problematic the traditional modes of critique that have, up until this point, challenged the expansion of biometric systems into increasingly ubiquitous realms of everyday life. In response to this dynamic, I propose theorizing the expansion of face recognition specifically in relation to “play,” a step that allows us to broaden the critical space around newly emerging playful biometrics, as well as playful surveillance more generally. In addition, play may also have relevance for theorizing other forms of controversial technology, particularly given its potential role in processes of obfuscation, normalization, and marginalization.

  1. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... of the Workshop are: The European Biometrics Forum, The Danish Biometrics Research Project Consortium, the UK Biometrics Institute and the Institution of Engineering and Technology. The BIOID workshop was jointly organized and held at the Roskilde University in Denmark from May 7 — May 9, 2008....

  2. Security analysis for biometric data in ID documents

    Science.gov (United States)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  3. Design of an Active Multispectral SWIR Camera System for Skin Detection and Face Verification

    Directory of Open Access Journals (Sweden)

    Holger Steiner

    2016-01-01

    Full Text Available Biometric face recognition is becoming more frequently used in different application scenarios. However, spoofing attacks with facial disguises are still a serious problem for state of the art face recognition algorithms. This work proposes an approach to face verification based on spectral signatures of material surfaces in the short wave infrared (SWIR range. They allow distinguishing authentic human skin reliably from other materials, independent of the skin type. We present the design of an active SWIR imaging system that acquires four-band multispectral image stacks in real-time. The system uses pulsed small band illumination, which allows for fast image acquisition and high spectral resolution and renders it widely independent of ambient light. After extracting the spectral signatures from the acquired images, detected faces can be verified or rejected by classifying the material as “skin” or “no-skin.” The approach is extensively evaluated with respect to both acquisition and classification performance. In addition, we present a database containing RGB and multispectral SWIR face images, as well as spectrometer measurements of a variety of subjects, which is used to evaluate our approach and will be made available to the research community by the time this work is published.

  4. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    Vandana S Inamdar; Priti P Rege

    2014-02-01

    In order to improve the robustness of the watermarking algorithm, a dual watermarking method is proposed to prove copyright ownership. Visible watermarking is important for protecting online resources from unauthorized reproduction. However robust, visible watermarks are vulnerable to illegal removal and other common signal processing and geometric attacks. Multiple invisible watermarks can enhance the protection of the visibly watermarked image. When the ownership of tampered image is in question, the invisible watermark can be extracted to provide appropriate ownership information. We have proposed dual watermarking scheme with multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly offline signature is overlaid translucently on image. Before embedding, speech is compressed using Linear Predictive Coding (LPC) and Gabor face is created from face biometric trait. All three watermarks Gabor face, LPC coefficients and offline signature are the biometric characteristics of the owner and hence they are highly related with copyright holder. The proposed scheme is robust enough, Gabor face and LPC coefficients can be extracted from the signature marked image or even from the tampered image from which signature is removed illegally or legally. As multiple watermarks are embedded at least one watermark survives under different attacks. It can find application for joint ownership or to address single ownership multiple times.

  5. Soft Biometrics; Human Identification Using Comparative Descriptions.

    Science.gov (United States)

    Reid, Daniel A; Nixon, Mark S; Stevenage, Sarah V

    2014-06-01

    Soft biometrics are a new form of biometric identification which use physical or behavioral traits that can be naturally described by humans. Unlike other biometric approaches, this allows identification based solely on verbal descriptions, bridging the semantic gap between biometrics and human description. To permit soft biometric identification the description must be accurate, yet conventional human descriptions comprising of absolute labels and estimations are often unreliable. A novel method of obtaining human descriptions will be introduced which utilizes comparative categorical labels to describe differences between subjects. This innovative approach has been shown to address many problems associated with absolute categorical labels-most critically, the descriptions contain more objective information and have increased discriminatory capabilities. Relative measurements of the subjects' traits can be inferred from comparative human descriptions using the Elo rating system. The resulting soft biometric signatures have been demonstrated to be robust and allow accurate recognition of subjects. Relative measurements can also be obtained from other forms of human representation. This is demonstrated using a support vector machine to determine relative measurements from gait biometric signatures-allowing retrieval of subjects from video footage by using human comparisons, bridging the semantic gap.

  6. Multimodal Biometric Technology System Framework and E-Commerce in Emerging Markets

    Directory of Open Access Journals (Sweden)

    Chike Obed-Emeribe

    2013-08-01

    Full Text Available It is self-evident that the game changer of our modern world – the “internet” has endowed the twenty first century man with enormous potentials and possibilities. Ranging from enhanced capabilities in business (e-business, governance (e-governance, politics, social interaction and information exchange. The internet has indeed shrinked the global distance that once posed a great barrier and limited man’s endeavours in the preceding centuries. Amidst the great advantages derivable from the use of internet for various purposes lie inherent security threats. To a large extent, these security hindrances have been addressed in advanced nations of the world, as a result, internet phenomenon has pervaded all aspects of the advanced nations economy. This is evident in different electronic platforms that are available for the delivery of various products and services. On the contrary, the application of internet in various aspects of commerce has been hampered by the challenges of security limitations due to identity issues in the developing/emerging economies. Due to these security threats, business owners and the general public in less-developed world demonstrate great sense of apathy in the use of available electronic options for the purpose of commerce. Against the backdrop of the above, and the poor infrastructure basis of the developing nations, this research paper analyses and proposes the implementation of multimodal biometric technology frameworks with novel server architecture to tackle the security threats inherent with e-commerce in the developing world.

  7. Performance Enhancement Of Multimodal Biometrics Using Cryptosystem

    Directory of Open Access Journals (Sweden)

    Muskaan,

    2015-06-01

    Full Text Available Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.

  8. BIOMETRIC RECOGNITION: A MODERN ERA FOR SECURITY

    Directory of Open Access Journals (Sweden)

    VIJAY DHIR,

    2010-08-01

    Full Text Available Many varieties of systems require some reliable recognition system that gives the identity of a person. There are many applications that need the identity of a person to operate such as ATM, Laptops, Access to buildings, cellular Phones & some sensitive security locations. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an ndividual’s identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card or “what she remembers” (e.g., a password. In this paper, we give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.

  9. Demographic and health surveillance of mobile pastoralists in Chad: integration of biometric fingerprint identification into a geographical information system

    Directory of Open Access Journals (Sweden)

    Daniel Weibel

    2008-11-01

    Full Text Available There is a pressing need for baseline demographic and health-related data to plan, implement and evaluate health interventions in developing countries, and to monitor progress towards international development goals. However, mobile pastoralists, i.e. people who depend on a livestock production system and follow their herds as they move, remain marginalized from rural development plans and interventions. The fact that mobile people are hard to reach and stay in contact with is a plausible reason why they are underrepresented in national censuses and/or alternative sequential sample survey systems. We present a proof-of-concept of monitoring highly mobile, pastoral people by recording demographic and health-related data from 933 women and 2020 children and establishing a biometric identification system (BIS based on the registration and identification of digital fingerprints. Although only 22 women, representing 2.4% of the total registered women, were encountered twice in the four survey rounds, the approach implemented is shown to be feasible. The BIS described here is linked to a geographical information system to facilitate the creation of the first health and demographic surveillance system in a mobile, pastoralist setting. Our ultimate goal is to implement and monitor interventions with the “one health” concept, thus integrating and improving human, animal and ecosystem health.

  10. Biometrics Enabling Capability Increment 1 (BEC Inc 1)

    Science.gov (United States)

    2016-03-01

    Automated Biometrics Identification System (DoD ABIS). DoD ABIS is an information technology system that supports identity superiority by providing the... identification or verification of identity; retain the collected biometrics and related information for the necessary amount of time; transfer (send and receive...long term support strategy for the DoD Automated Biometrics Identification System repository to ensure continued capability. Firm, Fixed-Price

  11. On Soft Biometrics

    DEFF Research Database (Denmark)

    Nixon, Mark; Correia, Paulo; Nasrollahi, Kamal

    2015-01-01

    Innovation has formed much of the rich history in biometrics. The field of soft biometrics was originally aimed to augment the recognition process by fusion of metrics that were sufficient to discriminate populations rather than individuals. This was later refined to use measures that could be used...

  12. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  13. Iris and periocular biometrics

    CERN Document Server

    Rathgeb, Christian

    2017-01-01

    This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.

  14. A New Feature Extraction Technique for Person Identification Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    C. Malathy

    2014-09-01

    Full Text Available Unimodal biometric systems when compared with multimodal systems can be easily spoofed and may get affected by noisy data. Due to the limitations faced by unimodal systems, the need for multimodal biometric systems has rapidly increased. Multimodal systems are more reliable as it uses more than one independent biometric trait to recognize a person. These systems are more secured and have less enrollment problems compared to unimodal systems. A new Enhanced Local Line Binary Pattern (ELLBP method is devised to extract features from ear and fingerprint so as to improve recognition rate and to provide a more reliable and secured multimodal system. The features extracted are stored in the database and compared with the test features for matching. Hamming distance is used as the metric for identification. Experiments were conducted with publicly available databases and were observed that this enhanced method provides excellent results compared to earlier methods. The method was analyzed for performance with Local Binary Pattern (LBP, Local Line Binary Pattern (LLBP and Local Ternary Pattern (LTP. The results of our multimodal system were compared with individual biometric traits and also with ear and fingerprint fused together using enhanced LLPD and other earlier methods. It is observed that our method outperforms earlier methods.

  15. The Koundoum sheep breed in Niger: morpho-biometric study and description of the production system

    Directory of Open Access Journals (Sweden)

    Issa Hamadou

    2015-05-01

    Full Text Available The diffusion of highly productive breeds across developing countries goes along with a neglect of indigenous breeds, which are well suited to their environment but often show low yields. Thus, in Niger, the flock of Koundoum sheep are rapidly decreasing. The Koundoum is one of the few wool sheep breeds of Africa and shows important adaptive feature to its native environment, i.e. the humid pastures on the banks of the Niger River. To characterise the breed and to understand its production context, a survey has been conducted in 104 herds in four communes along the Niger River (Kollo, Tillabery, Say and Tera. Nine body measurements, including live weight, were taken on 180 adult sheep (101 females and 79 males. The herds varied from 2 to 60 heads, with a median size of eight animals and two thirds of the herds having less than 10 animals. Mainly fed on natural pastures, 85.6% of the herds received crop residues. Only natural mating was practiced. Veterinary care was restricted to anti-helminthic and some indigenous treatments. The frequent affiliation of breeders to professional unions appeared as favourable to the implementation of a collective conservation program. The Koundoum sheep were white or black coated, with the black colour being most frequent (75.6 %. Wattles were present in both sexes at similar frequencies of around 14 %. All biometric variables were significantly and positively correlated between them. The thoracic perimeter showed the best correlation with live weight in both males and females. Three variables were selected for live weight prediction: thoracic perimeter, height at withers and rump length. From the present study, it is expected that the in situ conservation of the Koundoum sheep will be highly problematic, due to lack of market opportunities for wool and the willingness of smallholders to get involved in pure Koundoum rearing.

  16. Face Synthesis (FASY) System for Generation of a Face Image from Human Description

    CERN Document Server

    Halder, Santanu; Nasipuri, Mita; Basu, Dipak Kumar; Kundu, Mahantapas

    2010-01-01

    This paper aims at generating a new face based on the human like description using a new concept. The FASY (FAce SYnthesis) System is a Face Database Retrieval and new Face generation System that is under development. One of its main features is the generation of the requested face when it is not found in the existing database, which allows a continuous growing of the database also.

  17. Automatic Age Estimation System for Face Images

    Directory of Open Access Journals (Sweden)

    Chin-Teng Lin

    2012-11-01

    Full Text Available Humans are the most important tracking objects in surveillance systems. However, human tracking is not enough to provide the required information for personalized recognition. In this paper, we present a novel and reliable framework for automatic age estimation based on computer vision. It exploits global face features based on the combination of Gabor wavelets and orthogonal locality preserving projections. In addition, the proposed system can extract face aging features automatically in real‐time. This means that the proposed system has more potential in applications compared to other semi‐automatic systems. The results obtained from this novel approach could provide clearer insight for operators in the field of age estimation to develop real‐world applications.

  18. A Survey of Keystroke Dynamics Biometrics

    OpenAIRE

    Pin Shen Teh; Andrew Beng Jin Teoh; Shigang Yue

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an...

  19. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    OpenAIRE

    Sreedharan Ajish

    2016-01-01

    The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption ...

  20. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  1. Design of Face Recognition System by Using Neural Network with Discrete Cosine Transform and Principal Component Analysis

    Directory of Open Access Journals (Sweden)

    Rohit Jain, Rajshree Taparia

    2012-12-01

    Full Text Available This research paper deals with the implementation of face recognition system using neural network Importance of face recognition system has speed up in the last few decades. A face recognition system is one of the biometric information processing. The developed algorithm for the face recognition system formulates an image-based approach, which uses the Two-Dimensional Discrete Cosine Transform (2D-DCT for image compression and the Self- Organizing Map (SOM Neural Network for recognition purpose, simulated in MATLAB. By using 2D-DCT we extract image vectors and these vectors becomes the input to neural network classifier, which uses self-organizing map, algorithm to recognize familiar faces (trained and faces with variations in expressions, illumination changes, tilt of 5 to 10 degrees. Again face Recognition system is developed with principal component analysis (PCA instead of Two Dimensional Discrete Cosine Transform (2D-DCT and self-Organizing Map (SOM Neural Network for recognition purpose. The crux of proposed algorithm is its beauty to use unsupervised single neural network as classifier.

  2. Secure access control to hidden data by biometric features

    Science.gov (United States)

    Cancellaro, M.; Carli, M.; Egiazarian, K.; Neri, A.

    2007-04-01

    In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of the embedding domain. We propose the use of biometric data, minutiae fingerprint set, for generating the encryption key needed to decompose an image in the Tree structured Haar transform. The uniqueness of the biometrics key together with other, embedded, biometric information guarantee the authentication of the user. Experimental tests show the effectiveness of the proposed system.

  3. Face Synthesis (FASY) System for Determining the Characteristics of a Face Image

    CERN Document Server

    Halder, Santanu; Nasipuri, Mita; Basu, Dipak Kumar; Kundu, Mahantapas

    2010-01-01

    This paper aims at determining the characteristics of a face image by extracting its components. The FASY (FAce SYnthesis) System is a Face Database Retrieval and new Face generation System that is under development. One of its main features is the generation of the requested face when it is not found in the existing database, which allows a continuous growing of the database also. To generate the new face image, we need to store the face components in the database. So we have designed a new technique to extract the face components by a sophisticated method. After extraction of the facial feature points we have analyzed the components to determine their characteristics. After extraction and analysis we have stored the components along with their characteristics into the face database for later use during the face construction.

  4. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    Directory of Open Access Journals (Sweden)

    Alawi A. Al-Saggaf

    2013-04-01

    Full Text Available By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS, in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message. The efficiency of our scheme offers different security assurance, and the trusted third party is not involved in the exchange of commitment.The characteristic of our scheme makes it useful for biometrics systems. If the biometrics template is compromised, then there is no way to use it directly again even in secure biometrics systems. This paper combines biometrics and OFCS to achieve biometric protection scheme using smart cards with renewability of protected biometrics template property.

  5. Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault

    CERN Document Server

    Padmavathi, V S Meenakshi; Dr G

    2010-01-01

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the original biometric templates transformed templates can be stored. Whenever the transformation function is changed new revocable/cancelable templates are generated. Soft biometrics is ancillary information that can be combined with primary biometrics to identify a person in a better way. Iris has certain advantage compared to other biometric traits like fingerprint. Iris is an internal part that is less prone to damage. Moreover is very difficult for an attacker to capture an iris. The key advantage of iris biometrics is its stability or template longevity. Biometric systems are vulnerable to a variety of attacks. This work...

  6. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  7. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  8. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  9. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    Science.gov (United States)

    biometric version of the Electronic System for Travel Authorization (ESTA) travel authorization required by US Customs and Border Protection (CBP) for...This document explores an application which uses biometrics to secure electronic travel authorizations granted to foreign passport holders wishing to...information must be stored by the application. We describe the architecture and key algorithms for a biometric-enabled electronic Travel Authority(b

  10. Information Fusion in Biometrics: A Case Study in Fingerprint

    Institute of Scientific and Technical Information of China (English)

    Wang,Xiaoyan; Fu,Desheng

    2005-01-01

    Biometrics is an emerging topic in the field of signal processing. Multibiometric systems can improve the performance of identification by integrating information presented by single or multiple biometric indicators and a lot of researchers are working on it. As fingerprints is one of the most studied and popular biometrics, researches that have approached the challenges in fingerprints from an information fusion perspective is provided in this paper.

  11. New biometric modalities using internal physical characteristics

    Science.gov (United States)

    Mortenson, Juliana (Brooks)

    2010-04-01

    Biometrics is described as the science of identifying people based on physical characteristics such as their fingerprints, facial features, hand geometry, iris patterns, palm prints, or speech recognition. Notably, all of these physical characteristics are visible or detectable from the exterior of the body. These external characteristics can be lifted, photographed, copied or recorded for unauthorized access to a biometric system. Individual humans are unique internally, however, just as they are unique externally. New biometric modalities have been developed which identify people based on their unique internal characteristics. For example, "BoneprintsTM" use acoustic fields to scan the unique bone density pattern of a thumb pressed on a small acoustic sensor. Thanks to advances in piezoelectric materials the acoustic sensor can be placed in virtually any device such as a steering wheel, door handle, or keyboard. Similarly, "Imp-PrintsTM" measure the electrical impedance patterns of a hand to identify or verify a person's identity. Small impedance sensors can be easily embedded in devices such as smart cards, handles, or wall mounts. These internal biometric modalities rely on physical characteristics which are not visible or photographable, providing an added level of security. In addition, both the acoustic and impedance methods can be combined with physiologic measurements such as acoustic Doppler or impedance plethysmography, respectively. Added verification that the biometric pattern came from a living person can be obtained. These new biometric modalities have the potential to allay user concerns over protection of privacy, while providing a higher level of security.*

  12. Biometric template transformation: a security analysis

    Science.gov (United States)

    Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.

    2010-01-01

    One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.

  13. Biometric data reduction for embedding in small images

    Science.gov (United States)

    Ishaq Qazi, Naseem

    2003-06-01

    Biometric authentication systems require a fast and accurate method of matching biometric data for identification purposes. This paper introduces a data reduction technique based on image processing to better embed biometric data in small images. For the most part, biometric data cannot be directly embedded in small images, because of limited embedding capacities and a large amount of data in biometric images. An image processing technique to extract features from biometric data, like fingerprints and retinal scans, has been developed and tested. This new technique developed to extract features is based on the Hough transform and has been tested on a large volume of real image data. The data reduction technique was applied to these images and the data reduced to size, which could be easily embedded in small pictures, like those on identity cards. Existing embedding algorithms were utilized.

