WorldWideScience

Sample records for hand based biometrics

  1. Hand-Based Biometric Analysis

    Science.gov (United States)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  2. Hand Grasping Synergies As Biometrics

    Directory of Open Access Journals (Sweden)

    Ramana Vinjamuri

    2017-05-01

    Full Text Available Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements. Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic. Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies—postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  3. Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric systems are automatic tools used to provide authentication during various applications of modern computing. In this work, three different design frameworks for multimodal biometric systems based on fingerprint and hand geometry modalities are proposed. An analysis is also presented to diagnose various types of template security issues in the proposed system. Fuzzy analytic hierarchy process (FAHP is applied with five decision parameters on all the designs and framework 1 is found to be better in terms of template data security, templates fusion and computational efficiency. It is noticed that template data security before storage in database is a challenging task. An important observation is that a template may be secured at feature fusion level and an indexing technique may be used to improve the size of secured templates.

  4. Unconstrained and Contactless Hand Geometry Biometrics

    Directory of Open Access Journals (Sweden)

    Carmen Sánchez-Ávila

    2011-10-01

    Full Text Available This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM and k-Nearest Neighbour (k-NN. Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  5. Automatic Access Control Based on Face and Hand Biometrics in A Non-Cooperative Context

    DEFF Research Database (Denmark)

    Jahromi, Mohammad Naser Sabet; Bonderup, Morten Bojesen; Nasrollahi, Kamal

    2018-01-01

    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system...

  6. Visible, near infrared and thermal hand-based image biometric recognition

    OpenAIRE

    Font Aragonès, Xavier

    2013-01-01

    Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It is a fundamental key issue in any process concerned with security, shared resources, network transactions among many others. Arises as a fundamental problem widely known as recognition, and becomes a must step before permission is granted. It is supposed that protects key reso...

  7. Biometric Authentication Using Infrared Imaging of Hand Vein Patterns

    Science.gov (United States)

    Bhattacharyya, Debnath; Shrotri, A.; Rethrekar, S. C.; Patil, M. H.; Alisherov, Farkhod A.; Kim, Tai-Hoon

    Hand vein patterns are unique and universal. Vein pattern is used as biometric feature in recent years. But, it is not very much popular biometric system as compared to other systems like fingerprint, iris etc, because of the higher cost. For conventional algorithm, it is necessary to use high quality images, which demand high-priced collection devices. There are two approaches for vein authentication, these are hand dorsa and hand ventral. Currently we are working on hand dorsa vein patterns. Here we are putting forward the new approach for low cost hand dorsa vein pattern acquisition using low cost device and proposing a algorithm to extract features from these low quality images.

  8. Gaussian Multiscale Aggregation Applied to Segmentation in Hand Biometrics

    Directory of Open Access Journals (Sweden)

    Gonzalo Bailador del Pozo

    2011-11-01

    Full Text Available This paper presents an image segmentation algorithm based on Gaussian multiscale aggregation oriented to hand biometric applications. The method is able to isolate the hand from a wide variety of background textures such as carpets, fabric, glass, grass, soil or stones. The evaluation was carried out by using a publicly available synthetic database with 408,000 hand images in different backgrounds, comparing the performance in terms of accuracy and computational cost to two competitive segmentation methods existing in literature, namely Lossy Data Compression (LDC and Normalized Cuts (NCuts. The results highlight that the proposed method outperforms current competitive segmentation methods with regard to computational cost, time performance, accuracy and memory usage.

  9. Biometric Image Recognition Based on Optical Correlator

    Directory of Open Access Journals (Sweden)

    David Solus

    2017-01-01

    Full Text Available The aim of this paper is to design a biometric images recognition system able to recognize biometric images-eye and DNA marker. The input scenes are processed by user-friendly software created in C# programming language and then are compared with reference images stored in database. In this system, Cambridge optical correlator is used as an image comparator based on similarity of images in the recognition phase.

  10. Real-time Identification System using Mobile Hand-held Devices: Mobile Biometrics Evaluation Framework

    Science.gov (United States)

    2014-04-01

    operation Real-time searches against large databases (e.g. 10m irises ) are possible with modest CPU loads Acquisition of iris image requires more...reliance on proprietary data formats – is a non-issue in most modern iris recognition systems. 3.1.4 Multiple biometrics Multiple biometric solutions...and civil use, allowing for use in face, finger, and iris deployments. Although a handful of vendors are capable of implementing multiple biometric

  11. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  12. Sensor-fusion-based biometric identity verification

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W. [Sandia National Labs., Albuquerque, NM (United States); Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L. [New Mexico State Univ., Las Cruces, NM (United States). Electronic Vision Research Lab.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person`s identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm.

  13. Generic Constructions of Biometric Identity Based Encryption Systems

    OpenAIRE

    Sarier, Neyire Deniz

    2010-01-01

    International audience; In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Considering these notions, we present generic constructions for biometric IBE and ID-...

  14. ECG based biometrics verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Biometric based authentication systems provide solutions to the problems in high security which remain with conventionalsecurity systems. In a biometric verification system, human’s biological parameters (such as voice, finger print,palm print or hand geometry, face, iris etc. are used to verify the authenticity of a person. These parameters are good to beused as biometric parameters but do not provide the guarantee that the person is present and alive. As voice can be copied,finger print can be picked from glass on synthetic skin and in face recognition system due to genetic factors identical twinsor father-son may have the same facial appearance. ECG does not have these problems. It can not be recorded without theknowledge of the person and ECG of every person is unique even identical twins have different ECG. In this paper an ECGbasedbiometrics verification system which was developed using Laboratory Virtual Instruments Engineering Workbench(LabVIEW version 7.1 is discussed. Experiments were conducted on the database stored in the laboratory of 20 individualshaving 10 samples each and the results revealed a false rejection rate (FRR of 3% and false acceptance rate (FAR of 3.21%.

  15. Computer Based Behavioral Biometric Authentication via Multi-Modal Fusion

    Science.gov (United States)

    2013-03-01

    Bhattacharyya, et al. [25], found that the iris scanner, with an Equal Error Rate (EER) of 0.01% performed the best. 1.2 Behavioral Biometrics Behavioral...include voice and facial recognition; fingerprint, voice, and iris ; and iris and retinal features [33]. 2.7.1 Fusion Methods. Fusion of biometric ...COMPUTER BASED BEHAVIORAL BIOMETRIC AUTHENTICATION VIA MULTI-MODAL FUSION THESIS Kyle O. Bailey, Second Lieutenant, USAF AFIT-ENG-13-M-04 DEPARTMENT

  16. A Study on EMG-based Biometrics

    Directory of Open Access Journals (Sweden)

    Jin Su Kim

    2017-05-01

    Full Text Available Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG, electromyogram (EMG, and electroencephalogram (EEG. Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-based biometrics and implement a motion recognition and personal identification system. The system extracted features using non-uniform filter bank and Waveform Length (WL, and reduces the dimension using Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA. Afterward, it classified the features using Euclidean Distance (ED, Support Vector Machine (SVM and K Nearest Neighbors (KNN. As a result of the motion recognition experiment, 95% of acquired EMG data and 84.66% of UCI data were obtained and as a result of the personal recognition experiment, 85% of acquired EMG data and 88.66% of UCI data were obtained.