  14. An Intelligent Fingerprint-Biometric Image Scrambling Scheme

    Science.gov (United States)

    Khan, Muhammad Khurram; Zhang, Jiashu

    To obstruct the attacks, and to hamper with the liveness and retransmission issues of biometrics images, we have researched on the challenge/response-based biometrics scrambled image transmission. We proposed an intelligent biometrics sensor, which has computational power to receive challenges from the authentication server and generate response against the challenge with the encrypted biometric image. We utilized the FRT for biometric image encryption and used its scaling factors and random phase mask as the additional secret keys. In addition, we chaotically generated the random phase masks by a chaotic map to further improve the encryption security. Experimental and simulation results have shown that the presented system is secure, robust, and deters the risks of attacks of biometrics image transmission.

  15. Hand-Based Biometric Analysis

    Science.gov (United States)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  16. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    crime prevention, data and information security, terrorist ... acquisition, digital signal processing, feature ... Images are digital ... biometric data comprise a template. ..... International passports. ➙ Airport. ➙ E-banking, ATM. ➙ Insurance. ➙ Voting.

  17. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

    OpenAIRE

    Atul S. CHAUDHARI; Girish K. PATNAIK; Sandip S. PATIL

    2014-01-01

    Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, iris) or behavioral (e.g., gait, signature) characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and its extensive use in forensics. Fingerprint is reliable biometr...

  18. Multimodal biometric fusion using multiple-input correlation filter classifiers

    Science.gov (United States)

    Hennings, Pablo; Savvides, Marios; Vijaya Kumar, B. V. K.

    2005-03-01

    In this work we apply a computationally efficient, closed form design of a jointly optimized filter bank of correlation filter classifiers for biometric verification with the use of multiple biometrics from individuals. Advanced correlation filters have been used successfully for biometric classification, and have shown robustness in verifying faces, palmprints and fingerprints. In this study we address the issues of performing robust biometric verification when multiple biometrics from the same person are available at the moment of authentication; we implement biometric fusion by using a filter bank of correlation filter classifiers which are jointly optimized with each biometric, instead of designing separate independent correlation filter classifiers for each biometric and then fuse the resulting match scores. We present results using fingerprint and palmprint images from a data set of 40 people, showing a considerable advantage in verification performance producing a large margin of separation between the impostor and authentic match scores. The method proposed in this paper is a robust and secure method for authenticating an individual.

  19. Two-Factor Cancelable Biometrics Authenticator

    Institute of Scientific and Technical Information of China (English)

    Ying-Han Pang; Andrew T. B. J; David N. C. L

    2007-01-01

    Biometrics-based authentication system offers advantages of providing high reliability and accuracy.However,the contemporary authentication system is impuissance to compromise.If a biometrics data is compromised, it cannot be replaced and rendered unusable.In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue.The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system.In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm.The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key.If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement.Then, the compromised one is rendered completely useless.This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable.Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

  20. Face liveness detection for face recognition based on cardiac features of skin color image

    Science.gov (United States)

    Suh, Kun Ha; Lee, Eui Chul

    2016-07-01

    With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.

  1. Haar-like Rectangular Features for Biometric Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rashidi, Maryam

    2013-01-01

    , which mostly have been used for detection, for biometric recognition. The proposed system has been tested for three different biometrics: ear, iris, and hand vein patterns and it is shown that it is robust against most of the mentioned degradations and it outperforms state-of-the-art systems...

  2. Biometric Quantization through Detection Rate Optimized Bit Allocation

    NARCIS (Netherlands)

    Chen, C.; Veldhuis, R.N.J.; Kevenaar, T.A.M.; Akkermans, A.H.M.

    2009-01-01

    Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for

  3. A Massively Parallel Face Recognition System

    Directory of Open Access Journals (Sweden)

    Lahdenoja Olli

    2007-01-01

    Full Text Available We present methods for processing the LBPs (local binary patterns with a massively parallel hardware, especially with CNN-UM (cellular nonlinear network-universal machine. In particular, we present a framework for implementing a massively parallel face recognition system, including a dedicated highly accurate algorithm suitable for various types of platforms (e.g., CNN-UM and digital FPGA. We study in detail a dedicated mixed-mode implementation of the algorithm and estimate its implementation cost in the view of its performance and accuracy restrictions.

  4. A Massively Parallel Face Recognition System

    Directory of Open Access Journals (Sweden)

    Ari Paasio

    2006-12-01

    Full Text Available We present methods for processing the LBPs (local binary patterns with a massively parallel hardware, especially with CNN-UM (cellular nonlinear network-universal machine. In particular, we present a framework for implementing a massively parallel face recognition system, including a dedicated highly accurate algorithm suitable for various types of platforms (e.g., CNN-UM and digital FPGA. We study in detail a dedicated mixed-mode implementation of the algorithm and estimate its implementation cost in the view of its performance and accuracy restrictions.

  5. Performance Evaluation of Biometric Template Update

    CERN Document Server

    Giot, Romain; Dorizzi, Bernadette

    2012-01-01

    Template update allows to modify the biometric reference of a user while he uses the biometric system. With such kind of mechanism we expect the biometric system uses always an up to date representation of the user, by capturing his intra-class (temporary or permanent) variability. Although several studies exist in the literature, there is no commonly adopted evaluation scheme. This does not ease the comparison of the different systems of the literature. In this paper, we show that using different evaluation procedures can lead in different, and contradictory, interpretations of the results. We use a keystroke dynamics (which is a modality suffering of template ageing quickly) template update system on a dataset consisting of height different sessions to illustrate this point. Even if we do not answer to this problematic, it shows that it is necessary to normalize the template update evaluation procedures.

  6. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  7. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  8. Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Molina, G.; Kevenaar, T.A.M.; Veldhuis, R.N.J.; Jonker, W.

    2008-01-01

    In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic pri

  9. Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Molina, G.; Kevenaar, T.A.M.; Veldhuis, Raymond N.J.; Jonker, Willem

    2008-01-01

    In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic

  10. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, Emile J.C.; Garcia Molina, Gary; Breebaart, Jeroen; Veldhuis, Raymond N.J.; Kevenaar, Tom A.M.; Jonker, Willem

    2010-01-01

    In recent years, the protection of biometric data has gained increased interest from the scientific community. Methods such as the fuzzy commitment scheme, helper-data system, fuzzy extractors, fuzzy vault, and cancelable biometrics have been proposed for protecting biometric data. Most of these met

  11. First experiences in the implementation of biometric technology to link data from Health and Demographic Surveillance Systems with health facility data

    Directory of Open Access Journals (Sweden)

    Adwoa Serwaa-Bonsu

    2010-02-01

    Full Text Available Background: In developing countries, Health and Demographic Surveillance Systems (HDSSs provide a framework for tracking demographic and health dynamics over time in a defined geographical area. Many HDSSs co-exist with facility-based data sources in the form of Health Management Information Systems (HMIS. Integrating both data sources through reliable record linkage could provide both numerator and denominator populations to estimate disease prevalence and incidence rates in the population and enable determination of accurate health service coverage. Objective: To measure the acceptability and performance of fingerprint biometrics to identify individuals in demographic surveillance populations and those attending health care facilities serving the surveillance populations. Methodology: Two HDSS sites used fingerprint biometrics for patient and/or surveillance population participant identification. The proportion of individuals for whom a fingerprint could be successfully enrolled were characterised in terms of age and sex. Results: Adult (18–65 years fingerprint enrolment rates varied between 94.1% (95% CI 93.6–94.5 for facility-based fingerprint data collection at the Africa Centre site to 96.7% (95% CI 95.9–97.6 for population-based fingerprint data collection at the Agincourt site. Fingerprint enrolment rates in children under 1 year old (Africa Centre site were only 55.1% (95% CI 52.7–57.4. By age 5, child fingerprint enrolment rates were comparable to those of adults. Conclusion: This work demonstrates the feasibility of fingerprint-based individual identification for population-based research in developing countries. Record linkage between demographic surveillance population databases and health care facility data based on biometric identification systems would allow for a more comprehensive evaluation of population health, including the ability to study health service utilisation from a population perspective, rather than the

  12. Keystroke Biometric For User Authentication - A Review

    Directory of Open Access Journals (Sweden)

    Pallavi Yevale

    2013-11-01

    Full Text Available Conventionally, users are authenticated under the normal user name and password procedure. The latest trend in authentication is using Biometric as a feature for identifying users. By using biometrics as the integral part of authentication, the chances of imposters entering in a secured system becomes very low. Keystroke Biometric uses the behavioral typing pattern as a biometric for identifying a user. In this paper, a survey is carried out on three different approaches that implements keystroke biometric system. 1 Clustering Di-Graph (CDG: This method uses clustering digraphs based on temporal features. This method joins consecutive keystrokes for representing keystroke pattern. 2 Hamming Distance-like Filtering (HDF: In this method, the dissimilarity has their EER(Equal Error Rate depending upon filtering of predefined value of gathered data. It is based on resemblance to Hamming Distance. 3 Free Text and Euclidean Distance based Approach (FTED: In this method, keys are classified into two halves (left - right and four lines (total eight groups and then timing vectors (of flight time are obtained between these key groups. For distinguishing the legitimate user from imposters, Timing Vectors are used.

  13. EFFICIENCY OPTIMIZATION OF ATTENDANCE SYSTEM WITH GPS AND BIOMETRIC METHOD USING MOBILE DEVICES

    Directory of Open Access Journals (Sweden)

    Benfano Soewito

    2014-05-01

    Full Text Available The existing attendance system still has drawbacks, namely the queue in front of the finger scanner, the attendance data are not integrated with Human Resources Systems, and also the employees who work outside the office cannot get in the attendance system to roll presence. In the other hand, everyone has the mobile devices and all the mobile devices will be embedded a finger scanner in the future. In this paper, it is proposed the absence system using one own device. The finger scanner and coordinate Global Position System (GPS are used as inputs for the attendance system that integrated with payroll system and human resource management tools. Application base on android platform is developed because the android is the most platforms that have been using in the most mobile devices. Using our proposed methodology, the employee can roll presence using their mobile devices and the do not need to be in queue and the employees who work outside the office also can roll presence. Research showed that proposed methodology can be used for the next generation attendance system.

  14. Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-02-01

    Full Text Available Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

  15. Securing Revocable Iris and Retinal Templates using Combined User and Soft Biometric based Password Hardened Multimodal Fuzzy Vault

    Directory of Open Access Journals (Sweden)

    V. S. Meenakshi

    2010-09-01

    Full Text Available Biometric systems are subjected to a variety of attacks. Stored biometric template attack is very severe compared to all other attacks. Providing security to biometric templates is an important issue in building a reliable personal identification system. Multi biometric systems are more resistive towards spoof attacks compared to unibiometric counterpart. Soft biometric are ancillary information about a person. This work provides security and revocability to iris and retinal templates using combined user and soft biometric based password hardened multimodal biometric fuzzy vault. Password hardening provides security and revocability to biometric templates. Eye biometrics namely iris and retina have certain merits compared to fingerprint. Iris and retina capturing cameras can be mounted on a single device to improve user convenience. Security of the vault is measured in terms of min-entropy.

  16. Anatomy of Biometric Passports

    Directory of Open Access Journals (Sweden)

    Dominik Malčík

    2012-01-01

    Full Text Available Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification technology and biometrics, especially (but not only in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation; moreover, specific security mechanisms are optional and can be omitted.

  17. Compact Wireless BioMetric Monitoring and Real Time Processing System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — BioWATCH is a modular ambulatory compact wireless biomedical data acquisition system. More specifically, it is a data acquisition unit for acquiring signals from...

  18. Enhancing Privacy for Biometric Identification Cards

    CERN Document Server

    Balanoiu, Paul

    2010-01-01

    Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system.

  19. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  20. Design of a MEMS-based retina scanning system for biometric authentication

    Science.gov (United States)

    Woittennek, Franziska; Knobbe, Jens; Pügner, Tino; Schelinski, Uwe; Grüger, Heinrich

    2014-05-01

    There is an increasing need for reliable authentication for a number of applications such as e commerce. Common authentication methods based on ownership (ID card) or knowledge factors (password, PIN) are often prone to manipulations and may therefore be not safe enough. Various inherence factor based methods like fingerprint, retinal pattern or voice identifications are considered more secure. Retina scanning in particular offers both low false rejection rate (FRR) and low false acceptance rate (FAR) with about one in a million. Images of the retina with its characteristic pattern of blood vessels can be made with either a fundus camera or laser scanning methods. The present work describes the optical design of a new compact retina laser scanner which is based on MEMS (Micro Electric Mechanical System) technology. The use of a dual axis micro scanning mirror for laser beam deflection enables a more compact and robust design compared to classical systems. The scanner exhibits a full field of view of 10° which corresponds to an area of 4 mm2 on the retinal surface surrounding the optical disc. The system works in the near infrared and is designed for use under ambient light conditions, which implies a pupil diameter of 1.5 mm. Furthermore it features a long eye relief of 30 mm so that it can be conveniently used by persons wearing glasses. The optical design requirements and the optical performance are discussed in terms of spot diagrams and ray fan plots.

  1. A Real-Time Face Recognition System Using Eigenfaces

    Directory of Open Access Journals (Sweden)

    Daniel Georgescu

    2011-12-01

    Full Text Available A real-time system for recognizing faces in a video stream provided by a surveillance camera was implemented, having real-time face detection. Thus, both face detection and face recognition techniques are summary presented, without skipping the important technical aspects. The proposed approach essentially was to implement and verify the algorithm Eigenfaces for Recognition, which solves the recognition problem for two dimensional representations of faces, using the principal component analysis. The snapshots, representing input images for the proposed system, are projected in to a face space (feature space which best defines the variation for the face images training set. The face space is defined by the ‘eigenfaces’ which are the eigenvectors of the set of faces. These eigenfaces contribute in face reconstruction of a new face image projected onto face space with a meaningful (named weight.The projection of the new image in this feature space is then compared to the available projections of training set to identify the person using the Euclidian distance.  The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions.

  2. Multithread Face Recognition in Cloud

    Directory of Open Access Journals (Sweden)

    Dakshina Ranjan Kisku

    2016-01-01

    Full Text Available Faces are highly challenging and dynamic objects that are employed as biometrics evidence in identity verification. Recently, biometrics systems have proven to be an essential security tools, in which bulk matching of enrolled people and watch lists is performed every day. To facilitate this process, organizations with large computing facilities need to maintain these facilities. To minimize the burden of maintaining these costly facilities for enrollment and recognition, multinational companies can transfer this responsibility to third-party vendors who can maintain cloud computing infrastructures for recognition. In this paper, we showcase cloud computing-enabled face recognition, which utilizes PCA-characterized face instances and reduces the number of invariant SIFT points that are extracted from each face. To achieve high interclass and low intraclass variances, a set of six PCA-characterized face instances is computed on columns of each face image by varying the number of principal components. Extracted SIFT keypoints are fused using sum and max fusion rules. A novel cohort selection technique is applied to increase the total performance. The proposed protomodel is tested on BioID and FEI face databases, and the efficacy of the system is proven based on the obtained results. We also compare the proposed method with other well-known methods.

  3. Animal biometrics: quantifying and detecting phenotypic appearance.

    Science.gov (United States)

    Kühl, Hjalmar S; Burghardt, Tilo

    2013-07-01

    Animal biometrics is an emerging field that develops quantified approaches for representing and detecting the phenotypic appearance of species, individuals, behaviors, and morphological traits. It operates at the intersection between pattern recognition, ecology, and information sciences, producing computerized systems for phenotypic measurement and interpretation. Animal biometrics can benefit a wide range of disciplines, including biogeography, population ecology, and behavioral research. Currently, real-world applications are gaining momentum, augmenting the quantity and quality of ecological data collection and processing. However, to advance animal biometrics will require integration of methodologies among the scientific disciplines involved. Such efforts will be worthwhile because the great potential of this approach rests with the formal abstraction of phenomics, to create tractable interfaces between different organizational levels of life.

  4. A Survey of Keystroke Dynamics Biometrics

    Directory of Open Access Journals (Sweden)

    Pin Shen Teh

    2013-01-01

    Full Text Available Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.

  5. A survey of keystroke dynamics biometrics.

    Science.gov (United States)

    Teh, Pin Shen; Teoh, Andrew Beng Jin; Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.

  6. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  7. Automated Human Identification Scheme using Ear Biometrics Technology

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2014-02-01

    Full Text Available Biometrics identification methods have proved to be very efficient, more natural and easy for users than traditional methods of human identification. Biometrics methods truly identify humans, not keys and cards they posses or passwords they should remember. Ear on the other hand, has a more uniform distribution of color, so almost all information is conserved when converting the original image into gray scales. We propose the ear as a biometric and investigate it with both 2D and 3D data. The ICP-based algorithm also demonstrates good scalability with size of dataset. These results are encouraging in that they suggest a strong potential for 3D ear shape as a biometric. Multi-biometric 2D and 3D ear recognition are also explored. The proposed automatic ear detection method will integrate with the current system, and the performance will be evaluated with the original one. The investigation of ear recognition under less controlled conditions will focus on the robustness and variability of ear biometrics. Multi-modal biometrics using 3D ear images will be explored, and the performance will be compared to existing biometrics experimental results.

  8. Societal and ethical implications of anti-spoofing technologies in biometrics.

    Science.gov (United States)

    Rebera, Andrew P; Bonfanti, Matteo E; Venier, Silvia

    2014-03-01

    Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a 'spoofing attack' an artificial replica of an individual's biometric trait is used to induce a system to falsely infer that individual's presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against such threats. Unlike biometrics in general, the societal and ethical issues raised by spoofing and anti-spoofing techniques have not received much attention. This paper examines these issues.

  9. Biometrics Analysis and Evaluation on Korean Makgeolli Using Brainwaves and Taste Biological Sensor System.

    Science.gov (United States)

    Kim, Yong-Sung; Kim, Yong-Suk

    2015-01-01

    There are several methods available in measuring food taste. The sensory evaluation, for instance, is a typical method for panels to test of taste and recognize smell with their nose by measuring the degree of taste characteristic, intensity, and pleasure. There are many issues entailed in the traditional sensory evaluation method such as forming a panel and evaluation cost; moreover, it is only localized in particular areas. Accordingly, this paper aimed to select food in one particular area, and compare and review the content between sensory evaluations using a taste biological sensor, as well as presenting an analysis of brainwaves using EEG and finally a proposal of a new method for sensory evaluation. In this paper, the researchers have conducted a sensory evaluation whereas a maximum of nine points were accumulated by purchasing eight types of rice wine. These eight types of Makgeolli were generalized by generating multidimensional data with the use of TS-5000z, thus learning mapping points and scaling them. The contribution of this paper, therefore, is to overcome the disadvantages of the sensory evaluation with the usage of the suggested taste biological sensor system.