  17. Retinal Verification Using a Feature Points-Based Biometric Pattern

    Directory of Open Access Journals (Sweden)

    M. Ortega

    2009-01-01

    Full Text Available Biometrics refer to identity verification of individuals based on some physiologic or behavioural characteristics. The typical authentication process of a person consists in extracting a biometric pattern of him/her and matching it with the stored pattern for the authorised user obtaining a similarity value between patterns. In this work an efficient method for persons authentication is showed. The biometric pattern of the system is a set of feature points representing landmarks in the retinal vessel tree. The pattern extraction and matching is described. Also, a deep analysis of similarity metrics performance is presented for the biometric system. A database with samples of retina images from users on different moments of time is used, thus simulating a hard and real environment of verification. Even in this scenario, the system allows to establish a wide confidence band for the metric threshold where no errors are obtained for training and test sets.

  18. A cancelable biometric scheme based on multi-lead ECGs.

    Science.gov (United States)

    Peng-Tzu Chen; Shun-Chi Wu; Jui-Hsuan Hsieh

    2017-07-01

    Biometric technologies offer great advantages over other recognition methods, but there are concerns that they may compromise the privacy of individuals. In this paper, an electrocardiogram (ECG)-based cancelable biometric scheme is proposed to relieve such concerns. In this scheme, distinct biometric templates for a given beat bundle are constructed via "subspace collapsing." To determine the identity of any unknown beat bundle, the multiple signal classification (MUSIC) algorithm, incorporating a "suppression and poll" strategy, is adopted. Unlike the existing cancelable biometric schemes, knowledge of the distortion transform is not required for recognition. Experiments with real ECGs from 285 subjects are presented to illustrate the efficacy of the proposed scheme. The best recognition rate of 97.58 % was achieved under the test condition Ntrain = 10 and Ntest = 10.

  19. BIOMETRIC ACCESS CONTROL SYSTEMS BASED ON FINGERPRINTS

    Directory of Open Access Journals (Sweden)

    V. V. Starovoitov

    2015-01-01

    Full Text Available Features of biometric access control system design for control people's access to certain facilitiesare described. Basic algorithms for fingerprint processing and analysis are given in details. Construction schemes of three variants of an access control system are presented.

  20. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  1. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... of a mobile biometric authentication system based on electroencephalogram (EEG) recordings in combination with already proven technologies such as facial detection and near-field communication (NFC). The overall goal of this work is to fill the gap between mobile web technologies and wireless EEG devices...

  2. BioTwist : overcoming severe distortions in ridge-based biometrics for succesful identification

    NARCIS (Netherlands)

    Kotzerke, J.

    2016-01-01

    This thesis focuses on ridge-based and highly distorted biometrics, the different chal-lenges involved in a verification of identity scenario, and how to overcome them. More specifically, we work on ridge-based biometrics in two different contexts: (i) newborn and infant biometrics and (ii) quality

  3. Biometric features and privacy : condemned, based upon your finger print

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Veldhuis, Raymond N.J.

    What information is available in biometric features besides that needed for the biometric recognition process? What if a biometric feature contains Personally Identifiable Information? Will the whole biometric system become a threat to privacy? This paper is an attempt to quantifiy the link between

  4. An Observed Voting System Based On Biometric Technique

    Directory of Open Access Journals (Sweden)

    B. Devikiruba

    2015-08-01

    Full Text Available ABSTRACT This article describes a computational framework which can run almost on every computer connected to an IP based network to study biometric techniques. This paper discusses with a system protecting confidential information puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is becoming a competitor for current identification mechanisms. The experimentation section focuses on biometric verification specifically based on fingerprints. This article should be read as a warning to those thinking of using methods of identification without first examine the technical opportunities for compromising mechanisms and the associated legal consequences. The development is based on the java language that easily improves software packages that is useful to test new control techniques.

  5. Fusion of hand vein, iris and fingerprint for person identity verification based on Bayesian theory

    Science.gov (United States)

    Li, Xiuyan; Liu, Tiegen; Deng, Shichao; Wang, Yunxin

    2009-11-01

    Biometric identification is an important guarantee for social security. In recent years, as the development of social and economic, the more accuracy and safety of identification are required. The person identity verification systems that use a single biometric appear inherent limitations in accuracy, user acceptance, universality. Limitations of unimodal biometric systems can be overcome by using multimodal biometric systems, which combines the conclusions made by a number of unrelated biometrics indicators. Aiming at the limitations of unimodal biometric identification, a recognition algorithm for multimodal biometric fusion based on hand vein, iris and fingerprint was proposed. To verify person identity, the hand vein images, iris images and fingerprint images were preprocessed firstly. The region of interest (ROI) of hand vein image was obtained and filtered to reduce image noises. The multiresolution analysis theory was utilized to extract the texture information of hand vein. The iris image was preprocessed through iris localization, eyelid detection, image normalization and image enhancement, and then the feature code of iris was extracted from the detail images obtained using wavelet transform. The texture feature information represented fingerprint pattern was extracted after filtering and image enhancement. The Bayesian theorem was employed to realize the fusion at the matching score level and the fusion recognition result was finally obtained. The experimental results were presented, which showed that the recognition performance of the proposed fusion method was obviously higher than that of single biometric recognition algorithm. It had verified the efficiency of the proposed method for biometrics.

  6. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  7. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  8. Update Strategies for HMM-Based Dynamic Signature Biometric Systems

    OpenAIRE

    Tolosana Moranchel, Ruben; Vera-Rodríguez, Rubén; Ortega-García, Javier,; Fiérrez, Julián

    2015-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. [R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia and J. Fierrez, "Update strategies for HMM-based dynamic signature biometric...

  9. Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones

    OpenAIRE

    Nickel, Claudia

    2012-01-01

    The authentication via accelerometer-based biometric gait recognition offers a user-friendly alternative to common authentication methods on smartphones. It has the great advantage that the authentication can be performed without user interaction. When the user is walking, his walk-pattern can be extracted from the accelerations measured using the integrated sensors of the smartphone. This pattern can be used for authentication. A study showed that users often deactivate the authenticati...

  10. Performance Evaluation of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Juan J. Villacorta

    2011-10-01

    Full Text Available An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side. Two Uniform Linear Arrays (ULA with 15 l/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR/False Non-Match Rate (FNMR parameters and the Receiver Operating Characteristic (ROC curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications.

  11. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

    OpenAIRE

    Jin, Zhe; Lai, Yen-Lung; Hwang, Jung-Yeon; Kim, Soohyung; Teoh, Andrew Beng Jin

    2017-01-01

    In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code. We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. The disc...

  12. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  13. Elastic Face, An Anatomy-Based Biometrics Beyond Visible Cue

    Energy Technology Data Exchange (ETDEWEB)

    Tsap, L V; Zhang, Y; Kundu, S J; Goldgof, D B; Sarkar, S

    2004-03-29

    This paper describes a face recognition method that is designed based on the consideration of anatomical and biomechanical characteristics of facial tissues. Elastic strain pattern inferred from face expression can reveal an individual's biometric signature associated with the underlying anatomical structure, and thus has the potential for face recognition. A method based on the continuum mechanics in finite element formulation is employed to compute the strain pattern. Experiments show very promising results. The proposed method is quite different from other face recognition methods and both its advantages and limitations, as well as future research for improvement are discussed.

  14. Security of a biometric identity-based encryption scheme

    OpenAIRE

    Tian, Miaomiao; Yang, Wei; Huang, Liusheng

    2011-01-01

    Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w' can be decrypted using a secret key corresponding to the identity w which is close to w' as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext attack (CCA2) in the random oracle model. Unfortunately, in this paper, we will show that their Bio-I...

  15. Study of Biometric Identification Method Based on Naked Footprint

    Directory of Open Access Journals (Sweden)

    Raji Rafiu King

    2013-10-01

    Full Text Available The scale of deployment of biometric identity-verification systems has recently seen an enormous increase owing to the need for more secure and reliable way of identifying people. Footprint identification which can be defined as the measurement of footprint features for recognizing the identity of a user has surfaced recently. This study is based on a biometric personal identification method using static footprint features viz. friction ridge / texture and foot shape / silhouette. To begin with, naked footprints of users are captured; images then undergo pre processing followed by the extraction of two features; shape using Gradient Vector Flow (GVF) snake model and minutiae extraction respectively. Matching is then effected based on these two features followed by a fusion of these two results for either a reject or accept decision. Our shape matching feature is based on cosine similarity while the texture one is based on miniature score matching. The results from our research establish that the naked footprint is a credible biometric feature as two barefoot impressions of an individual match perfectly while that of two different persons shows a great deal of dissimilarity. Normal 0 false false false IN X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Doi: 10.12777/ijse.5.2.29-35 How to cite this article: King

  16. Challenges at different stages of an iris based biometric system

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2012-04-01

    Full Text Available Iris recognition has been used for authentication for the past few years and is capable of positive/negative authenticationof an individual without any physical contact or intervention. This technique is being used mainly because of its uniqueness,stability, and reliability but still many challenges are being faced an the iris based recognition system. This paperpresents the difficulties faced in different modules, like the sensor module, preprocessing module, feature extraction module,and matching module of an iris biometric system.

  17. Unveiling the Biometric Potential of Finger-Based ECG Signals

    Science.gov (United States)

    Lourenço, André; Silva, Hugo; Fred, Ana

    2011-01-01

    The ECG signal has been shown to contain relevant information for human identification. Even though results validate the potential of these signals, data acquisition methods and apparatus explored so far compromise user acceptability, requiring the acquisition of ECG at the chest. In this paper, we propose a finger-based ECG biometric system, that uses signals collected at the fingers, through a minimally intrusive 1-lead ECG setup recurring to Ag/AgCl electrodes without gel as interface with the skin. The collected signal is significantly more noisy than the ECG acquired at the chest, motivating the application of feature extraction and signal processing techniques to the problem. Time domain ECG signal processing is performed, which comprises the usual steps of filtering, peak detection, heartbeat waveform segmentation, and amplitude normalization, plus an additional step of time normalization. Through a simple minimum distance criterion between the test patterns and the enrollment database, results have revealed this to be a promising technique for biometric applications. PMID:21837235

  18. Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    We use grip pattern based biometrics as a location limited channel to achieve pre-authentication in a protocol that sets up a secure cannel between two handheld devices. The protocol efficiently calculates a shared secret key from biometric data using quantization and cryptanalysis. The protocol is

  19. Performance and Security Evaluation of Biometric-Based Web ...

    African Journals Online (AJOL)

    Biometric recognition is the use of individual biometric physical or behavioural characteristics such as iris, retina, and fingerprint to uniquely identify the person. This technology offers a reliable and convenient solution to the problem of personal recognition. Fingerprint identification and verification system is the most widely ...

  20. Multimodal biometric authentication based on score level fusion using support vector machine

    Science.gov (United States)

    Wang, F.; Han, J.

    2009-03-01

    Fusion of multiple biometrics for human authentication performance improvement has received considerable attention. This paper presents a novel multimodal biometric authentication method integrating face and iris based on score level fusion. For score level fusion, support vector machine (SVM) based fusion rule is applied to combine two matching scores, respectively from Laplacianface based face verifier and phase information based iris verifier, to generate a single scalar score which is used to make the final decision. Experimental results show that the performance of the proposed method can bring obvious improvement comparing to the unimodal biometric identification methods and the previous fused face-iris methods.

  1. A MEMS-based, wireless, biometric-like security system

    Science.gov (United States)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  2. HBS: a novel biometric feature based on heartbeat morphology.

    Science.gov (United States)

    Islam, Md Saiful; Alajlan, Naif; Bazi, Yakoub; Hichri, Haikel S

    2012-05-01

    In this paper, a new feature named heartbeat shape (HBS) is proposed for ECG-based biometrics. HBS is computed from the morphology of segmented heartbeats. Computation of the feature involves three basic steps: 1) resampling and normalization of a heartbeat; 2) reduction of matching error; and 3) shift invariant transformation. In order to construct both gallery and probe templates, a few consecutive heartbeats which could be captured in a reasonably short period of time are required. Thus, the identification and verification methods become efficient. We have tested the proposed feature independently on two publicly available databases with 76 and 26 subjects, respectively, for identification and verification. The second database contains several subjects having clinically proven cardiac irregularities (atrial premature contraction arrhythmia). Experiments on these two databases yielded high identification accuracy (98% and 99.85%, respectively) and low verification equal error rate (1.88% and 0.38%, respectively). These results were obtained by using templates constructed from five consecutive heartbeats only. This feature compresses the original ECG signal significantly to be useful for efficient communication and access of information in telecardiology scenarios.