  10. Biometrics Analysis and Evaluation on Korean Makgeolli Using Brainwaves and Taste Biological Sensor System

    Directory of Open Access Journals (Sweden)

    Yong-Sung Kim

    2015-01-01

    Full Text Available There are several methods available in measuring food taste. The sensory evaluation, for instance, is a typical method for panels to test of taste and recognize smell with their nose by measuring the degree of taste characteristic, intensity, and pleasure. There are many issues entailed in the traditional sensory evaluation method such as forming a panel and evaluation cost; moreover, it is only localized in particular areas. Accordingly, this paper aimed to select food in one particular area, and compare and review the content between sensory evaluations using a taste biological sensor, as well as presenting an analysis of brainwaves using EEG and finally a proposal of a new method for sensory evaluation. In this paper, the researchers have conducted a sensory evaluation whereas a maximum of nine points were accumulated by purchasing eight types of rice wine. These eight types of Makgeolli were generalized by generating multidimensional data with the use of TS-5000z, thus learning mapping points and scaling them. The contribution of this paper, therefore, is to overcome the disadvantages of the sensory evaluation with the usage of the suggested taste biological sensor system.

  11. 2009 Biometrics Conference

    Science.gov (United States)

    2009-01-28

    Associate General Counsel, Graduate Management Admission Council Ms. Stokes provided an overview of GMAT , which facilitates the movement of talent around...the world. Biometrics provides a technological capability to prevent fraud during the administration of GMAT . Legal challenges with fingerprints...of law, and democracy. The Graduate Management Admission Council (GMAC) is the industry leader in privacy compliance worldwide. GMAT implements

  12. Iris Image Quality Assessment for Biometric Application

    Directory of Open Access Journals (Sweden)

    U. M. Chaskar

    2012-05-01

    Full Text Available Image quality assessment plays an important role in the performance of biometric system involving iris images. Data quality assessment is a key issue in order to broaden the applicability of iris biometrics to unconstrained imaging conditions. In this paper, we have proposed the quality factors of individual iris images by assessing their prominent factors by their scores. The work has been carried out for the following databases: CASIA, UBIRIS, UPOL, MMU and our own created COEP Database using HIS 5000 HUVITZ Iris Camera. The comparison is also done with existing databases which in turn will act as a benchmark in increasing the efficiency of further processing.

  13. Feature Level Clustering of Large Biometric Database

    CERN Document Server

    Mehrotra, Hunny; Radhika, V Bhawani; Majhi, Banshidhar; Gupta, Phalguni

    2010-01-01

    This paper proposes an efficient technique for partitioning large biometric database during identification. In this technique feature vector which comprises of global and local descriptors extracted from offline signature are used by fuzzy clustering technique to partition the database. As biometric features posses no natural order of sorting, thus it is difficult to index them alphabetically or numerically. Hence, some supervised criteria is required to partition the search space. At the time of identification the fuzziness criterion is introduced to find the nearest clusters for declaring the identity of query sample. The system is tested using bin-miss rate and performs better in comparison to traditional k-means approach.

  14. Random-Profiles-Based 3D Face Recognition System

    Directory of Open Access Journals (Sweden)

    Joongrock Kim

    2014-03-01

    Full Text Available In this paper, a noble nonintrusive three-dimensional (3D face modeling system for random-profile-based 3D face recognition is presented. Although recent two-dimensional (2D face recognition systems can achieve a reliable recognition rate under certain conditions, their performance is limited by internal and external changes, such as illumination and pose variation. To address these issues, 3D face recognition, which uses 3D face data, has recently received much attention. However, the performance of 3D face recognition highly depends on the precision of acquired 3D face data, while also requiring more computational power and storage capacity than 2D face recognition systems. In this paper, we present a developed nonintrusive 3D face modeling system composed of a stereo vision system and an invisible near-infrared line laser, which can be directly applied to profile-based 3D face recognition. We further propose a novel random-profile-based 3D face recognition method that is memory-efficient and pose-invariant. The experimental results demonstrate that the reconstructed 3D face data consists of more than 50 k 3D point clouds and a reliable recognition rate against pose variation.

  15. Multimodal Biometrics Based on Fingerprint and Finger Vein

    Directory of Open Access Journals (Sweden)

    Anand Viswanathan

    2014-07-01

    Full Text Available Biometric systems identify a person through physical traits or verify his/her identity through automatic processes. Various systems were used over years including systems like fingerprint, iris, facial images, hand geometry and speaker recognition. For biometric systems successful implementation, it has to address issues like efficiency, accuracy, applicability, robustness and universality. Single modality based recognition verifications are not robust while combining information from different biometric modalities ensures better performance. Multimodal biometric systems use multiple biometrics and integrate information for identification. It compensates unimodal biometric systems limitations. This study considers multimodal biometrics based on fingerprint and finger veins. Gabor features are extracted from finger vein using Gabor filter with orientation of 0, 15, 45, 60 and 75°, respectively. For fingerprint images, energy coefficients are attained using wavelet packet tree. Both features are normalized using min max normalization and fused with concatenation. Feature selection is through PCA and kernel PCA. Classification is achieved through KNN, Naïve Bayes and RBF Neural Network Classifiers.

  16. 6th Annual Earth System Grid Federation Face to Face Conference Report

    Energy Technology Data Exchange (ETDEWEB)

    Williams, D. N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-03-06

    The Sixth Annual Face-to-Face (F2F) Conference of the Earth System Grid Federation (ESGF), a global consortium of international government agencies, institutions, and companies dedicated to the creation, management, analysis, and distribution of extreme-scale scientific data, was held December 5–9, 2016, in Washington, D.C.

  17. A Systems View of Mother-Infant Face-to-Face Communication

    Science.gov (United States)

    Beebe, Beatrice; Messinger, Daniel; Bahrick, Lorraine E.; Margolis, Amy; Buck, Karen A.; Chen, Henian

    2016-01-01

    Principles of a dynamic, dyadic systems view of mother-infant face-to-face communication, which considers self- and interactive processes in relation to one another, were tested. The process of interaction across time in a large low-risk community sample at infant age 4 months was examined. Split-screen videotape was coded on a 1-s time base for…

  18. Research on Face Recognition Based on Embedded System

    Directory of Open Access Journals (Sweden)

    Hong Zhao

    2013-01-01

    Full Text Available Because a number of image feature data to store, complex calculation to execute during the face recognition, therefore the face recognition process was realized only by PCs with high performance. In this paper, the OpenCV facial Haar-like features were used to identify face region; the Principal Component Analysis (PCA was employed in quick extraction of face features and the Euclidean Distance was also adopted in face recognition; as thus, data amount and computational complexity would be reduced effectively in face recognition, and the face recognition could be carried out on embedded platform. Finally, based on Tiny6410 embedded platform, a set of embedded face recognition systems was constructed. The test results showed that the system has stable operation and high recognition rate can be used in portable and mobile identification and authentication.

  19. Enhanced 3D face processing using an active vision system

    DEFF Research Database (Denmark)

    Lidegaard, Morten; Larsen, Rasmus; Kraft, Dirk

    2014-01-01

    We present an active face processing system based on 3D shape information extracted by means of stereo information. We use two sets of stereo cameras with different field of views (FOV): One with a wide FOV is used for face tracking, while the other with a narrow FOV is used for face identificati...

  20. Optimized Method for Real-Time Face Recognition System Based on PCA and Multiclass Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Reza Azad

    2013-11-01

    Full Text Available Automatic face recognition system is one of the core technologies in computer vision, machine learning, and biometrics. The present study presents a novel and improved way for face recognition. In the suggested approach, first, the place of face is extracted from the original image and then is sent to feature extraction stage, which is based on Principal Component Analysis (PCA technique. In the previous procedures which were established on PCA technique, the whole picture was taken as a vector feature, then among these features, key features were extracted with use of PCA algorithm, revealing finally some poor efficiency. Thus, in the recommended approach underlying the current investigation, first the areas of face features are extracted; then, the areas are combined and are regarded as vector features. Ultimately, its key features are extracted with use of PCA algorithm. Taken together, after extracting the features, for face recognition and classification, Multiclass Support Vector Machine (SVMs classifiers, which are typical of high efficiency, have been employed. In the result part, the proposed approach is applied on FEI database and the accuracy rate achieved 98.45%.

  1. Regional registration for expression resistant 3-D face recognition

    NARCIS (Netherlands)

    Alyuz, Nese; Gökberk, B.; Akarun, Lale

    Biometric identification from three-dimensional (3-D) facial surface characteristics has become popular, especially in high security applications. In this paper, we propose a fully automatic expression insensitive 3-D face recognition system. Surface deformations due to facial expressions are a

  2. Fusing Facial Features for Face Recognition

    Directory of Open Access Journals (Sweden)

    Jamal Ahmad Dargham

    2012-06-01

    Full Text Available Face recognition is an important biometric method because of its potential applications in many fields, such as access control, surveillance, and human-computer interaction. In this paper, a face recognition system that fuses the outputs of three face recognition systems based on Gabor jets is presented. The first system uses the magnitude, the second uses the phase, and the third uses the phase-weighted magnitude of the jets. The jets are generated from facial landmarks selected using three selection methods. It was found out that fusing the facial features gives better recognition rate than either facial feature used individually regardless of the landmark selection method.

  3. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  4. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  5. Analysis of eigenvalue correction applied to biometrics

    NARCIS (Netherlands)

    Hendrikse, A.J.; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan; Bazen, A.M.

    Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic

  6. Enhanced 3D face processing using an active vision system

    DEFF Research Database (Denmark)

    Lidegaard, Morten; Larsen, Rasmus; Kraft, Dirk;

    2014-01-01

    of the narrow FOV camera. We substantiate these two observations by qualitative results on face reconstruction and quantitative results on face recognition. As a consequence, such a set-up allows to achieve better and much more flexible system for 3D face reconstruction e.g. for recognition or emotion......We present an active face processing system based on 3D shape information extracted by means of stereo information. We use two sets of stereo cameras with different field of views (FOV): One with a wide FOV is used for face tracking, while the other with a narrow FOV is used for face identification....... We argue for two advantages of such a system: First, an extended work range, and second, the possibility to place the narrow FOV camera in a way such that a much better reconstruction quality can be achieved compared to a static camera even if the face had been fully visible in the periphery...

  7. AN APPROACH TO REDUCE THE STORAGE REQUIREMENT FOR BIOMETRIC DATA IN AADHAR PROJECT

    Directory of Open Access Journals (Sweden)

    T. Sivakumar

    2013-02-01

    Full Text Available AADHAR is an Indian Government Project to provide unique identification to each Citizen of India. The objective of the project is to collect all the personal details and the biometric traits from each individual. Biometric traits such as iris, face and fingerprint are being collected for authentication. All the information will be stored in a centralized data repository. Considering about the storage requirement for the biometric data of the entire population of India, approximately 20,218 TB of storage space will be required. Since 10 fingerprint data are stored, fingerprint details will take most of the space. In this paper, the storage requirement for the biometric data in the AADHAR project is analyzed and a method is proposed to reduce the storage by cropping the original biometric image before storing. This method can reduce the storage space of the biometric data drastically. All the measurements given in this paper are approximate only.

  8. A Real-Time Angle- and Illumination-Aware Face Recognition System Based on Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Hisateru Kato

    2012-01-01

    Full Text Available Automatic authentication systems, using biometric technology, are becoming increasingly important with the increased need for person verification in our daily life. A few years back, fingerprint verification was done only in criminal investigations. Now fingerprints and face images are widely used in bank tellers, airports, and building entrances. Face images are easy to obtain, but successful recognition depends on proper orientation and illumination of the image, compared to the one taken at registration time. Facial features heavily change with illumination and orientation angle, leading to increased false rejection as well as false acceptance. Registering face images for all possible angles and illumination is impossible. In this work, we proposed a memory efficient way to register (store multiple angle and changing illumination face image data, and a computationally efficient authentication technique, using multilayer perceptron (MLP. Though MLP is trained using a few registered images with different orientation, due to generalization property of MLP, interpolation of features for intermediate orientation angles was possible. The algorithm is further extended to include illumination robust authentication system. Results of extensive experiments verify the effectiveness of the proposed algorithm.

  9. Multimodal Biometric Person Authentication using Speech, Signature and Handwriting Features

    Directory of Open Access Journals (Sweden)

    Eshwarappa M.N.

    2011-09-01

    Full Text Available The objective of this work is to develop a multimodal biometric system using speech, signature and handwriting information. Unimodal biometric person authentication systems are initially developed for each of these biometric features. Methods are then explored for integrating them to obtain multimodal system. Apart from implementing state-of-the art systems, the major part of the work is on the new explorations at each level with the objective of improving performance and robustness. The latest research indicates multimodal person authentication system is more effective and more challenging. This work demonstrates that the fusion of multiple biometrics helps to minimize the system error rates. As a result, the identification performance is 100% and verification performances, False Acceptance Rate (FAR is 0%, and False Rejection Rate (FRR is 0%.

  10. BIOMETRICS IN ZOOTECHNICS

    Directory of Open Access Journals (Sweden)

    Gordana Kralik

    2012-12-01

    Full Text Available University textbook Biometrics in zootechnics, by authors Prof.Dr.Sc.Dr.hc. Gordana Kralik, Prof.Dr. Zoran Škrtić and Assist.Prof.Dr. Zlata Kralik from the Faculty of Agriculture in Osijek, contains the following chapters: 1. Introduction overview, 2. Sample analysis, 3. Parameter estimation, 4. Hypothesis testing, 5. Variance analysis of experimental plans, 6. Regression and correlation, 7. Calculation of statistical parameters in Microsoft Office Excel 2007, 8. Scientific and professional work, Literature, Symbols and formulas, Material (tables and Index – glossary. The textbook is written for undergraduate, graduate and postgraduate students of the Faculty of Agriculture, J.J. Strossmayer University of Osijek. As longtime university teachers, authors noticed the need for publishing textbook Biometrics in zootechnics due to the lack of literature. The textbook can also be used by students from other agricultural universities and agronomists who want to acquire basic knowledge about the use of biometric methods in the zootechnics. The aim of the authors is to clarify the core issues of research work and biometric data processing to interested readers in a simple and acceptable way. Students and professionals who wish to be engaged in research work should be familiar with the planning and conduction of experiments, data collection and analysis, data processing, as well as interpretation of results. From cooperation and contacts with the students, authors have realized the fact that many of them are not prone to mathematics. The textbook is written without mathematical “derivation” and theoretical interpretations and is easily accessible to students and experts to whom it is intended.

  11. Biometrics Go Mainstream

    Science.gov (United States)

    Gale, Doug

    2006-01-01

    Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…

  12. Age factors in biometric processing

    CERN Document Server

    Fairhurst, Michael

    2013-01-01

    As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction. In Age Factors in Biometric Processing an in

  13. Facial biometrics based on 2D vector geometry

    Science.gov (United States)

    Malek, Obaidul; Venetsanopoulos, Anastasios; Androutsos, Dimitrios

    2014-05-01

    The main challenge of facial biometrics is its robustness and ability to adapt to changes in position orientation, facial expression, and illumination effects. This research addresses the predominant deficiencies in this regard and systematically investigates a facial authentication system in the Euclidean domain. In the proposed method, Euclidean geometry in 2D vector space is being constructed for features extraction and the authentication method. In particular, each assigned point of the candidates' biometric features is considered to be a 2D geometrical coordinate in the Euclidean vector space. Algebraic shapes of the extracted candidate features are also computed and compared. The proposed authentication method is being tested on images from the public "Put Face Database". The performance of the proposed method is evaluated based on Correct Recognition (CRR), False Acceptance (FAR), and False Rejection (FRR) rates. The theoretical foundation of the proposed method along with the experimental results are also presented in this paper. The experimental results demonstrate the effectiveness of the proposed method.

  14. Effect of calibration data on forensic likelihood ratio from a face recognition system

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Meuwly, Didier; Meuwly, Didier

    2013-01-01

    A biometric system used for forensic evaluation requires a conversion of the score to a likelihood ratio. A likelihood ratio can be computed as the ratio of the probability of a score given the prosecution hypothesis is true and the probability of a score given the defense hypothesis is true. In

  15. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  16. Optimized Radial Basis Function Classifier for Multi Modal Biometrics

    Directory of Open Access Journals (Sweden)

    Anand Viswanathan

    2014-07-01

    Full Text Available Biometric systems can be used for the identification or verification of humans based on their physiological or behavioral features. In these systems the biometric characteristics such as fingerprints, palm-print, iris or speech can be recorded and are compared with the samples for the identification or verification. Multimodal biometrics is more accurate and solves spoof attacks than the single modal bio metrics systems. In this study, a multimodal biometric system using fingerprint images and finger-vein patterns is proposed and also an optimized Radial Basis Function (RBF kernel classifier is proposed to identify the authorized users. The extracted features from these modalities are selected by PCA and kernel PCA and combined to classify by RBF classifier. The parameters of RBF classifier is optimized by using BAT algorithm with local search. The performance of the proposed classifier is compared with the KNN classifier, Naïve Bayesian classifier and non-optimized RBF classifier.

  17. Multi-biometric Liveness Detection – A New Perspective

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... 3Department of ICT, Abdul Salem International Centre for Theoretical Physics, Trieste Italy onime@ictp.it ... Basic Multi-biometric Authentication System was thought to have .... Step 4: The classification or recognition of the.

  18. A study of dorsal vein pattern for biometric security

    African Journals Online (AJOL)

    Nafiisah

    A biometric system can function in any of these two modes; verification mode or ..... Then the Gaussian blur filter is applied to filter noise. ... edge weighted diffusion was applied to smoothen the image while preserving the vein edges. [3].

  19. Performance and Security Evaluation of Biometric-Based Web ...

    African Journals Online (AJOL)

    West African Journal of Industrial and Academic Research ... This paper evaluates the performance and security of biometric based web application, ... Monitoring System was developed using java technology and MYSQL as the backend.

  20. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

    CERN Document Server

    Kanade, Sanjay

    2012-01-01

    This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, i

  1. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  2. Zeroing Biometrics: Collecting Biometrics Before the Shooting Starts

    Science.gov (United States)

    2012-04-01

    21 mantra , “something you have, something you know and something you are.”11 This is specifically concerned with matching the biometrics of one...D.C., April 25, 2007). 49 Biometric Policy on Collection and Sharing The memorandum on collection and sharing is a brand new document issued by

  3. Improving Speaker Recognition by Biometric Voice Deconstruction

    Directory of Open Access Journals (Sweden)

    Luis Miguel eMazaira-Fernández

    2015-09-01

    Full Text Available Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g. YouTube to broadcast its message. In this new scenario, classical identification methods (such fingerprints or face recognition have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. Through the present paper, a new methodology to characterize speakers will be shown. This methodology is benefiting from the advances achieved during the last years in understanding and modelling voice production. The paper hypothesizes that a gender dependent characterization of speakers combined with the use of a new set of biometric parameters extracted from the components resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract gender-dependent extended biometric parameters are given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  4. The Impact of User Privacy Concerns and Ethnic Cultural Values on Attitudes toward the Use of Biometric Technology

    Science.gov (United States)

    Carpenter, Darrell R.

    2011-01-01

    Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology have not been well received by employees. One reason for resistance may be perceived privacy issues associated with biometrics. This research draws on previous organizational information…

  5. Design of embedded intelligent monitoring system based on face recognition

    Science.gov (United States)

    Liang, Weidong; Ding, Yan; Zhao, Liangjin; Li, Jia; Hu, Xuemei

    2017-01-01

    In this paper, a new embedded intelligent monitoring system based on face recognition is proposed. The system uses Pi Raspberry as the central processor. A sensors group has been designed with Zigbee module in order to assist the system to work better and the two alarm modes have been proposed using the Internet and 3G modem. The experimental results show that the system can work under various light intensities to recognize human face and send alarm information in real time.

  6. Biometrics — Developments and Potential

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond

    2014-01-01

    This article describes the use of biometric technology in forensic science, for the development of new methods and tools, improving the current forensic biometric applications, and allowing for the creation of new ones. The article begins with a definition and a summary of the development of this fi

  7. Biometric Communication Research for Television.

    Science.gov (United States)

    Malik, M. F.

    Biometric communication research is defined as research dealing with the information impact of a film or television show, photographic picture, painting, exhibition, display, or any literary or functional texts or verbal stimuli on human beings, both as individuals and in groups (mass audiences). Biometric communication research consists of a…

  8. Biometrics — Developments and Potential

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond N.J.

    2014-01-01

    This article describes the use of biometric technology in forensic science, for the development of new methods and tools, improving the current forensic biometric applications, and allowing for the creation of new ones. The article begins with a definition and a summary of the development of this

  9. A Driver Face Monitoring System for Fatigue and Distraction Detection

    Directory of Open Access Journals (Sweden)

    Mohamad-Hoseyn Sigari

    2013-01-01

    Full Text Available Driver face monitoring system is a real-time system that can detect driver fatigue and distraction using machine vision approaches. In this paper, a new approach is introduced for driver hypovigilance (fatigue and distraction detection based on the symptoms related to face and eye regions. In this method, face template matching and horizontal projection of top-half segment of face image are used to extract hypovigilance symptoms from face and eye, respectively. Head rotation is a symptom to detect distraction that is extracted from face region. The extracted symptoms from eye region are (1 percentage of eye closure, (2 eyelid distance changes with respect to the normal eyelid distance, and (3 eye closure rate. The first and second symptoms related to eye region are used for fatigue detection; the last one is used for distraction detection. In the proposed system, a fuzzy expert system combines the symptoms to estimate level of driver hypo-vigilance. There are three main contributions in the introduced method: (1 simple and efficient head rotation detection based on face template matching, (2 adaptive symptom extraction from eye region without explicit eye detection, and (3 normalizing and personalizing the extracted symptoms using a short training phase. These three contributions lead to develop an adaptive driver eye/face monitoring. Experiments show that the proposed system is relatively efficient for estimating the driver fatigue and distraction.

  10. The biometric recognition on contactless multi-spectrum finger images

    Science.gov (United States)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  11. Biometric identification using holographic radar imaging techniques

    Science.gov (United States)

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.; Kennedy, Mike O.; Foote, Harlen P.

    2007-04-01

    Pacific Northwest National Laboratory researchers have been at the forefront of developing innovative screening systems to enhance security and a novel imaging system to provide custom-fit clothing using holographic radar imaging techniques. First-of-a-kind cylindrical holographic imaging systems have been developed to screen people at security checkpoints for the detection of concealed, body worn, non-metallic threats such as plastic and liquid explosives, knifes and contraband. Another embodiment of this technology is capable of obtaining full sized body measurements in near real time without the person under surveillance removing their outer garments. Radar signals readily penetrate clothing and reflect off the water in skin. This full body measurement system is commercially available for best fitting ready to wear clothing, which was the first "biometric" application for this technology. One compelling feature of this technology for security biometric applications is that it can see effectively through disguises, appliances and body hair.

  12. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  13. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy k-means classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based ...

  14. MULTIMODAL BIOMETRIC AUTHENTICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM WITH FINGERPRINT AND IRIS

    Directory of Open Access Journals (Sweden)

    A. Muthukumar

    2012-02-01

    Full Text Available In general, the identification and verification are done by passwords, pin number, etc., which is easily cracked by others. In order to overcome this issue biometrics is a unique tool for authenticate an individual person. Nevertheless, unimodal biometric is suffered due to noise, intra class variations, spoof attacks, non-universality and some other attacks. In order to avoid these attacks, the multimodal biometrics i.e. combining of more modalities is adapted. In a biometric authentication system, the acceptance or rejection of an entity is dependent on the similarity score falling above or below the threshold. Hence this paper has focused on the security of the biometric system, because compromised biometric templates cannot be revoked or reissued and also this paper has proposed a multimodal system based on an evolutionary algorithm, Particle Swarm Optimization that adapts for varying security environments. With these two concerns, this paper had developed a design incorporating adaptability, authenticity and security.

  15. iFace: Facial Expression Training System

    OpenAIRE

    Ito, Kyoko; Kurose, Hiroyuki; Takami, Ai; Nishida, Shogo

    2008-01-01

    In this study, a target facial expression selection interface for a facial expression training system and a facial expression training system were both proposed and developed. Twelve female dentists used the facial expression training system, and evaluations and opinions about the facial expression training system were obtained from these participants. In the future, we will attempt to improve both the target facial expression selection interface and the comparison of a current and a target f...

  16. A Unique Wavelet Steganography Based Voice Biometric Protection Scheme

    Directory of Open Access Journals (Sweden)

    Sanjaypande M. B

    2013-03-01

    Full Text Available Voice biometric is an easy and cost effective biometric technique which requires minimalistic hardware and software complexity. General voice biometric needs a voice phrase by user which is processed with Mel Filter and Vector Quantized features are extracted. Vector quantization reduces the codebook size but decreases the accuracy of recognition. Therefore we propose a voice biometric system where voice file's non quantized code books are matched with spoken phrase. In order to ensure security to such direct voice sample we embed the voice file in a randomly selected image using DWT technique. Imposters are exposed to only images and are unaware of the voice files. We show that the technique produces better efficiency in comparison to VQ based technique.

  17. Joint sparse representation for robust multimodal biometrics recognition.

    Science.gov (United States)

    Shekhar, Sumit; Patel, Vishal M; Nasrabadi, Nasser M; Chellappa, Rama

    2014-01-01

    Traditional biometric recognition systems rely on a single biometric signature for authentication. While the advantage of using multiple sources of information for establishing the identity has been widely recognized, computational models for multimodal biometrics recognition have only recently received attention. We propose a multimodal sparse representation method, which represents the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Thus, we simultaneously take into account correlations as well as coupling information among biometric modalities. A multimodal quality measure is also proposed to weigh each modality as it gets fused. Furthermore, we also kernelize the algorithm to handle nonlinearity in data. The optimization problem is solved using an efficient alternative direction method. Various experiments show that the proposed method compares favorably with competing fusion-based methods.

  18. Heartbeat Signal from Facial Video for Biometric Recognition

    DEFF Research Database (Denmark)

    Haque, Mohammad Ahsanul; Nasrollahi, Kamal; Moeslund, Thomas B.

    2015-01-01

    Different biometric traits such as face appearance and heartbeat signal from Electrocardiogram (ECG)/Phonocardiogram (PCG) are widely used in the human identity recognition. Recent advances in facial video based measurement of cardio-physiological parameters such as heartbeat rate, respiratory rate......, and blood volume pressure provide the possibility of extracting heartbeat signal from facial video instead of using obtrusive ECG or PCG sensors in the body. This paper proposes the Heartbeat Signal from Facial Video (HSFV) as a new biometric trait for human identity recognition, for the first time...

  19. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    Directory of Open Access Journals (Sweden)

    Mrs. D. Shanmugapriya

    2009-09-01

    Full Text Available Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics..Keywords- Biometris; Keystroke Dynamics; computer Security; Information Security; User Authentication.

  20. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    CERN Document Server

    Shanmugapriya, D

    2009-01-01

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics.

  1. Secret sharing using biometric traits

    Science.gov (United States)

    Kholmatov, Alisher; Yanikoglu, Berrin; Savas, Erkay; Levi, Albert

    2006-04-01

    In biometric based authentication, biometric traits of a person are matched against his/her stored biometric profile and access is granted if there is sufficient match. However, there are other access scenarios, which require participation of multiple previously registered users for a successful authentication or to get an access grant for a certain entity. For instance, there are cryptographic constructs generally known as secret sharing schemes, where a secret is split into shares and distributed amongst participants in such a way that it is reconstructed/revealed only when the necessary number of share holders come together. The revealed secret can then be used for encryption or authentication (if the revealed key is verified against the previously registered value). In this work we propose a method for the biometric based secret sharing. Instead of splitting a secret amongst participants, as is done in cryptography, a single biometric construct is created using the biometric traits of the participants. During authentication, a valid cryptographic key is released out of the construct when the required number of genuine participants present their biometric traits.

  2. Alignment and bit extraction for secure fingerprint biometrics

    Science.gov (United States)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  3. Perfect Match: Biometrics and Body Patterning in a Networked World

    Directory of Open Access Journals (Sweden)

    Gillian Fuller

    2003-01-01

    Full Text Available Bodies are increasingly becoming collectively integrated into informational processes which are open to biotechnical forms of regulation. Biometrics, the use of body measurements such as retina scanning, face recognition and fingerprinting is now being uncontroversially introduced throughout the world under the aegis of security and efficient traffic management. Fields that once molded the individual through bodily confinement and observation are dispersing and converging into the regimes of logistics and control. This paper looks at the operations of biometrics to consider the biopolitical ramifications of body measurement as power is made operational by controlling movement via the haptic techniques of information architecture rather than the more familiar modes of discipline and panoptical vision machines. Biometrics is the perfect control for the networked individual as we divide across infinite planes and dimensions, reconfiguring endlessly to become pattern matches in expanding databases of everyday life.

  4. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳俊; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting human faces in color images. The algorithm consists of three image processing steps. The first step is human skin color statistics. Then it separates skin regions from non-skin regions. After that, it locates the frontal human face(s) within the skin regions. In the first step, 250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors. This chroma chart is used to generate, from the original color image, a gray scale image whose gray value at a pixel shows its likelihood of representing the skin. The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into separate skin regions from non skin regions. Finally, multiple face templates matching is used to determine if a given skin region represents a frontal human face or not. Test of the system with more than 400 color images showed that the resulting detection rate was 83%, which is better than most color-based face detection systems. The average speed for face detection is 0.8 second/image (400×300 pixels) on a Pentium 3 (800MHz) PC.

  5. Heart Electrical Actions as Biometric Indicia

    Science.gov (United States)

    Schipper, John F. (Inventor); Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor); Belousof, Eugene (Inventor)

    2013-01-01

    A method and associated system for use of statistical parameters based on peak amplitudes and/or time interval lengths and/or depolarization-repolarization vector angles and/or depolarization-repolarization vector lengths for PQRST electrical signals associated with heart waves, to identify a person. The statistical parameters, estimated to be at least 192, serve as biometric indicia, to authenticate, or to decline to authenticate, an asserted identity of a candidate person.

  6. Face Recognition System based on SURF and LDA Technique

    Directory of Open Access Journals (Sweden)

    Narpat A. Singh

    2016-02-01

    Full Text Available In the past decade, Improve the quality in face recognition system is a challenge. It is a challenging problem and widely studied in the different type of imag-es to provide the best quality of faces in real life. These problems come due to illumination and pose effect due to light in gradient features. The improvement and optimization of human face recognition and detection is an important problem in the real life that can be handles to optimize the error rate, accuracy, peak signal to noise ratio, mean square error, and structural similarity Index. Now-a-days, there several methods are proposed to recognition face in different problem to optimize above parameters. There occur many invariant changes in hu-man faces due to the illumination and pose variations. In this paper we proposed a novel method in face recogni-tion to improve the quality parameters using speed up robust feature and linear discriminant analysis for opti-mize result. SURF is used for feature matching. In this paper, we use linear discriminant analysis for the edge dimensions reduction to live faces from our data-sets. The proposed method shows the better result as compare to the previous result on the basis of comparative analysis because our method show the better quality and better results in live images of face.

  7. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳酸; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting hu-man faces in color images.The algorithm comsists of three image processing steps.The first step is human skin color statistics.Then it separates skin regions from non-skin regions.After that,it locates the frontal human face(s) within the skin regions.In the first step,250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors.This chroma chart is used to generate,from the original color image,a gray scale image whose gray value at a pixel shows its likelihood of representing the shin,The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into sep-arate skin regions from non skin regions.Finally,multiple face templates matching is used to determine if a given skin region represents a frontal human face or not.Test of the system with more than 400 color images showed that the resulting detection rate was 83%,which is better than most colou-based face detection sys-tems.The average speed for face detection is 0.8 second/image(400×300pixels) on a Pentium 3(800MHz) PC.

  8. Unconstrained and contactless hand geometry biometrics.

    Science.gov (United States)

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  9. Biometric user authentication using Gray Wolf Optimization

    Directory of Open Access Journals (Sweden)

    V.Chandrasekar

    2015-08-01

    Full Text Available Major issue in computer security is the need to protect data and computer system from intruders. Hence user authentication is certainly an interesting option for standard security. Keystrokedynamics is a biometrics technique and it plays an important role in user authentication.It is based on the analysis of typing rhythm. In this paper the feature data values are recorded, Hausdroff timing values are calculated and stored as a dataset. Using the dataset the keystroke dynamics provide a more performance. The proposed Gray wolf optimization is used for feature selection. By providing sufficient training and testing the text length, number of dataset and same keyboard type, the keystroke biometric effectively identified the genuine user and impostor.

  10. Biometrics Research and Engineering Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — As the Department of Defense moves forward in its pursuit of integrating biometrics technology into facility access control, the Global War on Terrorism and weapon...

  11. Face Recognition System Based on Spectral Graph Wavelet Theory

    Directory of Open Access Journals (Sweden)

    R. Premalatha Kanikannan

    2014-09-01

    Full Text Available This study presents an efficient approach for automatic face recognition based on Spectral Graph Wavelet Theory (SGWT. SGWT is analogous to wavelet transform and the transform functions are defined on the vertices of a weighted graph. The given face image is decomposed by SGWT at first. The energies of obtained sub-bands are fused together and considered as feature vector for the corresponding image. The performance of proposed system is analyzed on ORL face database using nearest neighbor classifier. The face images used in this study has variations in pose, expression and facial details. The results indicate that the proposed system based on SGWT is better than wavelet transform and 94% recognition accuracy is achieved.

  12. Research on a Product Information Management System Facing Remanufacture Engineering

    Institute of Scientific and Technical Information of China (English)

    HOU Du-cheng; YU Kai-chao; JIA Jian-shi; TANG Xiu-ying

    2007-01-01

    Remanufacture Engineering is an important characteristic and development trend of a manufacturing system in the 21st Century, and product information management is very important to Remanufacture Engineering. In this paper, we first compared traditional manufacturing and remanufacturing. Then, according to the features of Remanufacture Engineering, we analyzed the request of product information management system facing Remanufacture Engineering, and designed the system module. Finally, we built a kind of system structure of product information management facing Remanufacture Engineering and gave realization methods based on Web.

  13. Signal and image processing for biometrics

    CERN Document Server

    Proença, Hugo; Du, Eliza

    2014-01-01

    This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

  14. PCA Based Rapid and Real Time Face Recognition Technique

    Directory of Open Access Journals (Sweden)

    T R Chandrashekar

    2013-12-01

    Full Text Available Economical and efficient that is used in various applications is face Biometric which has been a popular form biometric system. Face recognition system is being a topic of research for last few decades. Several techniques are proposed to improve the performance of face recognition system. Accuracy is tested against intensity, distance from camera, and pose variance. Multiple face recognition is another subtopic which is under research now a day. Speed at which the technique works is a parameter under consideration to evaluate a technique. As an example a support vector machine performs really well for face recognition but the computational efficiency degrades significantly with increase in number of classes. Eigen Face technique produces quality features for face recognition but the accuracy is proved to be comparatively less to many other techniques. With increase in use of core processors in personal computers and application demanding speed in processing and multiple face detection and recognition system (for example an entry detection system in shopping mall or an industry, demand for such systems are cumulative as there is a need for automated systems worldwide. In this paper we propose a novel system of face recognition developed with C# .Net that can detect multiple faces and can recognize the faces parallel by utilizing the system resources and the core processors. The system is built around Haar Cascade based face detection and PCA based face recognition system with C#.Net. Parallel library designed for .Net is used to aide to high speed detection and recognition of the real time faces. Analysis of the performance of the proposed technique with some of the conventional techniques reveals that the proposed technique is not only accurate, but also is fast in comparison to other techniques.

  15. A Survey of 2D Face Recognition Techniques

    Directory of Open Access Journals (Sweden)

    Mejda Chihaoui

    2016-09-01

    Full Text Available Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as hand geometry, the most efficient and more widely-used one is face recognition. This is because it is inexpensive, non-intrusive and natural. Therefore, researchers have developed dozens of face recognition techniques over the last few years. These techniques can generally be divided into three categories, based on the face data processing methodology. There are methods that use the entire face as input data for the proposed recognition system, methods that do not consider the whole face, but only some features or areas of the face and methods that use global and local face characteristics simultaneously. In this paper, we present an overview of some well-known methods in each of these categories. First, we expose the benefits of, as well as the challenges to the use of face recognition as a biometric tool. Then, we present a detailed survey of the well-known methods by expressing each method’s principle. After that, a comparison between the three categories of face recognition techniques is provided. Furthermore, the databases used in face recognition are mentioned, and some results of the applications of these methods on face recognition databases are presented. Finally, we highlight some new promising research directions that have recently appeared.

  16. Multi-Channel Electroencephalogram (EEG Signal Acquisition and its Effective Channel selection with De-noising Using AWICA for Biometric System

    Directory of Open Access Journals (Sweden)

    B.Sabarigiri

    2014-05-01

    Full Text Available the embedding of low cost electroencephalogram (EEG sensors in wireless headsets gives improved authentication based on their brain wave signals has become a practical opportunity. In this paper signal acquisition along with effective multi-channel selection from a specific area of the brain and denoising using AWICA methods are proposed for EEG based personal identification. At this point, to develop identification system the steps are as follows. (i the high-quality device with the least numbers of channels are essential for the EEG signal acquisition and Selecting the equipment and verdict the best portions on the scalp is the primary step. (ii Scrutiny of the acquired EEG signals and de-noising from EMG, ECG, EOG Signals and power line artifacts using AWICA (iii Obtain the features from the Enhanced EEG signals by Wavelet Transform (WT and LS-SVM Classification in the MATLAB Environment. Based on the outcome, there is possibility for implementation of an EEG based Practical biometric system.