  3. Complementarity of flux- and biometric-based data to constrain parameters in a terrestrial carbon model

    Directory of Open Access Journals (Sweden)

    Zhenggang Du

    2015-03-01

    Full Text Available To improve models for accurate projections, data assimilation, an emerging statistical approach to combine models with data, have recently been developed to probe initial conditions, parameters, data content, response functions and model uncertainties. Quantifying how many information contents are contained in different data streams is essential to predict future states of ecosystems and the climate. This study uses a data assimilation approach to examine the information contents contained in flux- and biometric-based data to constrain parameters in a terrestrial carbon (C model, which includes canopy photosynthesis and vegetation–soil C transfer submodels. Three assimilation experiments were constructed with either net ecosystem exchange (NEE data only or biometric data only [including foliage and woody biomass, litterfall, soil organic C (SOC and soil respiration], or both NEE and biometric data to constrain model parameters by a probabilistic inversion application. The results showed that NEE data mainly constrained parameters associated with gross primary production (GPP and ecosystem respiration (RE but were almost invalid for C transfer coefficients, while biometric data were more effective in constraining C transfer coefficients than other parameters. NEE and biometric data constrained about 26% (6 and 30% (7 of a total of 23 parameters, respectively, but their combined application constrained about 61% (14 of all parameters. The complementarity of NEE and biometric data was obvious in constraining most of parameters. The poor constraint by only NEE or biometric data was probably attributable to either the lack of long-term C dynamic data or errors from measurements. Overall, our results suggest that flux- and biometric-based data, containing different processes in ecosystem C dynamics, have different capacities to constrain parameters related to photosynthesis and C transfer coefficients, respectively. Multiple data sources could also

  4. Performance and Security Evaluation of Biometric-Based Web ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... Fingerprint biometric was chosen for this project because of its level of accuracy and global acceptability ... over the web and report can be generated anywhere, provided there is internet connection. Mishra ... payment or write on it, if stolen by bad person, the person can use the card to carry out transaction ...

  5. Cryptographically secure biometrics

    Science.gov (United States)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  6. Optimization of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Alberto Izquierdo Fuente

    2014-01-01

    Full Text Available On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced.

  7. Optimization of a Biometric System Based on Acoustic Images

    Science.gov (United States)

    Izquierdo Fuente, Alberto; Del Val Puente, Lara; Villacorta Calvo, Juan J.; Raboso Mateos, Mariano

    2014-01-01

    On the basis of an acoustic biometric system that captures 16 acoustic images of a person for 4 frequencies and 4 positions, a study was carried out to improve the performance of the system. On a first stage, an analysis to determine which images provide more information to the system was carried out showing that a set of 12 images allows the system to obtain results that are equivalent to using all of the 16 images. Finally, optimization techniques were used to obtain the set of weights associated with each acoustic image that maximizes the performance of the biometric system. These results improve significantly the performance of the preliminary system, while reducing the time of acquisition and computational burden, since the number of acoustic images was reduced. PMID:24616643

  8. Acoustic Biometric System Based on Preprocessing Techniques and Linear Support Vector Machines

    Directory of Open Access Journals (Sweden)

    Lara del Val

    2015-06-01

    Full Text Available Drawing on the results of an acoustic biometric system based on a MSE classifier, a new biometric system has been implemented. This new system preprocesses acoustic images, extracts several parameters and finally classifies them, based on Support Vector Machine (SVM. The preprocessing techniques used are spatial filtering, segmentation—based on a Gaussian Mixture Model (GMM to separate the person from the background, masking—to reduce the dimensions of images—and binarization—to reduce the size of each image. An analysis of classification error and a study of the sensitivity of the error versus the computational burden of each implemented algorithm are presented. This allows the selection of the most relevant algorithms, according to the benefits required by the system. A significant improvement of the biometric system has been achieved by reducing the classification error, the computational burden and the storage requirements.

  9. Gaze Estimation for Off-Angle Iris Recognition Based on the Biometric Eye Model

    Energy Technology Data Exchange (ETDEWEB)

    Karakaya, Mahmut [ORNL; Barstow, Del R [ORNL; Santos-Villalobos, Hector J [ORNL; Thompson, Joseph W [ORNL; Bolme, David S [ORNL; Boehnen, Chris Bensing [ORNL

    2013-01-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ANONYMIZED biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  10. Gaze estimation for off-angle iris recognition based on the biometric eye model

    Science.gov (United States)

    Karakaya, Mahmut; Barstow, Del; Santos-Villalobos, Hector; Thompson, Joseph; Bolme, David; Boehnen, Christopher

    2013-05-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ORNL biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  11. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  12. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Directory of Open Access Journals (Sweden)

    Chengqi Wang

    Full Text Available With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  13. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  14. SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2016-10-01

    Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.

  15. BossPro: a biometrics-based obfuscation scheme for software protection

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  16. New biometric modalities using internal physical characteristics

    Science.gov (United States)

    Mortenson, Juliana (Brooks)

    2010-04-01

    Biometrics is described as the science of identifying people based on physical characteristics such as their fingerprints, facial features, hand geometry, iris patterns, palm prints, or speech recognition. Notably, all of these physical characteristics are visible or detectable from the exterior of the body. These external characteristics can be lifted, photographed, copied or recorded for unauthorized access to a biometric system. Individual humans are unique internally, however, just as they are unique externally. New biometric modalities have been developed which identify people based on their unique internal characteristics. For example, "BoneprintsTM" use acoustic fields to scan the unique bone density pattern of a thumb pressed on a small acoustic sensor. Thanks to advances in piezoelectric materials the acoustic sensor can be placed in virtually any device such as a steering wheel, door handle, or keyboard. Similarly, "Imp-PrintsTM" measure the electrical impedance patterns of a hand to identify or verify a person's identity. Small impedance sensors can be easily embedded in devices such as smart cards, handles, or wall mounts. These internal biometric modalities rely on physical characteristics which are not visible or photographable, providing an added level of security. In addition, both the acoustic and impedance methods can be combined with physiologic measurements such as acoustic Doppler or impedance plethysmography, respectively. Added verification that the biometric pattern came from a living person can be obtained. These new biometric modalities have the potential to allay user concerns over protection of privacy, while providing a higher level of security.*

  17. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  18. An EEG-Based Biometric System Using Eigenvector Centrality in Resting State Brain Networks

    NARCIS (Netherlands)

    Fraschini, M.; Hillebrand, A.; Demuru, M.; Didaci, L.; Marcialis, G.L.