  17. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    Science.gov (United States)

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  18. Feature based sliding window technique for face recognition

    Science.gov (United States)

    Javed, Muhammad Younus; Mohsin, Syed Maajid; Anjum, Muhammad Almas

    2010-02-01

    Human beings are commonly identified by biometric schemes which are concerned with identifying individuals by their unique physical characteristics. The use of passwords and personal identification numbers for detecting humans are being used for years now. Disadvantages of these schemes are that someone else may use them or can easily be forgotten. Keeping in view of these problems, biometrics approaches such as face recognition, fingerprint, iris/retina and voice recognition have been developed which provide a far better solution when identifying individuals. A number of methods have been developed for face recognition. This paper illustrates employment of Gabor filters for extracting facial features by constructing a sliding window frame. Classification is done by assigning class label to the unknown image that has maximum features similar to the image stored in the database of that class. The proposed system gives a recognition rate of 96% which is better than many of the similar techniques being used for face recognition.

  19. Review on Matching Infrared Face Images to Optical Face Images using LBP

    Directory of Open Access Journals (Sweden)

    Kamakhaya Argulewar

    2014-12-01

    Full Text Available In biometric research and many security areas, it is very difficult task to match the images which is captured by different devices. Large gap exist between them because they relates with different classes. Matching optical face images to infrared face images is one of the difficult task in face biometric. Large difference exists between infrared and optical face images because they belong to multiple classes. Converting the samples of multimodality into common feature space is the main objective of this project. Different class of images is relating by coordinating separate feature for classes .It is mainly used in heterogeneous face recognition. The new method has been developing for identification of heterogeneous face identification. Training set contains the images from different modalities. Initially the infrared image is preprocessed by applying Gaussian filter, difference of Gaussian and CSDN filters are apply on infrared face image. After preprocessing next step to extracting the feature by using LBP(local binary pattern feature extraction then relevance machine classifier is used to identify the best matching optical image from the corresponding infrared images from the optical images dataset. By processing this technique our system efficiently match the infrared and optical face images.

  20. REAL TIME FACE RECOGNITION USING ADABOOST IMPROVED FAST PCA ALGORITHM

    Directory of Open Access Journals (Sweden)

    K. Susheel Kumar

    2011-08-01

    Full Text Available This paper presents an automated system for human face recognition in a real time background world fora large homemade dataset of persons face. The task is very difficult as the real time backgroundsubtraction in an image is still a challenge. Addition to this there is a huge variation in human face imagein terms of size, pose and expression. The system proposed collapses most of this variance. To detect realtime human face AdaBoost with Haar cascade is used and a simple fast PCA and LDA is used torecognize the faces detected. The matched face is then used to mark attendance in the laboratory, in ourcase. This biometric system is a real time attendance system based on the human face recognition with asimple and fast algorithms and gaining a high accuracy rate..

  1. Talking-Face Identity Verification, Audiovisual Forgery, and Robustness Issues

    Science.gov (United States)

    Karam, Walid; Bredin, Hervé; Greige, Hanna; Chollet, Gérard; Mokbel, Chafic

    2009-12-01

    The robustness of a biometric identity verification (IV) system is best evaluated by monitoring its behavior under impostor attacks. Such attacks may include the transformation of one, many, or all of the biometric modalities. In this paper, we present the transformation of both speech and visual appearance of a speaker and evaluate its effects on the IV system. We propose MixTrans, a novel method for voice transformation. MixTrans is a mixture-structured bias voice transformation technique in the cepstral domain, which allows a transformed audio signal to be estimated and reconstructed in the temporal domain. We also propose a face transformation technique that allows a frontal face image of a client speaker to be animated. This technique employs principal warps to deform defined MPEG-4 facial feature points based on determined facial animation parameters (FAPs). The robustness of the IV system is evaluated under these attacks.

  2. Gaze as a biometric

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Carmichael, Tandy [Tennessee Technological University; Tourassi, Georgia [ORNL

    2014-01-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  3. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  4. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication...

  5. Securing Biometric Images using Reversible Watermarking

    CERN Document Server

    Thampi, Sabu M

    2011-01-01

    Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible watermarking maintains high quality of biometric data. This paper proposes Rotational Replacement of LSB as a reversible watermarking scheme for biometric images. PSNR is the regular method used for quality measurement of biometric data. In this paper we also show that SSIM Index is a better alternate for effective quality assessment for reversible watermarked biometric data by comparing with the well known reversible watermarking scheme using Difference Expansion.

  6. Improving Speaker Recognition by Biometric Voice Deconstruction.

    Science.gov (United States)

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  7. Biometric evidence evaluation: an empirical assessment of the effect of different training data

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Meuwly, Didier

    2014-01-01

    For an automatic comparison of a pair of biometric specimens, a similarity metric called ‘score’ is computed by the employed biometric recognition system. In forensic evaluation, it is desirable to convert this score into a likelihood ratio. This process is referred to as calibration. A likelihood

  8. 78 FR 22274 - Agency Information Collection Activities: Office of Biometric Identity Management (OBIM...

    Science.gov (United States)

    2013-04-15

    ... immigration system improvements. OBIM collects and disseminates biometric information (digital fingerprint... fingerprints from two prints to ten. The new collection time of 35 seconds, an increase from the previous 15... biometrics in connection with their admission to the United States. See 73 FR 77473 (Dec. 19, 2008). OMB...

  9. Biometric evidence evaluation: an empirical assessment of the effect of different training data

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Luuk J.; Veldhuis, Raymond; Meuwly, Didier

    2014-01-01

    For an automatic comparison of a pair of biometric specimens, a similarity metric called ‘score’ is computed by the employed biometric recognition system. In forensic evaluation, it is desirable to convert this score into a likelihood ratio. This process is referred to as calibration. A likelihood r

  10. Brain systems for assessing the affective value of faces.

    Science.gov (United States)

    Said, Christopher P; Haxby, James V; Todorov, Alexander

    2011-06-12

    Cognitive neuroscience research on facial expression recognition and face evaluation has proliferated over the past 15 years. Nevertheless, large questions remain unanswered. In this overview, we discuss the current understanding in the field, and describe what is known and what remains unknown. In §2, we describe three types of behavioural evidence that the perception of traits in neutral faces is related to the perception of facial expressions, and may rely on the same mechanisms. In §3, we discuss cortical systems for the perception of facial expressions, and argue for a partial segregation of function in the superior temporal sulcus and the fusiform gyrus. In §4, we describe the current understanding of how the brain responds to emotionally neutral faces. To resolve some of the inconsistencies in the literature, we perform a large group analysis across three different studies, and argue that one parsimonious explanation of prior findings is that faces are coded in terms of their typicality. In §5, we discuss how these two lines of research--perception of emotional expressions and face evaluation--could be integrated into a common, cognitive neuroscience framework.

  11. The effect of image resolution on the performance of a face recognition system

    NARCIS (Netherlands)

    Boom, B.J.; Beumer, G.M.; Spreeuwers, L.J.; Veldhuis, R.N.J.

    2006-01-01

    In this paper we investigate the effect of image resolution on the error rates of a face verification system. We do not restrict ourselves to the face recognition algorithm only, but we also consider the face registration. In our face recognition system, the face registration is done by finding land

  12. 基于RADIUS的静脉生物认证系统的设计和实现%Design and Implementation of vein Biometric Authentication System Based on RADIUS

    Institute of Scientific and Technical Information of China (English)

    杨菲

    2012-01-01

    In order to improve the bank's internal network security, we designed a set of RADIUS-based vein biometric authentication system. Detail the principles of the system, including RADIUS-related technical specifications, system design architecture, and finally realized.%为了提高银行内部网络的安全性,设计了这套基于RADIUS的静脉生物认证系统.详细介绍了系统的原理.其中包括RADIUS相关技术说明,系统总体设计的架构,以及最后实现的过程.

  13. Secure Biometric E-Voting Scheme

    Science.gov (United States)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  14. Face liveness detection using shearlet-based feature descriptors

    Science.gov (United States)

    Feng, Litong; Po, Lai-Man; Li, Yuming; Yuan, Fang

    2016-07-01

    Face recognition is a widely used biometric technology due to its convenience but it is vulnerable to spoofing attacks made by nonreal faces such as photographs or videos of valid users. The antispoof problem must be well resolved before widely applying face recognition in our daily life. Face liveness detection is a core technology to make sure that the input face is a live person. However, this is still very challenging using conventional liveness detection approaches of texture analysis and motion detection. The aim of this paper is to propose a feature descriptor and an efficient framework that can be used to effectively deal with the face liveness detection problem. In this framework, new feature descriptors are defined using a multiscale directional transform (shearlet transform). Then, stacked autoencoders and a softmax classifier are concatenated to detect face liveness. We evaluated this approach using the CASIA Face antispoofing database and replay-attack database. The experimental results show that our approach performs better than the state-of-the-art techniques following the provided protocols of these databases, and it is possible to significantly enhance the security of the face recognition biometric system. In addition, the experimental results also demonstrate that this framework can be easily extended to classify different spoofing attacks.

  15. A method of ECG template extraction for biometrics applications.

    Science.gov (United States)

    Zhou, Xiang; Lu, Yang; Chen, Meng; Bao, Shu-Di; Miao, Fen

    2014-01-01

    ECG has attracted widespread attention as one of the most important non-invasive physiological signals in healthcare-system related biometrics for its characteristics like ease-of-monitoring, individual uniqueness as well as important clinical value. This study proposes a method of dynamic threshold setting to extract the most stable ECG waveform as the template for the consequent ECG identification process. With the proposed method, the accuracy of ECG biometrics using the dynamic time wraping for difference measures has been significantly improved. Analysis results with the self-built electrocardiogram database show that the deployment of the proposed method was able to reduce the half total error rate of the ECG biometric system from 3.35% to 1.45%. Its average running time on the platform of android mobile terminal was around 0.06 seconds, and thus demonstrates acceptable real-time performance.

  16. BIOMETRICS SOCIETY AND THE PROGRESS OF ANIMAL SCIENCE IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Condrea DRAGANESCU

    2014-04-01

    Full Text Available Romanian animal, agricultural and biological sciences were seriously damaged in the period 1948-1964 by the introduction of the Stalinsko- lasenko approach in the field of Genetics and by an empiric-pragmatic approach of agricultural theory. In 1965, it started the reintroduction of the real genetic science and in 1969 a small group of scientists (22, 3 animal scientists, 3 agriculturalists registered in International Biometric Society aiming to change the scientific approach in experimental technique, genetic and animal breeding, ecological vision of animal production, education system. An international Congress of International Biometric Society was held in Romania. Some progress was achieved in all biological fields, but generally it was braked by the routine, by inertia. The number of Romanian agricultural members of Biometric Society decreased, the group disappeared after the year 1990, the biometricians were not present in research and education, but a correct approach is visible in Animal Breeding theory. It is noted that the biometric approach in biological sciences is originated from Darwin and Mendel theory, it was concretized by Galton and Pearson but the origin of Biometric Society (1946 is connected with S. Wright. Some basic scientific works of Quantitative Genetics and Evolution theory are noted.

  17. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    Science.gov (United States)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  18. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    Directory of Open Access Journals (Sweden)

    Moses Okechukwu Onyesolu

    2012-04-01

    Full Text Available The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric authentication scheme for automated teller machine (ATM banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is fused with the ATM for person authentication to ameliorate the security level.

  19. Biometric template data protection in mobile device environment using XML-database

    DEFF Research Database (Denmark)

    Thirumathyam, Rubathas; Derawi, Mohammad; Fischer, Paul

    2010-01-01

    This paper proposes a non-traditional XML database which supports biometric templates and provides an API which can be used by independent applications in mobile device environments. Until recently biometric systems are becoming more and more visible in mobile phone devices including fingerprint...... recognition or gait recognition. To gain a real understanding of how it is possible to protect the biometric data, this paper first starts out with introducing a technique for security in a biometric system and emphasizes that template protection is important by going through the vulnerabilities and threats....... Furthermore, it points out requirements for template protection, a recital of various template protection schemes and a brief overview of biometric standards....

  20. Recommendation on the Use of Biometric Technology

    DEFF Research Database (Denmark)

    Juul, Niels Christian

    2013-01-01

    Biometric technology is based on the use of information linked to individuals. Hence, privacy and security in biometric applications becomes a concern and the need to assess such applications thoroughly becomes equally important. Guidelines for application of biometric technology must ensure...... a positive impact on both security and privacy. Based on two cases of biometric application, which have been assessed by the Danish Data Protecting Agency, this chapter present a set of recommendations to legislators, regulators, corporations and individuals on the appropriate use of biometric technologies...

  1. Recommendation on the Use of Biometric Technology

    DEFF Research Database (Denmark)

    Juul, Niels Christian

    2013-01-01

    Biometric technology is based on the use of information linked to individuals. Hence, privacy and security in biometric applications becomes a concern and the need to assess such applications thoroughly becomes equally important. Guidelines for application of biometric technology must ensure...... a positive impact on both security and privacy. Based on two cases of biometric application, which have been assessed by the Danish Data Protecting Agency, this chapter present a set of recommendations to legislators, regulators, corporations and individuals on the appropriate use of biometric technologies...

  2. Biometrics Identity Authentication in Secure Electronic Transactions

    Directory of Open Access Journals (Sweden)

    Deepu Saini

    2012-06-01

    Full Text Available There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even thetwins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.

  3. Efficient Multimodal Biometric Authentication Using Fast Fingerprint Verification and Enhanced Iris Features

    Directory of Open Access Journals (Sweden)

    A. J. Basha

    2011-01-01

    Full Text Available Problem statement: The accuracy of biometric systems varies with the kind of biometric feature used in it. The Unmoral biometric system is prone to interclass variations. Approach: We implement Multimodal biometric systems to overcome the limitations by using multiple pieces of evidence of the same identity. However, the multimodal biometric system is limited to the time constraints due to its multiple processing stages. To improve the speed of authentication in the biometric system with acceptable accuracy, we have introduced a dynamic fingerprint verification technique fused with enhanced iris recognition using the adaptive rank level fusion method. Results: When tested upon the standard biometric dataset the system shows improvement in the False Acceptance Rate (FAR and Equal Error Rate (EER curves. Essentially, the time taken for the training and verification phase has a reduction of 10% when compared with the existing systems. Conclusion: The multimodel system has necessarily increased the speed and performance of the verification system especially when tested on slow processing and low memory devices.

  4. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  5. Estimating Body Related Soft Biometric Traits in Video Frames

    Directory of Open Access Journals (Sweden)

    Olasimbo Ayodeji Arigbabu

    2014-01-01

    Full Text Available Soft biometrics can be used as a prescreening filter, either by using single trait or by combining several traits to aid the performance of recognition systems in an unobtrusive way. In many practical visual surveillance scenarios, facial information becomes difficult to be effectively constructed due to several varying challenges. However, from distance the visual appearance of an object can be efficiently inferred, thereby providing the possibility of estimating body related information. This paper presents an approach for estimating body related soft biometrics; specifically we propose a new approach based on body measurement and artificial neural network for predicting body weight of subjects and incorporate the existing technique on single view metrology for height estimation in videos with low frame rate. Our evaluation on 1120 frame sets of 80 subjects from a newly compiled dataset shows that the mentioned soft biometric information of human subjects can be adequately predicted from set of frames.

  6. NCI: DCTD: Biometric Research Branch

    Science.gov (United States)

    The Biometric Research Branch (BRB) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  7. NCI: DCTD: Biometric Research Program

    Science.gov (United States)

    The Biometric Research Program (BRP) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  8. A multi-biometric feature-fusion framework for improved uni-modal and multi-modal human identification

    CSIR Research Space (South Africa)

    Brown, K

    2016-05-01

    Full Text Available provide important guidelines that enable the sys- tematic implementation of multi-modal biometric systems for future research and applications. Feature-level fusion is in particular need of these guidelines because of the ”curse of dimensionality” problem.... The training samples were sequentially chosen from one to five and the rest were used for testing. To the best of our knowledge there are no studies that fuse face and fingerprint data acquired from the SDUMLA multi-modal database. B. Pre-processing Pixel...

  9. Thermal imaging as a biometrics approach to facial signature authentication.

    Science.gov (United States)

    Guzman, A M; Goryawala, M; Wang, Jin; Barreto, A; Andrian, J; Rishe, N; Adjouadi, M

    2013-01-01

    A new thermal imaging framework with unique feature extraction and similarity measurements for face recognition is presented. The research premise is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The proposed algorithm is fully integrated and consolidates the critical steps of feature extraction through the use of morphological operators, registration using the Linear Image Registration Tool and matching through unique similarity measures designed for this task. The novel approach at developing a thermal signature template using four images taken at various instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric matching process as the authentication process relied only on consistent thermal features. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using the similarity measures showed an average accuracy of 88.46% for skeletonized signatures and 90.39% for anisotropically diffused signatures. The highly accurate results obtained in the matching process clearly demonstrate the ability of the thermal infrared system to extend in application to other thermal imaging based systems. Empirical results applying this approach to an existing database of thermal images proves this assertion.

  10. Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2: Initial Operational Test and Evaluation Report

    Science.gov (United States)

    2015-05-01

    the BIMA operators and the external submitters. The Watchdesk (a separate support system within BIMA that does not overlap with the PMO -provided...Help Desk) provided support to external submitters and did not systematically report issues to the PMO Help Desk system. Without a centralized Help...the tickets more difficult. The Help Desk Tiers 2 and 3 within the PMO use a different trouble ticket system – a proprietary tool maintained at the

  11. A systems view of mother-infant face-to-face communication.

    Science.gov (United States)

    Beebe, Beatrice; Messinger, Daniel; Bahrick, Lorraine E; Margolis, Amy; Buck, Karen A; Chen, Henian

    2016-04-01

    Principles of a dynamic, dyadic systems view of mother-infant face-to-face communication, which considers self- and interactive processes in relation to one another, were tested. The process of interaction across time in a large low-risk community sample at infant age 4 months was examined. Split-screen videotape was coded on a 1-s time base for communication modalities of attention, affect, orientation, touch, and composite facial-visual engagement. Time-series approaches generated self- and interactive contingency estimates in each modality. Evidence supporting the following principles was obtained: (a) Significant moment-to-moment predictability within each partner (self-contingency) and between the partners (interactive contingency) characterizes mother-infant communication. (b) Interactive contingency is organized by a bidirectional, but asymmetrical, process: Maternal contingent coordination with infant is higher than infant contingent coordination with mother. (c) Self-contingency organizes communication to a far greater extent than interactive contingency. (d) Self- and interactive contingency processes are not separate; each affects the other in communication modalities of facial affect, facial-visual engagement, and orientation. Each person's self-organization exists in a dynamic, homoeostatic (negative feedback) balance with the degree to which the person coordinates with the partner. For example, those individuals who are less facially stable are likely to coordinate more strongly with the partner's facial affect and vice versa. Our findings support the concept that the dyad is a fundamental unit of analysis in the investigation of early interaction. Moreover, an individual's self-contingency is influenced by the way the individual coordinates with the partner. Our results imply that it is not appropriate to conceptualize interactive processes without simultaneously accounting for dynamically interrelated self-organizing processes.