    2015-01-01

    Recently, there has been a growing interest in the use of brain activity for biometric systems. However, so far these studies have focused mainly on basic features of the Electroencephalography. In this study we propose an approach based on phase synchronization, to investigate personal distinctive

  19. Multimodal Biometric System Based on the Recognition of Face and Both Irises

    Directory of Open Access Journals (Sweden)

    Yeong Gon Kim

    2012-09-01

    Full Text Available The performance of unimodal biometric systems (based on a single modality such as face or fingerprint has to contend with various problems, such as illumination variation, skin condition and environmental conditions, and device variations. Therefore, multimodal biometric systems have been used to overcome the limitations of unimodal biometrics and provide high accuracy recognition. In this paper, we propose a new multimodal biometric system based on score level fusion of face and both irises' recognition. Our study has the following novel features. First, the device proposed acquires images of the face and both irises simultaneously. The proposed device consists of a face camera, two iris cameras, near-infrared illuminators and cold mirrors. Second, fast and accurate iris detection is based on two circular edge detections, which are accomplished in the iris image on the basis of the size of the iris detected in the face image. Third, the combined accuracy is enhanced by combining each score for the face and both irises using a support vector machine. The experimental results show that the equal error rate for the proposed method is 0.131%, which is lower than that of face or iris recognition and other fusion methods.

  20. Biometrics Theory, Methods, and Applications

    CERN Document Server

    Boulgouris, N V; Micheli-Tzanakou, Evangelia

    2009-01-01

    An in-depth examination of the cutting edge of biometrics. This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:. Multilinear discriminant analysis for biometric signal recognition;. Biometric identity authentication techniques based on neural networks;. Multimodal biometrics and design of classifiers for biometric fusion;. Feature selection and facial aging modeling for face recognition;. Geometrical and

  1. IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION

    OpenAIRE

    Dr M V Bramhananda Reddy; Dr V Goutham

    2018-01-01

    Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using ...

  2. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  3. Remote secure proof of identity using biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Sengupta, S. K.; Pearson, P.; Strait, R.S.

    1997-06-10

    Biometric measurements derived from finger- or voiceprints, hand geometry, retinal vessel pattern and iris texture characteristics etc. can be identifiers of individuals. In each case, the measurements can be coded into a statistically unique bit-string for each individual. While in electronic commerce and other electronic transactions the proof of identity of an individual is provided by the use of either public key cryptography or biometric data, more secure applications can be achieved by employing both. However the former requires the use of exact bit patterns. An error correction procedure allows us to successfully combine the use of both to provide a general procedure for remote secure proof of identity using a generic biometric device. One such procedure has been demonstrated using a device based on hand geometry.

  4. Multi-bits biometric string generation based on the likelyhood ratio

    NARCIS (Netherlands)

    Chen, C.; Veldhuis, Raymond N.J.; Kevenaar, T.A.M.; Akkermans, A.H.M.; Bowyer, K.W.; Flynn, P.J.; Govindaraju, V.; Ratha, N.

    2007-01-01

    Preserving the privacy of biometric information stored in biometric systems is becoming a key issue. An important element in privacy protecting biometric systems is the quantizer which transforms a normal biometric template into a binary string. In this paper, we present a user-specific quantization

  5. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  6. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  7. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  8. Palmprint and Face Multi-Modal Biometric Recognition Based on SDA-GSVD and Its Kernelization

    Directory of Open Access Journals (Sweden)

    Jing-Yu Yang

    2012-04-01

    Full Text Available When extracting discriminative features from multimodal data, current methods rarely concern themselves with the data distribution. In this paper, we present an assumption that is consistent with the viewpoint of discrimination, that is, a person’s overall biometric data should be regarded as one class in the input space, and his different biometric data can form different Gaussians distributions, i.e., different subclasses. Hence, we propose a novel multimodal feature extraction and recognition approach based on subclass discriminant analysis (SDA. Specifically, one person’s different bio-data are treated as different subclasses of one class, and a transformed space is calculated, where the difference among subclasses belonging to different persons is maximized, and the difference within each subclass is minimized. Then, the obtained multimodal features are used for classification. Two solutions are presented to overcome the singularity problem encountered in calculation, which are using PCA preprocessing, and employing the generalized singular value decomposition (GSVD technique, respectively. Further, we provide nonlinear extensions of SDA based multimodal feature extraction, that is, the feature fusion based on KPCA-SDA and KSDA-GSVD. In KPCA-SDA, we first apply Kernel PCA on each single modal before performing SDA. While in KSDA-GSVD, we directly perform Kernel SDA to fuse multimodal data by applying GSVD to avoid the singular problem. For simplicity two typical types of biometric data are considered in this paper, i.e., palmprint data and face data. Compared with several representative multimodal biometrics recognition methods, experimental results show that our approaches outperform related multimodal recognition methods and KSDA-GSVD achieves the best recognition performance.

  9. Combining Biometric Fractal Pattern and Particle Swarm Optimization-Based Classifier for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Chia-Hung Lin

    2010-01-01

    Full Text Available This paper proposes combining the biometric fractal pattern and particle swarm optimization (PSO-based classifier for fingerprint recognition. Fingerprints have arch, loop, whorl, and accidental morphologies, and embed singular points, resulting in the establishment of fingerprint individuality. An automatic fingerprint identification system consists of two stages: digital image processing (DIP and pattern recognition. DIP is used to convert to binary images, refine out noise, and locate the reference point. For binary images, Katz's algorithm is employed to estimate the fractal dimension (FD from a two-dimensional (2D image. Biometric features are extracted as fractal patterns using different FDs. Probabilistic neural network (PNN as a classifier performs to compare the fractal patterns among the small-scale database. A PSO algorithm is used to tune the optimal parameters and heighten the accuracy. For 30 subjects in the laboratory, the proposed classifier demonstrates greater efficiency and higher accuracy in fingerprint recognition.

  10. Joint Feature Extraction and Classifier Design for ECG-Based Biometric Recognition.

    Science.gov (United States)

    Gutta, Sandeep; Cheng, Qi

    2016-03-01

    Traditional biometric recognition systems often utilize physiological traits such as fingerprint, face, iris, etc. Recent years have seen a growing interest in electrocardiogram (ECG)-based biometric recognition techniques, especially in the field of clinical medicine. In existing ECG-based biometric recognition methods, feature extraction and classifier design are usually performed separately. In this paper, a multitask learning approach is proposed, in which feature extraction and classifier design are carried out simultaneously. Weights are assigned to the features within the kernel of each task. We decompose the matrix consisting of all the feature weights into sparse and low-rank components. The sparse component determines the features that are relevant to identify each individual, and the low-rank component determines the common feature subspace that is relevant to identify all the subjects. A fast optimization algorithm is developed, which requires only the first-order information. The performance of the proposed approach is demonstrated through experiments using the MIT-BIH Normal Sinus Rhythm database.