  12. Chaotic Neural Network for Biometric Pattern Recognition

    Directory of Open Access Journals (Sweden)

    Kushan Ahmadian

    2012-01-01

    Full Text Available Biometric pattern recognition emerged as one of the predominant research directions in modern security systems. It plays a crucial role in authentication of both real-world and virtual reality entities to allow system to make an informed decision on granting access privileges or providing specialized services. The major issues tackled by the researchers are arising from the ever-growing demands on precision and performance of security systems and at the same time increasing complexity of data and/or behavioral patterns to be recognized. In this paper, we propose to deal with both issues by introducing the new approach to biometric pattern recognition, based on chaotic neural network (CNN. The proposed method allows learning the complex data patterns easily while concentrating on the most important for correct authentication features and employs a unique method to train different classifiers based on each feature set. The aggregation result depicts the final decision over the recognized identity. In order to train accurate set of classifiers, the subspace clustering method has been used to overcome the problem of high dimensionality of the feature space. The experimental results show the superior performance of the proposed method.

  13. Face detection for interactive tabletop viewscreen system using olfactory display

    Science.gov (United States)

    Sakamoto, Kunio; Kanazawa, Fumihiro

    2009-10-01

    An olfactory display is a device that delivers smells to the nose. It provides us with special effects, for example to emit smell as if you were there or to give a trigger for reminding us of memories. The authors have developed a tabletop display system connected with the olfactory display. For delivering a flavor to user's nose, the system needs to recognition and measure positions of user's face and nose. In this paper, the authors describe an olfactory display which enables to detect the nose position for an effective delivery.

  14. 基于生物识别的网络身份认证新方案%A New Network Authentication Scheme based on Biometric Recognition

    Institute of Scientific and Technical Information of China (English)

    王毓娜; 吕秋云

    2014-01-01

    文章分析了现今基于生物识别技术的网络认证没被广泛应用的原因:生物特征的提取一般需要特殊的专用设备、指纹的利用比较泛滥、生物特征遗失后挂失比较困难等。文章同时对比了几种比较主流的生物特征识别技术,分析了它们各自的实用性、便捷性以及安全性,指出生物3D打印技术在未来对生物识别技术带来冲击的可能。文章提出了一种基于动态人脸识别的网络认证方案,该方案利用人脸作为网络认证的基础,通过跟踪实时人脸活动来实现实时人脸图像的采集,预防了照片攻击和视频攻击,提高了认证的可靠性和安全性。文章最后通过分析该方案的可实现性、可叠加性和安全性,并从成本等方面考虑,得出该方案性能较优的结论,同时对生物识别技术应用于网络认证进行了展望。由于生物特征具有唯一性和不可重置的特点,所以生物特征保护需要引起更高的关注,也需要更多学者做相关的研究,更好地利用生物特征。%This paper analyzes the causes of today's network authentication based on biometric recognition has not been widely used : the need for special equipments to extract biometric features, the rampant use of ifngerprints , and the dififculties of reporting biometric features loss. Meanwhile, this paper compares several major biometric recognition technologies to analyze the practicality, the convenience and the security. By judging from the rapid development of the Bio-3D printing technology, this paper points out that the Bio-3D printing technology may bring impact to the biometric recognition in the future. In this paper, a network authentication scheme based on face recognition is proposed ,in which faces are used as the basis for network authentication. By tracking facial activities in real time to achieve real-time facial image ,the system can prevent the photo and video attacks

  15. Bridging the gap: from biometrics to forensics.

    Science.gov (United States)

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large.

  16. System Analysis of Flat Grinding Process with Wheel Face

    Directory of Open Access Journals (Sweden)

    T. N. Ivanova

    2014-01-01

    Full Text Available The paper presents a conducted system analysis of the flat grinding wheel face, considers the state parameters, input and output variables of subsystems, namely: machine tool, workpiece, grinding wheel, cutting fluids, and the contact area. It reveals the factors influencing the temperature and power conditions for the grinding process.Aim: conducting the system analysis of the flat grinding process with wheel face expects to enable a development of the system of grinding process parameters as a technical system, which will make it possible to evaluate each parameter individually and implement optimization of the entire system.One of the most important criteria in defining the optimal process conditions is the grinding temperature, which, to avoid defects appearance of on the surface of component, should not exceed the critical temperature values to be experimentally determined. The temperature criterion can be useful for choosing the conditions for the maximum defect-free performance of the mechanical face grinding. To define the maximum performance of defect-free grinding can also use other criteria such as a critical power density, indirectly reflecting the allowable thermal stress grinding process; the structure of the ground surface, which reflects the presence or absence of a defect layer, which is determined after the large number of experiments; flow range of the diamond layer.Optimal conditions should not exceed those of defect-free grinding. It is found that a maximum performance depends on the characteristics of circles and grade of processed material, as well as on the contact area and grinding conditions. Optimal performance depends on the diamond value (cost and specific consumption of diamonds in a circle.Above criteria require formalization as a function of the variable parameters of the grinding process. There is an option for the compromise of inter-criteria optimality, thereby providing a set of acceptable solutions, from

  17. Biometrics, biomathematics and the morphometric synthesis.

    Science.gov (United States)

    Bookstein, F L

    1996-03-01

    At the core of contemporary morphometrics--the quantitative study of biological shape variation--is a synthesis of two originally divergent methodological styles. One contributory tradition is the multivariate analysis of covariance matrices originally developed as biometrics and now dominant across a broad expanse of applied statistics. This approach, couched solely in the linear geometry of covariance structures, ignores biomathematical aspects of the original measurements. The other tributary emphasizes the direct visualization of changes in biological form. However, making objective the biological meaning of the features seen in those diagrams was always problematical; also, the representation of variation, as distinct from pairwise difference, proved infeasible. To combine these two variants of biomathematical modeling into a valid praxis for quantitative studies of biological shape was a goal earnestly sought though most of this century. That goal was finally achieved in the 1980s when techniques from mathematical statistics, multivariate biometrics, non-Euclidean geometry and computer graphics were combined in a coherent new system of tools for the complete regionalized quantitative analysis of landmark points together with the biomedical images in which they are seen. In this morphometric synthesis, correspondence of landmarks (biologically labeled geometric points, like "bridge of the nose") across specimens is taken as a biomathematical primitive. The shapes of configurations of landmarks are defined as equivalence classes with respect to the Euclidean similarity group and then represented as single points in David Kendall's shape space, a Riemannian manifold with Procrustes distance as metric. All conventional multivariate strategies carry over to the study of shape variation and covariation when shapes are interpreted in the tangent space to the shape manifold at an average shape. For biomathematical interpretation of such analyses, one needs a basis

  18. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Veldhuis, Raymond; Spreeuwers, Luuk

    2010-01-01

    Beside a few papers which focus on the forensic aspects of automatic face recognition, there is not much published about it in contrast to the literature on developing new techniques and methodologies for biometric face recognition. In this report, we review forensic facial identification which is t

  19. Side-View Face Recognition

    NARCIS (Netherlands)

    Santemiz, Pinar; Spreeuwers, Luuk J.; Veldhuis, Raymond N.J.; Biggelaar , van den Olivier

    2011-01-01

    As a widely used biometrics, face recognition has many advantages such as being non-intrusive, natural and passive. On the other hand, in real-life scenarios with uncontrolled environment, pose variation up to side-view positions makes face recognition a challenging work. In this paper we discuss th

  20. SAS Launches Biometric Identification at Airports All Over Sweden

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Scandinavian Airlines is to launch a new biometric identification system throughout Sweden.When traveling, your fingerprint will be matched to your check-in baggage. This makes the check-in process easier and improves security. The new technology will be launched during November and December at almost all airports served by Scandinavian Airlines in Sweden.

  1. The state of the art in abuse of biometrics

    NARCIS (Netherlands)

    Buhan, Ileana; Hartel, Pieter

    2005-01-01

    For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit

  2. The state of the art in abuse of biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Hartel, Pieter H.

    For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit

  3. Face recognition based on matching of local features on 3D dynamic range sequences

    Science.gov (United States)

    Echeagaray-Patrón, B. A.; Kober, Vitaly

    2016-09-01

    3D face recognition has attracted attention in the last decade due to improvement of technology of 3D image acquisition and its wide range of applications such as access control, surveillance, human-computer interaction and biometric identification systems. Most research on 3D face recognition has focused on analysis of 3D still data. In this work, a new method for face recognition using dynamic 3D range sequences is proposed. Experimental results are presented and discussed using 3D sequences in the presence of pose variation. The performance of the proposed method is compared with that of conventional face recognition algorithms based on descriptors.

  4. Functional development of the brain's face-processing system.

    Science.gov (United States)

    Haist, Frank; Anzures, Gizelle

    2017-01-01

    In the first 20 years of life, the human brain undergoes tremendous growth in size, weight, and synaptic connectedness. Over the same time period, a person achieves remarkable transformations in perception, thought, and behavior. One important area of development is face processing ability, or the ability to quickly and accurately extract extensive information about a person's identity, emotional state, attractiveness, intention, and numerous other types of information that are crucial to everyday social interaction and communication. Associating particular brain changes with specific behavioral and intellectual developments has historically been a serious challenge for researchers. Fortunately, modern neuroimaging is dramatically advancing our ability to make associations between morphological and behavioral developments. In this article, we demonstrate how neuroimaging has revolutionized our understanding of the development of face processing ability to show that this essential perceptual and cognitive skill matures consistently yet slowly over the first two decades of life. In this manner, face processing is a model system of many areas of complex cognitive development. WIREs Cogn Sci 2017, 8:e1423. doi: 10.1002/wcs.1423 For further resources related to this article, please visit the WIREs website. © 2016 Wiley Periodicals, Inc.

  5. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  6. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  7. NEURO FUZZY MODEL FOR FACE RECOGNITION WITH CURVELET BASED FEATURE IMAGE

    OpenAIRE

    SHREEJA R,; KHUSHALI DEULKAR,; SHALINI BHATIA

    2011-01-01

    A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometric techniques such as fingerprint or iris recognition systems. Every face has approximately 80 nodal points like (Distance between the eyes, Width of...

  8. Face Image Quality and its Improvement in a Face Detection System

    DEFF Research Database (Denmark)

    Kamal, Nasrollahi; Moeslund, Thomas B.

    2008-01-01

    When a person passes by a surveillance camera a sequence of images is obtained. Most of these images are redundant and usually keeping some of them which have better quality is sufficient. So before performing any analysis on the face of a person, the face at the first step needs to be detected....... In the second step the quality of the different face images needs to be evaluated. Finally, after choosing the best image(s) based on this quality assessment, in the third step, if this image(s) is not satisfying a predefined set of measures for good quality images, its quality should be improved. In this work...

  9. Quantified Faces

    DEFF Research Database (Denmark)

    Sørensen, Mette-Marie Zacher

    2016-01-01

    Abstract: The article presents three contemporary art projects that, in various ways, thematise questions regarding numerical representation of the human face in relation to the identification of faces, for example through the use of biometric video analysis software, or DNA technology. The Dutch...... and critically examine bias in surveillance technologies, as well as scientific investigations, regarding the stereotyping mode of the human gaze. The American artist Heather Dewey-Hagborg creates three-dimensional portraits of persons she has “identified” from their garbage. Her project from 2013 entitled....... The three works are analysed with perspectives to historical physiognomy and Francis Galton's composite portraits from the 1800s. It is argued that, rather than being a statistical compression like the historical composites, contemporary statistical visual portraits (composites) are irreversible...

  10. Image-Based 3D Face Modeling System

    Directory of Open Access Journals (Sweden)

    Vladimir Vezhnevets

    2005-08-01

    Full Text Available This paper describes an automatic system for 3D face modeling using frontal and profile images taken by an ordinary digital camera. The system consists of four subsystems including frontal feature detection, profile feature detection, shape deformation, and texture generation modules. The frontal and profile feature detection modules automatically extract the facial parts such as the eye, nose, mouth, and ear. The shape deformation module utilizes the detected features to deform the generic head mesh model such that the deformed model coincides with the detected features. A texture is created by combining the facial textures augmented from the input images and the synthesized texture and mapped onto the deformed generic head model. This paper provides a practical system for 3D face modeling, which is highly automated by aggregating, customizing, and optimizing a bunch of individual computer vision algorithms. The experimental results show a highly automated process of modeling, which is sufficiently robust to various imaging conditions. The whole model creation including all the optional manual corrections takes only 2∼3 minutes.

  11. Biometric technology in rural credit markets

    OpenAIRE

    2010-01-01

    Identity theft is a common crime the world over. In developing countries, the damage caused by identity theft and identity fraud goes far beyond the individual victim, however, and ultimately creates a direct impediment to progress, particularly in credit markets. Recent research reveals that biometric technology can help reduce these problems. A biometric is a measurement of physical or behavioral characteristics used to verify or analyze identity. Common biometrics include a person’s finger...

  12. Mobile biometric device (MBD) technology :

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  13. An efficient visualization method for analyzing biometric data

    Science.gov (United States)

    Rahmes, Mark; McGonagle, Mike; Yates, J. Harlan; Henning, Ronda; Hackett, Jay

    2013-05-01

    We introduce a novel application for biometric data analysis. This technology can be used as part of a unique and systematic approach designed to augment existing processing chains. Our system provides image quality control and analysis capabilities. We show how analysis and efficient visualization are used as part of an automated process. The goal of this system is to provide a unified platform for the analysis of biometric images that reduce manual effort and increase the likelihood of a match being brought to an examiner's attention from either a manual or lights-out application. We discuss the functionality of FeatureSCOPE™ which provides an efficient tool for feature analysis and quality control of biometric extracted features. Biometric databases must be checked for accuracy for a large volume of data attributes. Our solution accelerates review of features by a factor of up to 100 times. Review of qualitative results and cost reduction is shown by using efficient parallel visual review for quality control. Our process automatically sorts and filters features for examination, and packs these into a condensed view. An analyst can then rapidly page through screens of features and flag and annotate outliers as necessary.

  14. Identification with Encrypted Biometric Data Made Feasible

    CERN Document Server

    Bringer, Julien; Kindarji, Bruno

    2009-01-01

    Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns. This paper introduces a new method to identify someone using his biometrics in an encrypted way. Our construction combines Bloom Filters with Storage and Locality-Sensitive Hashing. We apply this error-tolerant scheme, in a Hamming space, to achieve biometric identification in an efficient way. This is the first non-trivial identification scheme dealing with fuzziness and encrypted data.

  15. Adoption of Biometric Fingerprint Identification as an Accessible, Secured form of ATM Transaction Authentication

    Directory of Open Access Journals (Sweden)

    Michael Mireku Kwakye

    2015-10-01

    Full Text Available Security is continuously an important concern for most Information Technology-related industries, especially the banking industry. The banking industry is concerned with protecting and securing the privacy and data of their customers, as well as their transactions. The adoption of biometric technology as a means of identifying and authenticating individuals has been proposed as one of the varied solutions to many of the security challenges faced by the banking industry. In this paper, the authors address the ATM transaction authentication problem of banking transactions using fingerprint identification as one form of biometric authentication. The novel methodology adopted proposes the use of an online off-card fingerprint verification, which involves the matching of live fingerprint (templates with pre-stored templates read from the ATM smart card. The experimental evaluation of the proposed methodology presents a system that offers a faster and relatively better security of authentication, as compared to previous and existing methodologies. Moreover, the use of BioHASH templates ensures an irreversible cryptographic hash function, facilitates a faster authentication, and enables an efficient framework of detecting potential duplicates of banking account holders.

  16. Ear biometrics in 2D and 3D localization and recognition

    CERN Document Server

    Prakash, Surya

    2015-01-01

    This book presents the state-of-the-art techniques and recent research progress on Ear Biometrics. Among the various physiological traits, the reasons for the ear to gain much attention in recent years are many folds. It has been found to be a reliable biometrics for human verification and identification. Ears are remarkably consistent and unlike face, it does not change shape with different expressions or age, and remain fixed in the middle of the side of the head against a predictable background. The book contains figures, tables and plots to illustrate the techniques in an easy and lucid manner. The book also provides an extensive literature on the subject, where readers have the benefit of receiving all the relevant material at one place in a very comprehensive manner. This book caters students, academics, researchers, practitioners who are interested in the field of Ear Biometrics and its applications in face recognition and security.

  17. Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication

    Directory of Open Access Journals (Sweden)

    M. V. Ramakrishna

    2013-07-01

    Full Text Available Token based security (ID Cards have been used to restrictaccess to the Securedsystems.The purpose ofBiometricsistoidentify / verifythe correctness of an individualby using certain physiological orbehaviouraltraits associated with the person.Current biometric systems make use of face, fingerprints,iris,hand geometry,retina, signature, palm print, voiceprint and so on to establish a person’s identity.Biometrics isone of the primary key concepts of realapplicationdomains such asaadhar card, passport,pancard, etc.In this paper, we consider face andfingerprint patternsforidentification/verification.Usingthis data weproposed a novel model for authentication in multimodal biometricsoften called Context-SensitiveExponentAssociative Memory Model (CSEAM.It provides different stagesof securityforbiometricsfusionpatterns.Instage1,fusion offace and finger patternsusingPrincipal ComponentAnalysis (PCA,in stage 2by applyingSparseSVD decomposition toextract the feature patternsfrom thefusion data and face pattern and thenin stage 3,using CSEAM model,theextracted feature vectorscan beencoded.Thefinal key will be stored in the smart cardsas Associative Memory (M, which is often calledContext-Sensitive Associative Memory (CSAM. In CSEAM model,theCSEAMwill be computed usingexponential kronecker productforencodingand verificationofthe chosen samplesfrom the users.Theexponentialof matrixcan be computed in various ways such as Taylor Series, Pade Approximation andalso using OrdinaryDifferential Equations (O.D.E.. Among these approaches we considered first twomethods for computing exponential of a feature space.The result analysis of SVD and Sparse SVD forfeature extraction process and also authentication/verification process of the proposed systemin terms ofperformance measuresasMean square error rateswill be presented

  18. Review analysis of properties for an ideal secure biometric template scheme

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-02-01

    Full Text Available privacy and system security. To mitigate this problem, various biometric protection techniques have been proposed. Most of these schemes aim to satisfy diversity, revocability, security and performance properties, as requirements for ideal secured...