  11. User-Authentication on Wearable Devices Based on Punch Gesture Biometrics

    Directory of Open Access Journals (Sweden)

    Liang Guan-Cheng

    2017-01-01

    Full Text Available Due to commoditization and convenience, wearable technology are interwoven with our daily life. However, privacy sensitive data stored on those devices such as personal email, message can be easily stolen. Most devices require a PIN input to unlock. However, this mechanism is vulnerable to shoulder surfing attack. Thus many novel authentication approaches have been proposed to solve this problem. And biometric-based methods have been adopted by many researchers because of the efficiency and excellent performance. In this paper, we propose a new biometric-based authentication system. We focus on how the user performs a straight punch gesture subconsciously. By analysis the acceleration data from the smartwatch when user performing the gesture, we are able to profile the user. And we authenticate the user according to the biometrics of this action. This mechanism is light-weighted and do not require user to remember any secret code. We develop an authentication system on Samsung Gear Fit 2 and conducted a real-world experiment on 20 volunteers. And we collected 13000 gesture samples to evaluate our system. Results show that our system can achieve a classification accuracy of at least 95.45%. In attacking scenario, our system can achieve an equal error rate lower than 4%. The maximum number of samples required by a well-trained classifier is 25.

  12. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  13. Autism from a biometric perspective.

    Science.gov (United States)

    Kostyuk, Nataliya; Rajnarayanan, Rajendram V; Isokpehi, Raphael D; Cohly, Hari H

    2010-05-01

    The aim of this pilot study was to test autistic children, siblings and their parents using a biometric device based on the gas discharge visualization (GDV) technique in order to assess their psycho-emotional and physiological functional state based on the activity of the autonomic nervous system. We hypothesize that the biometric assessment based on GDV will enable us: (1) to evaluate some specific features associated with autism spectrum disorder (ASD) as well as to compare autistic children to their siblings and to controls; (2) to analyze the differences in individual values of parents of autistic children versus parents of normal children. Out of total of 48 acupuncture points present on ten fingertips of both hands and associated to organs/organ systems, autistic children differed significantly from controls (p autism. The biometric method based on GDV is a promising step in autism research that may lead towards creating a disease profile and identify unique signature/biomarker for autism. Further work should involve more participants in order to augment our findings.

  14. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  15. Beyond Biometrics

    NARCIS (Netherlands)

    van den Broek, Egon

    Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including

  16. An Approach to Biometric Verification Based on Human Body Communication in Wearable Devices

    Directory of Open Access Journals (Sweden)

    Jingzhen Li

    2017-01-01

    Full Text Available In this paper, an approach to biometric verification based on human body communication (HBC is presented for wearable devices. For this purpose, the transmission gain S21 of volunteer’s forearm is measured by vector network analyzer (VNA. Specifically, in order to determine the chosen frequency for biometric verification, 1800 groups of data are acquired from 10 volunteers in the frequency range 0.3 MHz to 1500 MHz, and each group includes 1601 sample data. In addition, to achieve the rapid verification, 30 groups of data for each volunteer are acquired at the chosen frequency, and each group contains only 21 sample data. Furthermore, a threshold-adaptive template matching (TATM algorithm based on weighted Euclidean distance is proposed for rapid verification in this work. The results indicate that the chosen frequency for biometric verification is from 650 MHz to 750 MHz. The false acceptance rate (FAR and false rejection rate (FRR based on TATM are approximately 5.79% and 6.74%, respectively. In contrast, the FAR and FRR were 4.17% and 37.5%, 3.37% and 33.33%, and 3.80% and 34.17% using K-nearest neighbor (KNN classification, support vector machines (SVM, and naive Bayesian method (NBM classification, respectively. In addition, the running time of TATM is 0.019 s, whereas the running times of KNN, SVM and NBM are 0.310 s, 0.0385 s, and 0.168 s, respectively. Therefore, TATM is suggested to be appropriate for rapid verification use in wearable devices.

  17. Biometrics and Security

    Science.gov (United States)

    Govindaraju, Venu

    The science of Biometrics is concerned with recognizing people based on their physiological or behavioral characteristics. It has emerged as a vibrant field of research in today's security conscious society. In this talk we will introduce the important research challenges in Biometrics and specifically address the following topics: i) unobtrusive people tracking using a novel evolutionary recognition paradigm, ii) efficient indexing and searching of large fingerprint databases, iii) cancelability of templates where the task is to ensure that enrolled biometric templates can be revoked and new templates issued, and iv) fusion of fingerprints with other biometric modalities such as face where we will explore optimal trainable functions that operate on the scores returned by individual matchers.

  18. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  19. Comparative analysis of the quality of biometric methods

    OpenAIRE

    FILIPČÍK, Jan

    2010-01-01

    The main objective is to describe and analyze the types of biometric identification and selected biometric methods and identify their strengths and weaknesses compared to the current document type of identification and verification of persons and compared to other biometric methods and then focus on the relationships and support of biometric methods in terms of IS / ICT services. The work will consist of 5 types of biometric methods namely dactyloscopy, hand geometry scanning, facial scanning...

  20. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  1. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  2. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  3. Age factors in biometric processing

    CERN Document Server

    Fairhurst, Michael

    2013-01-01

    As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction. In Age Factors in Biometric Processing an in

  4. Information fusion in personal biometric authentication based on the iris pattern

    Science.gov (United States)

    Wang, Fenghua; Han, Jiuqiang

    2009-04-01

    Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions.

  5. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....

  6. Geometry and Gesture-Based Features from Saccadic Eye-Movement as a Biometric in Radiology

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, Tracy [Texas A& M University, College Station; Tourassi, Georgia [ORNL; Yoon, Hong-Jun [ORNL; Alamudun, Folami T. [ORNL

    2017-07-01

    In this study, we present a novel application of sketch gesture recognition on eye-movement for biometric identification and estimating task expertise. The study was performed for the task of mammographic screening with simultaneous viewing of four coordinated breast views as typically done in clinical practice. Eye-tracking data and diagnostic decisions collected for 100 mammographic cases (25 normal, 25 benign, 50 malignant) and 10 readers (three board certified radiologists and seven radiology residents), formed the corpus for this study. Sketch gesture recognition techniques were employed to extract geometric and gesture-based features from saccadic eye-movements. Our results show that saccadic eye-movement, characterized using sketch-based features, result in more accurate models for predicting individual identity and level of expertise than more traditional eye-tracking features.

  7. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    Science.gov (United States)

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  8. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    Science.gov (United States)

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  9. Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors

    Directory of Open Access Journals (Sweden)

    Ali A. Yassin

    2016-07-01

    Full Text Available In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and insider attacks could be effective. To overcome these drawbacks, we propose a secure biometric-based remote authentication scheme using biometric characteristics of hand-geometry, which is aimed at withstanding well-known attacks and achieving good performance. Furthermore, our work contains many crucial merits such as mutual authentication, user anonymity, freely chosen passwords, secure password changes, session key agreements, revocation by using personal biometrics, and does not need extra device or software for hand geometry in the login phase. Additionally, our scheme is highly efficient and withstands existing known attacks like password guessing, server impersonation, insider attacks, denial of service (DOS attacks, replay attacks, and parallel-session attacks. Compared with the other related schemes, our work is powerful both in communications and computation costs.

  10. Trends in Biometric Techonology | Boodoo-Jahangeer | University of ...

    African Journals Online (AJOL)

    When used for personal identification, biometric technologies measure and analyze human physiological and behavioural characteristics. A person's physiological characteristics are based on direct measurement of a part of the body such as, fingerprint, hand geometry, facial geometry, and eye retinas and irises.

  11. Biometrics Technology

    Science.gov (United States)

    2012-03-13

    drastic cuts across DoD to curtail the debt crisis , remain relevant and maintain the nation’s standing as the world’s greatest super power. As a...protected at all costs. Leveraging biometrics at a reasonable cost in a time of war and during the U.S. economic crisis is clearly important in...characteristics,‖ The Argus, Theory and Critique, 1 June 1999 [journal on-line], quoted in Eloy Campos , Consolidating Our Country’s Biometric Resources and The

  12. Template characterization and correlation algorithm created from segmentation for the iris biometric authentication based on analysis of textures implemented on a FPGA

    Science.gov (United States)

    Giacometto, F. J.; Vilardy, J. M.; Torres, C. O.; Mattos, L.

    2011-01-01

    Among the most used biometric signals to set personal security permissions, taker increasingly importance biometric iris recognition based on their textures and images of blood vessels due to the rich in these two unique characteristics that are unique to each individual. This paper presents an implementation of an algorithm characterization and correlation of templates created for biometric authentication based on iris texture analysis programmed on a FPGA (Field Programmable Gate Array), authentication is based on processes like characterization methods based on frequency analysis of the sample, and frequency correlation to obtain the expected results of authentication.

  13. Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system

    Directory of Open Access Journals (Sweden)

    S. Anu H. Nair

    2015-12-01

    Full Text Available Digital image watermarking is a major domain for hiding the biometric information, in which the watermark data are made to be concealed inside a host image imposing imperceptible change in the picture. Due to the advance in digital image watermarking, the majority of research aims to make a reliable improvement in robustness to prevent the attack. The reversible invisible watermarking scheme is used for fingerprint and iris multimodal biometric system. A novel approach is used for fusing different biometric modalities. Individual unique modalities of fingerprint and iris biometric are extracted and fused using different fusion techniques. The performance of different fusion techniques is evaluated and the Discrete Wavelet Transform fusion method is identified as the best. Then the best fused biometric template is watermarked into a cover image. The various watermarking techniques such as the Discrete Cosine Transform (DCT, Singular Value Decomposition (SVD and Bacterial Foraging Optimization Algorithm (BFOA are implemented to the fused biometric feature image. Performance of watermarking systems is compared using different metrics. It is found that the watermarked images are found robust over different attacks and they are able to reverse the biometric template for Bacterial Foraging Optimization Algorithm (BFOA watermarking technique.

  14. The biometric menagerie.

    Science.gov (United States)

    Yager, Neil; Dunstone, Ted

    2010-02-01

    It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.

  15. SURVEY OF BIOMETRIC SYSTEMS USING IRIS RECOGNITION

    OpenAIRE

    S.PON SANGEETHA; Dr. M. Karnan

    2014-01-01

    The security plays an important role in any type of organization in today’s life. Iris recognition is one of the leading automatic biometric systems in the area of security which is used to identify the individual person. Biometric systems include fingerprints, facial features, voice recognition, hand geometry, handwriting, the eye retina and the most secured one presented in this paper, the iris recognition. Biometric systems has become very famous in security systems because it is not possi...

  16. FLIR biometrics

    Science.gov (United States)

    O'Kane, Barbara L.; Krzywicki, Alan T.

    2009-04-01

    Biometrics are generally thought of as anatomical features that allow positive identification of a person. This paper describes biometrics that are also physiological in nature. The differences between anatomy and physiology have to do with the fact that physiology is dynamic, functioning, and changing with the state or actions of a person whereas anatomy is generally more stable. Biometrics in general usually refers to a trait, whereas the new type of biometrics discussed in this paper refer to a state, which is temporary, and often even transitory. By state, what is meant is the condition of a person at a particular time relative to their psychological, physical, medical, or physiological status. The present paper describes metrics that are cues to the state of a functioning individual observable through a thermal camera video system. An inferred state might then be tied to the positive identification of the person. Using thermal for this purpose is significant because the thermal signature of a human is dynamic and changes with physical and emotional state, while also revealing underlying anatomical structures. A new method involving the counting of open pores on the skin is discussed as a way of observing the Electrodermal Activity (EDA) of the skin, a primary component of the polygraph.

  17. Biometric identification: a holistic perspective

    Science.gov (United States)

    Nadel, Lawrence D.

    2007-04-01

    Significant advances continue to be made in biometric technology. However, the global war on terrorism and our increasingly electronic society have created the societal need for large-scale, interoperable biometric capabilities that challenge the capabilities of current off-the-shelf technology. At the same time, there are concerns that large-scale implementation of biometrics will infringe our civil liberties and offer increased opportunities for identity theft. This paper looks beyond the basic science and engineering of biometric sensors and fundamental matching algorithms and offers approaches for achieving greater performance and acceptability of applications enabled with currently available biometric technologies. The discussion focuses on three primary biometric system aspects: performance and scalability, interoperability, and cost benefit. Significant improvements in system performance and scalability can be achieved through careful consideration of the following elements: biometric data quality, human factors, operational environment, workflow, multibiometric fusion, and integrated performance modeling. Application interoperability hinges upon some of the factors noted above as well as adherence to interface, data, and performance standards. However, there are times when the price of conforming to such standards can be decreased local system performance. The development of biometric performance-based cost benefit models can help determine realistic requirements and acceptable designs.