  19. Impact of the lips for biometrics.

    Science.gov (United States)

    Liu, Yun-Fu; Lin, Chao-Yu; Guo, Jing-Ming

    2012-06-01

    In this paper, the impact of the lips for identity recognition is investigated. In fact, it is a challenging issue for identity recognition solely by the lips. In the first stage of the proposed system, a fast box filtering is proposed to generate a noise-free source with high processing efficiency. Afterward, five various mouth corners are detected through the proposed system, in which it is also able to resist shadow, beard, and rotation problems. For the feature extraction, two geometric ratios and ten parabolic-related parameters are adopted for further recognition through the support vector machine. Experimental results demonstrate that, when the number of subjects is fewer or equal to 29, the correct accept rate (CAR) is greater than 98%, and the false accept rate (FAR) is smaller than 0.066%. (CAR > 95.02%, FAR biometrics applications when other facial organs are covered or when it is applied for an access control system.

  20. Feature Level Fusion of Biometrics Cues: Human Identification with Doddingtons Caricature

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2010-01-01

    This paper presents a multimodal biometric system of fingerprint and ear biometrics. Scale Invariant Feature Transform (SIFT) descriptor based feature sets extracted from fingerprint and ear are fused. The fused set is encoded by K-medoids partitioning approach with less number of feature points in the set. K-medoids partition the whole dataset into clusters to minimize the error between data points belonging to the clusters and its center. Reduced feature set is used to match between two biometric sets. Matching scores are generated using wolf-lamb user-dependent feature weighting scheme introduced by Doddington. The technique is tested to exhibit its robust performance.

  1. Advances in the biometric recognition methods: a survey on iris and fingerprint recognition

    Science.gov (United States)

    Zaeri, Naser; Alkoot, Fuad

    2010-02-01

    Human recognition based on biometrics finds many important applications in many life sectors and in particular in commercial and law enforcement. This paper aims to give a general overview of the advances in the biometric recognition methods. We concentrate on main methods and accessible ideas presented for human recognition systems based on two types of biometrics: iris and fingerprint. We present a quick overview of the landmark papers that laid the foundation in each track then we present the latest updates and important turns and solutions that developed in each track in the last few years.

  2. Sparse Representation Fusion of Fingerprint, Iris and Palmprint Biometric Features

    Directory of Open Access Journals (Sweden)

    S.Anu H Nair

    2014-03-01

    Full Text Available Multimodal Biometric System using multiple sources of information for establishing the identity has been widely recognized. But the computational models for multimodal biometrics recognition have only recently received attention. In this paper multimodal biometric image such as fingerprint, palmprint, and iris are extracted individually and are fused together using a sparse fusion mechanism. A multimodal sparse representation method is proposed, which interprets the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. The images are pre-processed for feature extraction. In this process Sobel, canny, Prewitt edge detection methods were applied. The image quality was measured using PSNR, NAE, and NCC metrics. Based on the results obtained, Sobel edge detection was used for feature extraction. Extracted features were subjected to sparse representation for the fusion of different modalities. The fused template can be used for watermarking and person identification application. CASIA database is chosen for the biometric images.

  3. Biometric Challenges for Future Deployments: A Study of the Impact of Geography, Climate, Culture, and Social Conditions on the Effective Collection of Biometrics

    Science.gov (United States)

    2011-04-01

    to-one comparison. The classic example of verification is using biometrics to control physical access to a building , which requires a person to...Face Thermography Though thermography may be used as an approach for preventing some spoofing attacks with regular face recognition, by itself it...an impact. Cold skin closes some pores, which means that less material will get transferred from the skin to a surface, which will cause poor quality

  4. Application of Biometrics in Mobile Voting

    Directory of Open Access Journals (Sweden)

    Donovan Gentles

    2012-07-01

    Full Text Available Voting process in today’s era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. We have considered the mobile equipment for the present system development, a smart phone using Android 3.0 (Honeycomb. The details of the proposed development are presented in this paper.

  5. New Biometric Approaches for Improved Person Identification Using Facial Detection

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-08-01

    Full Text Available Biometrics is measurable characteristics specific to an individual. Face detection has diverse applications especially as an identification solution which can meet the crying needs in security areas. While traditionally 2D images of faces have been used, 3D scans that contain both 3D data and registered color are becoming easier to acquire. Before 3D face images can be used to identify an individual, they require some form of initial alignment information, typically based on facial feature locations. We follow this by a discussion of the algorithms performance when constrained to frontal images and an analysis of its performance on a more complex dataset with significant head pose variation using 3D face data for detection provides a promising route to improved performance.

  6. ONLINE TRAINING FOR FACE RECOGNITION SYSTEM USING IMPROVED PCA

    Directory of Open Access Journals (Sweden)

    Widodo Budiharto

    2011-11-01

    where the tested images are captured real-time from camera. Varying illumination in tested images will increase the accuracy using ITS face database which its accuracy is 95.5 %, higher than ATT face databases as 95.4% and Indian face databases as 72%. The results from this experiment are still evaluated to be improved in the future.

  7. Face Processing Systems: From Neurons to Real-World Social Perception.

    Science.gov (United States)

    Freiwald, Winrich; Duchaine, Bradley; Yovel, Galit

    2016-07-08

    Primate face processing depends on a distributed network of interlinked face-selective areas composed of face-selective neurons. In both humans and macaques, the network is divided into a ventral stream and a dorsal stream, and the functional similarities of the areas in humans and macaques indicate they are homologous. Neural correlates for face detection, holistic processing, face space, and other key properties of human face processing have been identified at the single neuron level, and studies providing causal evidence have established firmly that face-selective brain areas are central to face processing. These mechanisms give rise to our highly accurate familiar face recognition but also to our error-prone performance with unfamiliar faces. This limitation of the face system has important implications for consequential situations such as eyewitness identification and policing.

  8. Application of binocular vision system to face detection and tracking in service robot

    Science.gov (United States)

    Qian, Junfeng; Ma, Shiwei; Xu, Yulin; Li, Xin; Shen, Yujie

    2012-01-01

    A binocular vision system and its application to face detection and tracking in robot is introduced in this paper. With the vision system, the robot can do face detection, identification, recognition and tracking. The face area is detected in realtime by using AdaBoost algorithm. And a method is proposed with which a real face can be distinguished from a picture one by using skin color information and depth data. A specific face can be recognized by comparing the principal components of the current face to those of the known individuals in a face database built in advance. Finally, the robot can track a specified face according to depth of the face and position of a face rectangle in the frame. Experiment results are given and discussed.

  9. Challenges facing air management for fuel cell systems

    Energy Technology Data Exchange (ETDEWEB)

    Davis, P.B. [Department of Energy (United States); Sutton, R. [Argonne National Lab. (United States); Wagner, F.W. [Energetics Incorporated (United States)

    2000-07-01

    The U.S. Department of Energy (DOE) and the U.S. automotive industry are working cooperatively under the auspices of the Partnership for a New Generation of Vehicles (PNGV) to develop a six-passenger automobile that can achieve up to 80 mpg. while meeting customer needs and all safety and emission requirements. These partners are continuing to invest heavily in the research and development of polymer electrolyte membrane (PEM) fuel cells as a clean and efficient energy conversion system for the PNGV. A critical challenge facing fuel cell systems for the PNGV is the development of efficient, compact, cost-effective air management systems. The U.S. Department of Energy has been exploring several compressor/expander options for pressurized fuel cell systems, including scroll, toroidal intersecting vane, turbine, twin screw, and piston technologies. Each of these technologies has strengths and weaknesses regarding efficiency, pressure ratio over turndown, size and weight, and cost. This paper will present data from the U.S. Department of Energy's research and development efforts on air management systems and will discusses recent program developments resulting from an independent peer review evaluation. (author)

  10. RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS

    Directory of Open Access Journals (Sweden)

    Ming XING

    2016-04-01

    Full Text Available This article describes the development of DSP as the core of the face recognition system, on the basis of understanding the background, significance and current research situation at home and abroad of face recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face facial structure, facial expression feature extraction, classification and other issues during face recognition and have achieved research and development of DSP-based face recognition system for robotic rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing unit, with a strong processing performance, high flexibility and programmability.

  11. Application of Digital-based Biometric Feature Recognition Technology in Victim Search System%基于数字生物特征识别技术在罹难人员搜索系统的应用

    Institute of Scientific and Technical Information of China (English)

    王晓民; 苏加乐; 刘志强; 狳新萍; 王德文

    2011-01-01

    论述了国际维和部队和警察罹难人员搜索系统装备列装意义,利用生物特征识别技术设计了罹难人员的软硬件系统装备,分析了其在研制和列装中存在的若干问题,为尽快开展我国国际维和部队和警察罹难人员搜索系统装备的研制提供了整体方案.%It discusses the significance of equipment fielding in victim search system of international peacekeepingforces and polices, and with the help of biometric technology, it designs the soft hardware system of equipments ofvictim searching, analyzes the problems in manufacturing and fielding and provides integrated plan for the manufactureof victim search system for international peacekeeping forces and polices in China.

  12. Increasing face validity of a vascular interventional training system.

    Science.gov (United States)

    Winder, John; Zheng, Huiru; Hughes, Simon; Kelly, Barry; Wilson, Carol; Gallagher, Anthony

    2004-01-01

    Many aspects of medical training take place on real patients in a live environment thus incurring risk. Apart from the obvious risks to patients there is the issue of X-ray exposure to both staff and trainees. Image quality used during interventional procedures is low to ensure minimum X-ray radiation dose. A virtual interventional system may be used to simulate the interventional cardiology training environment therefore reducing overall risk. The purpose of this project was to determine the appropriate image quality settings on a virtual training system to accurately simulate interventional cardiology and increase the face validity of the overall system. Real image data was obtained from patients undergoing diagnostic interventional cardiology examinations in the Royal Victoria Hospital, Belfast. The images were obtained during catheter placement and contrast enhancement around the region of the heart. The diagnostic views were left anterior oblique, right anterior oblique, left lateral, caudal and the spider view. These five views were simulated on a virtual interventional training system (VIST, Mentice Medical Simulation AB, Sweden) by adjusting x-ray tube and table position at 20 different image quality settings. Signal to noise ratio and image contrast were measured for each of these views using soft tissue and vertebra. The results from the real image data and the VIST image data were compared. Calibration curves were compiled to determine the appropriate VIST image quality setting for each procedure. Average SNR ranged from 2.94 to 74.0 and IC ranged from 0.009 to 0.61 on the real image data. This indicates the very wide range of image quality encountered in interventional cardiology. Calibration curves for each view with the corresponding range of real patient image quality were produced. These calibration curves enabled the appropriate VIST image quality setting to be determined and therefore simulate the real examination image quality as closely as

  13. Bridging the gap: from biometrics to forensics

    Science.gov (United States)

    Jain, Anil K.; Ross, Arun

    2015-01-01

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. PMID:26101280

  14. Rotation, Scaling and Translation Analysis of Biometric Signature Templates

    CERN Document Server

    Chadha, Aman; Roja, M Mani

    2011-01-01

    Biometric authentication systems that make use of signature verification methods often render optimum performance only under limited and restricted conditions. Such methods utilize several training samples so as to achieve high accuracy. Moreover, several constraints are imposed on the end-user so that the system may work optimally, and as expected. For example, the user is made to sign within a small box, in order to limit their signature to a predefined set of dimensions, thus eliminating scaling. Moreover, the angular rotation with respect to the referenced signature that will be inadvertently introduced as human error, hampers performance of biometric signature verification systems. To eliminate this, traditionally, a user is asked to sign exactly on top of a reference line. In this paper, we propose a robust system that optimizes the signature obtained from the user for a large range of variation in Rotation-Scaling-Translation (RST) and resolves these error parameters in the user signature according to ...

  15. ADAPTIVE SYNTHESIS OF INTELLIGENT MEASUREMENT SYSTEMS WITH THE USE OF ASC-ANALYSIS AND "EIDOS" SYSTEM. SYSTEM IDENTIFICATION IN ECONOMETRICS, BIOMETRICS, ECOLOGY, PEDAGOGY, PSYCHOLOGY AND MEDICINE

    Directory of Open Access Journals (Sweden)

    Lutsenko Y. V.

    2016-02-01

    Full Text Available The article proposes using the automated system-cognitive analysis (ASC-analysis and its software tool, which is the system called "Eidos" for synthesis and application of adaptive intelligent measuring systems to measure values of parameters of objects, and for system state identification of complex multivariable nonlinear dynamic systems. The article briefly describes the mathematical method of ASC-analysis, implemented in the software tool – universal cognitive analytical system named "Eidos-X++". The mathematical method of ASC-analysis is based on system theory of information (STI which was created in the conditions of implementation of program ideas of generalizations of all the concepts of mathematics, in particularly, the information theory based on the set theory, through a total replacement of the concept of “many” with the more general concept of system and detailed tracking of all the consequences of this replacement. Due to the mathematical method, which is the basis of ASC-analysis, this method is nonparametric and allows you to process comparably tens and hundreds of thousands of gradations of factors and future conditions of the control object (class in incomplete (fragmented, noisy data numeric and non-numeric nature which are measured in different units of measurement. We provide a detailed numerical example of the application of ASC-analysis and the system of "Eidos-X++" as a synthesis of systemic-cognitive model, providing a multiparameter typization of the states of complex systems, and system identification of their states, as well as for making decisions about managing the impact of changing the composition of the control object to get its quality (level of consistency maximally increased at minimum cost. For a numerical example of a complex system we have selected the team of the company, and its component – employees and applicants (staff. However, it must be noted that this example should be considered even wider

  16. Miniature Biometric Sensor Project

    Science.gov (United States)

    Falker, John; Terrier, Douglas; Clayton, Ronald; Hanson, Andrea; Cooper, Tommy; Downs, Meghan; Flint, Stephanie; Reyna, Baraquiel; Simon, Cory; Wilt, Grier

    2015-01-01

    Heart rate monitoring (HRM) is a critical need during exploration missions. Unlike the four separate systems used on ISS today, the single HRM system should perform as a diagnostic tool, perform well during exercise or high level activity, and be suitable for use during EVA. Currently available HRM technologies are dependent on uninterrupted contact with the skin and are prone to data drop-out and motion artifact when worn in the spacesuit or during exercise. Here, we seek an alternative to the chest strap and electrode based sensors currently in use on ISS today. This project aims to develop a single, high performance, robust biosensor with focused efforts on improved heart rate data quality collection during high intensity activity such as exercise or EVA.

  17. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    Science.gov (United States)

    2012-12-01

    9.4 billion to airlines, $5.6 billion to hotels , $3.1 billion to restaurants, and $4.2 billion in federal, state and local tax revenues. A similar...spoof multiple biometric traits of a legitimately enrolled individual. 4. Multibiometric systems also effectively address the problem of noisy data...When the biometric signal acquired from a single trait is corrupted with noise, the availability of other (less noisy ) traits may aid in the reliable

  18. 75 FR 39323 - Amendment to the Biometric Visa Program

    Science.gov (United States)

    2010-07-08

    ... applicants beginning at age 7 and above under the program for issuance of biometric Border Crossing Cards... Amendment to the Biometric Visa Program AGENCY: Department of State. ACTION: Notice of Amendment to the Biometric Visa Program. This public notice announces an amendment to the Biometric Visa Program. Section...

  19. Age Estimation-Based Soft Biometrics Considering Optical Blurring Based on Symmetrical Sub-Blocks for MLBP

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2015-10-01

    Full Text Available Because of its many useful applications, human age estimation has been considered in many previous studies as a soft biometrics. However, most existing methods of age estimation require a clear and focused facial image as input in order to obtain a trustworthy estimation result; otherwise, the methods might produce increased estimation error when an image of poor quality is used as input. Image blurring is one of major factors that affect estimation accuracies because it can cause a face to appear younger (i.e., reduce the age feature in the face region. Therefore, we propose a new human age estimation method that is robust even with an image that has the optical blurring effect by using symmetrical focus mask and sub-blocks for multi-level local binary pattern (MLBP. Experiment results show that the proposed method can enhance age estimation accuracy compared with the conventional system, which does not consider the effects of blurring.

  20. Comparison of face Recognition Algorithms on Dummy Faces

    Directory of Open Access Journals (Sweden)

    Aruni Singh

    2012-09-01

    Full Text Available In the age of rising crime face recognition is enormously important in the contexts of computer vision, psychology, surveillance, fraud detection, pattern recognition, neural network, content based video processing, etc. Face is a non intrusive strong biometrics for identification and hence criminals always try to hide their facial organs by different artificial means such as plastic surgery, disguise and dummy. The availability of a comprehensive face database is crucial to test the performance of these face recognition algorithms. However, while existing publicly-available face databases contain face images with a wide variety of poses, illumination, gestures and face occlusions but there is no dummy face database is available in public domain. The contributions of this research paper are: i Preparation of dummy face database of 110 subjects ii Comparison of some texture based, feature based and holistic face recognition algorithms on that dummy face database, iii Critical analysis of these types of algorithms on dummy face database.

  1. Validation of keypad user identity using a novel biometric technique

    Science.gov (United States)

    Grabham, N. J.; White, N. M.

    2007-07-01

    This paper presents initial work on the development of a keypad incorporating sensors to enable the biometric identity validation of the person using the keypad. The technique reported here is covert and non-intrusive and in use, requires no additional actions on the part of the user. Test systems have been developed using commercially available keypads, modified with mass-produced force sensors to facilitate measurement of key-press dynamics. Measurements are accomplished using a DAQ module attached to a PC running custom software to extract the biometric data and perform the validation. The design of the test system and the results from initial trials are presented. For a system designed for a false rejection ratio of 0%, a false acceptance rate of around 15% can be achieved.

  2. Template aging in eye movement-driven biometrics

    Science.gov (United States)

    Komogortsev, Oleg V.; Holland, Corey D.; Karpov, Alex

    2014-05-01

    This paper presents a template aging study of eye movement biometrics, considering three distinct biometric techniques on multiple stimuli and eye tracking systems. Short-to-midterm aging effects are examined over two-weeks, on a highresolution eye tracking system, and seven-months, on a low-resolution eye tracking system. We find that, in all cases, aging effects are evident as early as two weeks after initial template collection, with an average 28% (±19%) increase in equal error rates and 34% (±12%) reduction in rank-1 identification rates. At seven months, we observe an average 18% (±8%) increase in equal error rates and 44% (±20%) reduction in rank-1 identification rates. The comparative results at two-weeks and seven-months suggests that there is little difference in aging effects between the two intervals; however, whether the rate of decay increases more drastically in the long-term remains to be seen.

  3. Application of Multimodal Biometric Authentication in Network Security%多生物特征识别在网络安全中的应用

    Institute of Scientific and Technical Information of China (English)

    李国建; 许杰

    2016-01-01

    多生物特征识别在网络安全中具有巨大的研究价值,能有效提高网络信息系统的安全性。通过介绍指纹、虹膜、面部识别、声音、掌纹、签名、击键识别等生物识别技术,在分析说明多生物特征识别不易丢失、安全性强、事后便于查询等优点的基础上,给出多生物特征识别在网络安全系统的密钥发布、密钥绑定以及身份认证中的具体应用方法,以期为提高信息网络的安全性提供新的思路。%Multimodal biometric authentication is of great research value in network security, and it can effectively improve the security of network information system. Based on introduction of fingerprint, iris, face recognition, voice, palmprint, signature, keying recognition and other biometric technologies, characters of multimodal biometric authentication are described and analyzed, such as not easy to lose, strong security, easy to inquiry, etc.. This article proposes a specific application of multi-modal biometric authentication in key distribution, key binding and identity authentication of network security system, and all this could provide a new idea for improving the security of information network.

  4. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations

    Science.gov (United States)

    2016-05-01

    Intelligence Activities Biometrics-Enabled Intelligence USCG Biometrics-at-Sea: Business Rules for...Biometrics in Support of Operations Biometrics-at-Sea: Business Rules for South Florida United States...South Florida, USCG Maritime Law Enforcement Manual Department of Defense Dictionary of Military and

  5. FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE EXPONENT ASSOCIATIVE MEMORY MODEL : A NOVEL APPROACH

    Directory of Open Access Journals (Sweden)

    P. E. S. N. Krishna Prasad

    2013-02-01

    Full Text Available Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns for encoding and then also for verification. Using this data we proposed a novel model for authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM. It provides different stages of security for biometrics patterns. In stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA, in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in terms of time and space.

  6. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  7. Development of visual systems for faces and objects: further evidence for prolonged development of the face system.

    Directory of Open Access Journals (Sweden)

    Bozana Meinhardt-Injac

    Full Text Available BACKGROUND: The development of face and object processing has attracted much attention; however, studies that directly compare processing of both visual categories across age are rare. In the present study, we compared the developmental trajectories of face and object processing in younger children (8-10 years, older children (11-13 years, adolescents (14-16 years, and adults (20-37. METHODOLOGY/PRINCIPAL FINDINGS: We used a congruency paradigm in which subjects compared the internal features of two stimuli, while the (unattended external features either agreed or disagreed independent of the identity of the internal features. We found a continuous increase in matching accuracy for faces and watches across childhood and adolescence, with different magnitudes for both visual categories. In watch perception, adult levels were reached at the age of 14-16, but not in face perception. The effect of context and inversion, as measures of holistic and configural processing, were clearly restricted to faces in all age groups. This finding suggests that different mechanisms are involved in face and object perception at any age tested. Moreover, the modulation of context and inversion effects by exposure duration was strongly age-dependent, with the strongest age-related differences found for brief timings below 140 ms. CONCLUSIONS/SIGNIFICANCE: The results of the present study suggest prolonged development of face-specific processing up to young adulthood. The improvement in face processing is qualitatively different from the improvement of general perceptual and cognitive ability.

  8. The Forgotten Tribe in ODL Systems: Challenges Faced by Visually ...

    African Journals Online (AJOL)

    ... Faced by Visually Impaired Students in Institutions of Higher Learning. ... CH Tichauya, CR Alexander, M Paul, D Emanuel ... Data was collected through student interviews and questionnaires for lecturers and thematically analysed.

  9. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    OpenAIRE

    Moses Okechukwu Onyesolu; Ignatius Majesty Ezeani

    2012-01-01

    The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's) for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric auth...

  10. Video based Parallel Face recognition using Gabor filter on homogeneous distributed systems

    DEFF Research Database (Denmark)

    Ali, Usman; Bilal, Muhammad

    This research aimed at building a fast video, parallel face recognition system based on the well known Gabor filtering approach. Face recognition is done after face detection in each frame of the video, individually. The master-slave technique is employed as the parallel computing model. Each frame...... is processed by different slave personal computers (PC) attached to the master, which acquire and distribute frames. It is believed that this approach can be used for practical face recognition applications with some further optimization...

  11. Gas discharge visualization: an imaging and modeling tool for medical biometrics.

    Science.gov (United States)

    Kostyuk, Nataliya; Cole, Phyadragren; Meghanathan, Natarajan; Isokpehi, Raphael D; Cohly, Hari H P

    2011-01-01

    The need for automated identification of a disease makes the issue of medical biometrics very current in our society. Not all biometric tools available provide real-time feedback. We introduce gas discharge visualization (GDV) technique as one of the biometric tools that have the potential to identify deviations from the normal functional state at early stages and in real time. GDV is a nonintrusive technique to capture the physiological and psychoemotional status of a person and the functional status of different organs and organ systems through the electrophotonic emissions of fingertips placed on the surface of an impulse analyzer. This paper first introduces biometrics and its different types and then specifically focuses on medical biometrics and the potential applications of GDV in medical biometrics. We also present our previous experience with GDV in the research regarding autism and the potential use of GDV in combination with computer science for the potential development of biological pattern/biomarker for different kinds of health abnormalities including cancer and mental diseases.

  12. The biometric antecedents to happiness

    Science.gov (United States)

    Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood. PMID:28915269

  13. Binary Biometric Representation through Pairwise Polar Quantization

    NARCIS (Netherlands)

    Chen, Chun; Veldhuis, Raymond; Tistarelli, M.; Nixon, M.

    2009-01-01

    Binary biometric representations have great significance for data compression and template protection. In this paper, we introduce pairwise polar quantization. Furthermore, aiming to optimize the discrimination between the genuine Hamming distance (GHD) and the imposter Hamming distance (IHD), we pr

  14. Biometric recognition via fixation density maps

    Science.gov (United States)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  15. Highly Secured Bio-Metric Authentication Model with Palm Print Identification

    Directory of Open Access Journals (Sweden)

    Dr. Raja Murali Prasad

    2016-04-01

    Full Text Available For securing personal identifications and highly secure identification problems, biometric technologies will provide higher security with improved accuracy. This has become an emerging technology in recent years due to the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs of finger print identification systems, here in this paper we proposed a palm print based personal identification system, which is a most promising and emerging research area in biometric identification systems due to its uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to implement a system with higher accuracy and increased speed in identifying the palm prints of several users. Here, in this we presented a highly secured palm print identification system with extraction of region of interest (ROI with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW transform to extract the low level features of registered palm prints to calculate its feature vectors (FV then after the comparison is done by measuring the distance between registered palm feature vector and testing palm print feature vector. Simulation results show that the proposed biometric identification system provides more accuracy and reliable recognition rate.

  16. Iris recognition as a biometric method after cataract surgery

    Directory of Open Access Journals (Sweden)

    Roizenblatt Jaime

    2004-01-01

    Full Text Available Abstract Background Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Methods Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. Results A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Conclusions Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.

  17. Biometrics IRB best practices and data protection

    Science.gov (United States)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  18. Crop Biometric Maps: The Key to Prediction

    Directory of Open Access Journals (Sweden)

    Francisco Rovira-Más

    2013-09-01

    Full Text Available The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  19. Ethical aspects of face recognition systems in public places.

    NARCIS (Netherlands)

    Brey, Philip A.E.

    2004-01-01

    This essay examines ethical aspects of the use of facial recognition technology for surveillance purposes in public and semipublic areas, focusing particularly on the balance between security and privacy and civil liberties. As a case study, the FaceIt facial recognition engine of Identix Corporatio

  20. Double face: Adjustable translucent system to improve thermal comfort

    NARCIS (Netherlands)

    Turrin, M.; Tenpierik, M.J.; De Ruiter, P.; Van der Spoel, W.H.; Chang Lara, C.; Heinzelmann, F.; Teuffel, P.; Van Bommel, W.

    2015-01-01

    The DoubleFace project aims at developing a new product that passively improves thermal comfort of indoor and semi-indoor spaces by means of lightweight materials for latent heat storage, while simultaneously allowing daylight to pass through as much as possible. Specifically, the project aims at

  1. Double face: Adjustable translucent system to improve thermal comfort

    NARCIS (Netherlands)

    Turrin, M.; Tenpierik, M.J.; De Ruiter, P.; Van der Spoel, W.H.; Chang Lara, C.; Heinzelmann, F.; Teuffel, P.; Van Bommel, W.

    2015-01-01

    The DoubleFace project aims at developing a new product that passively improves thermal comfort of indoor and semi-indoor spaces by means of lightweight materials for latent heat storage, while simultaneously allowing daylight to pass through as much as possible. Specifically, the project aims at de

  2. AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tran Cong Hung

    2016-11-01

    Full Text Available This paper is demonstrating to create a system of multifactor authentication based on biometric verification. Our system use iris for the first factor and fingerprint for the second factor. Once an attacker attempts to attack the system, there must have two factors. If one of them is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Furthermore, this system will be implemented to enhance security for accessing control login government system.

  3. Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features

    Directory of Open Access Journals (Sweden)

    Prathamesh Timse

    2014-04-01

    Full Text Available This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account.

  4. 2D Face Recognition System Based on Selected Gabor Filters and Linear Discriminant Analysis LDA

    OpenAIRE

    Hafez, Samir F.; Selim, Mazen M.; Hala H. Zayed

    2015-01-01

    We present a new approach for face recognition system. The method is based on 2D face image features using subset of non-correlated and Orthogonal Gabor Filters instead of using the whole Gabor Filter Bank, then compressing the output feature vector using Linear Discriminant Analysis (LDA). The face image has been enhanced using multi stage image processing technique to normalize it and compensate for illumination variation. Experimental results show that the proposed system is effective for ...

  5. Age Dependent Face Recognition using Eigenface

    OpenAIRE

    Hlaing Htake Khaung Tin

    2013-01-01

    Face recognition is the most successful form of human surveillance. Face recognition technology, is being used to improve human efficiency when recognition faces, is one of the fastest growing fields in the biometric industry. In the first stage, the age is classified into eleven categories which distinguish the person oldness in terms of age. In the second stage of the process is face recognition based on the predicted age. Age prediction has considerable potential applications in human comp...

  6. Skull Triangles: Flinders Petrie, Race Theory and Biometrics

    Directory of Open Access Journals (Sweden)

    Debbie Challis

    2016-02-01

    Full Text Available In 1902 the Egyptian archaeologist William Matthew Flinders Petrie published a graph of triangles indicating skull size, shape and ‘racial ability’. In the same year a paper on Naqada crania that had been excavated by Petrie’s team in 1894–5 was published in the anthropometric journal Biometrika, which played an important part in the methodology of cranial measuring in biometrics and helped establish Karl Pearson’s biometric laboratory at University College London. Cicely D. Fawcett’s and Alice Lee’s paper on the variation and correlation of the human skull used the Naqada crania to argue for a controlled system of measurement of skull size and shape to establish homogeneous racial groups, patterns of migration and evolutionary development. Their work was more cautious in tone and judgement than Petrie’s pronouncements on the racial origins of the early Egyptians but both the graph and the paper illustrated shared ideas about skull size, shape, statistical analysis and the ability and need to define ‘race’. This paper explores how Petrie shared his archaeological work with a broad number of people and disciplines, including statistics and biometrics, and the context for measuring and analysing skulls at the turn of the twentieth century.

  7. Digital holographic-based cancellable biometric for personal authentication

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-05-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%.

  8. BossPro: a biometrics-based obfuscation scheme for software protection

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  9. A multi-algorithm-based automatic person identification system

    Science.gov (United States)

    Monwar, Md. Maruf; Gavrilova, Marina

    2010-04-01

    Multimodal biometric is an emerging area of research that aims at increasing the reliability of biometric systems through utilizing more than one biometric in decision-making process. In this work, we develop a multi-algorithm based multimodal biometric system utilizing face and ear features and rank and decision fusion approach. We use multilayer perceptron network and fisherimage approaches for individual face and ear recognition. After face and ear recognition, we integrate the results of the two face matchers using rank level fusion approach. We experiment with highest rank method, Borda count method, logistic regression method and Markov chain method of rank level fusion approach. Due to the better recognition performance we employ Markov chain approach to combine face decisions. Similarly, we get combined ear decision. These two decisions are combined for final identification decision. We try with 'AND'/'OR' rule, majority voting rule and weighted majority voting rule of decision fusion approach. From the experiment results, we observed that weighted majority voting rule works better than any other decision fusion approaches and hence, we incorporate this fusion approach for the final identification decision. The final results indicate that using multi algorithm based can certainly improve the recognition performance of multibiometric systems.

  10. Ocular biometric changes after trabeculectomy

    Directory of Open Access Journals (Sweden)

    Azam Alvani

    2016-01-01

    Full Text Available This review article aimed to evaluate ocular biometric changes after trabeculectomy. The PubMed database was searched using the keywords “axial length” (AL, “anterior chamber depth” (ACD, “corneal astigmatism,” “corneal topography” and “trabeculectomy.” The extracted studies were categorized based on the evaluated parameters and the biometry method (contact and non-contact. Comparable studies with respect to their sample size were combined for statistical analysis. Twenty-five studies including 690 individuals which met the inclusion criteria were selected. After trabeculectomy, a significant and persistent AL reduction, with a range of 0.1-0.19 and 0.1-0.9 mm measured with contact and non-contact methods, respectively, was observed. With respect to topographic changes, 0.38-1.4 diopters (D with-the-rule (WTR astigmatism was induced postoperatively. All studies revealed ACD reduction immediately after surgery, which gradually deepened and approximated its preoperative levels on day 14. ACD reduction was not significant after that period in the majority of cases. In conclusion, changes in ACD is of small amount and of short period, thus it can be ignored; however, reported changes in AL and keratometry are of sufficient magnitude and can affect the refractive prediction of combined cataract surgery and trabeculectomy.

  11. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  12. Biometrics in support of special forces medical operations.

    Science.gov (United States)

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program.

  13. Corneal topography measurements for biometric applications

    Science.gov (United States)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  14. An Efficient Face Recognition System Based On the Hybridization of Pose Invariant and Illumination Process

    Directory of Open Access Journals (Sweden)

    S. Muruganantham

    2012-07-01

    Full Text Available In the previous decade, one of the most effectual applications of image analysis and indulgent that attracted significant consideration is the human face recognition. One of the diverse techniques used for identifying an individual is the Face recognition. Normally the image variations for the reason that of the change in face identity are less than the variations between the images of the same face under different illumination and viewing angle. Among several factors that manipulate face recognition, illumination and pose are the two major challenges. Pose and illumination variations harshly affect the performance of face recognition. Considerably less effort has been taken to deal with the problem of mutual variations of pose and illumination in face recognition, while several algorithms have been proposed for face recognition from fixed points. In this paper we intend a face recognition method that is forceful to pose and illumination variations. We first put forward a simple pose estimation method based on 2D images, which uses a proper classification rule and image representation to classify a pose of a face image. After that, the image can be assigned to a pose class by a classification rule in a low-dimensional subspace constructed by a feature extraction method. We offer a shadow compensation method that compensates for illumination variation in a face image so that the image can be predictable by a face recognition system designed for images under normal illumination condition. Starting the accomplishment result, it is obvious that our projected technique based on the hybridization system recognizes the face images effectively.

  15. Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach.

    Science.gov (United States)

    Tan, Robin; Perkowski, Marek

    2017-02-20

    Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that consists of a two-stage classifier combining random forest and wavelet distance measure through a probabilistic threshold schema, to improve the effectiveness and robustness of a biometric recognition system using ECG data acquired from a biosensor integrated into mobile devices. The proposed algorithm is evaluated using a mixed dataset from 184 subjects under different health conditions. The proposed two-stage classifier achieves a total of 99.52% subject verification accuracy, better than the 98.33% accuracy from random forest alone and 96.31% accuracy from wavelet distance measure algorithm alone. These results demonstrate the superiority of the proposed algorithm for biometric identification, hence supporting its practicality in areas such as cloud data security, cyber-security or remote healthcare systems.

  16. Biometrics in forensic science: challenges, lessons and new technologies

    NARCIS (Netherlands)

    Tistarelli, Massimo; Grosso, Enrico; Meuwly, Didier

    2014-01-01

    Biometrics has historically found its natural mate in Forensics. The first applications found in the literature and over cited so many times, are related to biometric measurements for the identification of multiple offenders from some of their biometric and anthropometric characteristics (tenprint c

  17. Biometrics in Forensic Science: Challenges, Lessons and New Technologies

    NARCIS (Netherlands)

    Tistarelli, Massimo; Grosso, Enrico; Meuwly, Didier

    2014-01-01

    Biometrics has historically found its natural mate in Forensics. The first applications found in the literature and over cited so many times, are related to biometric measurements for the identification of multiple offenders from some of their biometric and anthropometric characteristics (tenprint

  18. Image preprocessing study on KPCA-based face recognition

    Science.gov (United States)

    Li, Xuan; Li, Dehua

    2015-12-01

    Face recognition as an important biometric identification method, with its friendly, natural, convenient advantages, has obtained more and more attention. This paper intends to research a face recognition system including face detection, feature extraction and face recognition, mainly through researching on related theory and the key technology of various preprocessing methods in face detection process, using KPCA method, focuses on the different recognition results in different preprocessing methods. In this paper, we choose YCbCr color space for skin segmentation and choose integral projection for face location. We use erosion and dilation of the opening and closing operation and illumination compensation method to preprocess face images, and then use the face recognition method based on kernel principal component analysis method for analysis and research, and the experiments were carried out using the typical face database. The algorithms experiment on MATLAB platform. Experimental results show that integration of the kernel method based on PCA algorithm under certain conditions make the extracted features represent the original image information better for using nonlinear feature extraction method, which can obtain higher recognition rate. In the image preprocessing stage, we found that images under various operations may appear different results, so as to obtain different recognition rate in recognition stage. At the same time, in the process of the kernel principal component analysis, the value of the power of the polynomial function can affect the recognition result.

  19. Face Recognition Methods Based on Feedforward Neural Networks, Principal Component Analysis and Self-Organizing Map

    Directory of Open Access Journals (Sweden)

    J. Pavlovicova

    2007-04-01

    Full Text Available In this contribution, human face as biometric is considered. Original method of feature extraction from image data is introduced using MLP (multilayer perceptron and PCA (principal component analysis. This method is used in human face recognition system and results are compared to face recognition system using PCA directly, to a system with direct classification of input images by MLP and RBF (radial basis function networks, and to a system using MLP as a feature extractor and MLP and RBF networks in the role of classifier. Also a two-stage method for face recognition is presented, in which Kohonen self-organizing map is used as a feature extractor. MLP and RBF network are used as classifiers. In order to obtain deeper insight into presented methods, also visualizations of internal representation of input data obtained by neural networks are presented.

  20. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.