  18. Recommendation on the Use of Biometric Technology

    DEFF Research Database (Denmark)

    Juul, Niels Christian

    2013-01-01

    Biometric technology is based on the use of information linked to individuals. Hence, privacy and security in biometric applications becomes a concern and the need to assess such applications thoroughly becomes equally important. Guidelines for application of biometric technology must ensure...... a positive impact on both security and privacy. Based on two cases of biometric application, which have been assessed by the Danish Data Protecting Agency, this chapter present a set of recommendations to legislators, regulators, corporations and individuals on the appropriate use of biometric technologies...

  19. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    Science.gov (United States)

    2012-12-01

    information, service, and to other rights or 25 benefits, including the ability to cross international borders. The motivations for using...benefits, including the ability to cross international borders. The motivations for using biometrics are diverse and often overlap. They include...longshoremen, truckers , port employees, and others) will be required to obtain a TWIC. The TWIC contains two biometric templates of a person’s

  20. A Review Of Multimodal Biometric Authentication Systems

    Directory of Open Access Journals (Sweden)

    Kunal Kumar

    2015-08-01

    Full Text Available Authentication is the process of validating the identity of a person based on certain input that the person provides. Authentication has become a major topic of research due to the increasing number of attacks on computer networks around the globe. This review paper focuses on multimodal biometric authentication systems in use today. The aim is to elicit the best combination of authentication factors for multimodal use. We study the strengths and weakness of selected biometric mechanisms and recommend novel solutions to include in multimodal biometric systems to improve on the current biometric drawbacks. We believe this paper will provide security researchers some useful insight whilst designing better biometric systems.

  1. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    2010-02-25

    Feb 25, 2010 ... comparison must be salient features that uniquely characterize each fingerprint template. The minutiae-based features are the bifurcation and ridge ends minutiae. Biometric recognition systems are pattern recognition and classification systems. A fingerprint recognition system is expected to match an input ...

  2. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sandeep Pirbhulal

    2015-06-01

    Full Text Available Body Sensor Network (BSN is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG, Photoplethysmography (PPG, Electrocardiogram (ECG, etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA, Data Encryption Standard (DES and Rivest Shamir Adleman (RSA. Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.

  3. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  4. Face-iris multimodal biometric scheme based on feature level fusion

    Science.gov (United States)

    Huo, Guang; Liu, Yuanning; Zhu, Xiaodong; Dong, Hongxing; He, Fei

    2015-11-01

    Unlike score level fusion, feature level fusion demands all the features extracted from unimodal traits with high distinguishability, as well as homogeneity and compatibility, which is difficult to achieve. Therefore, most multimodal biometric research focuses on score level fusion, whereas few investigate feature level fusion. We propose a face-iris recognition method based on feature level fusion. We build a special two-dimensional-Gabor filter bank to extract local texture features from face and iris images, and then transform them by histogram statistics into an energy-orientation variance histogram feature with lower dimensions and higher distinguishability. Finally, through a fusion-recognition strategy based on principal components analysis and support vector machine (FRSPS), feature level fusion and one-to-n identification are accomplished. The experimental results demonstrate that this method can not only effectively extract face and iris features but also provide higher recognition accuracy. Compared with some state-of-the-art fusion methods, the proposed method has a significant performance advantage.

  5. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  6. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    Directory of Open Access Journals (Sweden)

    Steffen Peter

    2016-04-01

    Full Text Available Body area sensor networks (BANs utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  7. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  8. Corneal biomechanical data and biometric parameters measured with Scheimpflug-based devices on normal corneas.

    Science.gov (United States)

    Nemeth, Gabor; Szalai, Eszter; Hassan, Ziad; Lipecz, Agnes; Flasko, Zsuzsa; Modis, Laszlo

    2017-01-01

    To analyze the correlations between ocular biomechanical and biometric data of the eye, measured by Scheimpflug-based devices on healthy subjects. Three consecutive measurements were carried out using the corneal visualization Scheimpflug technology (CorVis ST) device on healthy eyes and the 10 device-specific parameters were recorded. Pentacam HR-derived parameters (corneal curvature radii on the anterior and posterior surfaces; apical pachymetry; corneal volume; corneal aberration data; depth, volume and angle of the anterior chamber) and axial length (AL) from IOLMaster were correlated with the 10 specific CorVis ST parameters. Measurements were conducted in 43 eyes of 43 volunteers (age 61.24±15.72y). The 10 specific CorVis ST data showed significant relationships with corneal curvature radii both on the anterior and posterior surface, pachymetric data, root mean square (RMS) data of lower-order aberrations, and posterior RMS of higher-order aberrations and spherical aberration of the posterior cornea. Anterior chamber depth showed a significant relationship, but there were no significant correlations between corneal volume, anterior chamber volume, mean chamber angle or AL and the 10 specific CorVis ST parameters. CorVis ST-generated parameters are influenced by corneal curvature radii, some corneal RMS data, but corneal volume, anterior chamber volume, chamber angle and AL have no correlation with the biomechanical parameters. The parameters measured by CorVis ST seem to refer mostly to corneal properties of the eye.

  9. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  10. Motorcycle Start-stop System based on Intelligent Biometric Voice Recognition

    Science.gov (United States)

    Winda, A.; E Byan, W. R.; Sofyan; Armansyah; Zariantin, D. L.; Josep, B. G.

    2017-03-01

    Current mechanical key in the motorcycle is prone to bulgary, being stolen or misplaced. Intelligent biometric voice recognition as means to replace this mechanism is proposed as an alternative. The proposed system will decide whether the voice is belong to the user or not and the word utter by the user is ‘On’ or ‘Off’. The decision voice will be sent to Arduino in order to start or stop the engine. The recorded voice is processed in order to get some features which later be used as input to the proposed system. The Mel-Frequency Ceptral Coefficient (MFCC) is adopted as a feature extraction technique. The extracted feature is the used as input to the SVM-based identifier. Experimental results confirm the effectiveness of the proposed intelligent voice recognition and word recognition system. It show that the proposed method produces a good training and testing accuracy, 99.31% and 99.43%, respectively. Moreover, the proposed system shows the performance of false rejection rate (FRR) and false acceptance rate (FAR) accuracy of 0.18% and 17.58%, respectively. In the intelligent word recognition shows that the training and testing accuracy are 100% and 96.3%, respectively.

  11. Corneal biomechanical data and biometric parameters measured with Scheimpflug-based devices on normal corneas

    Science.gov (United States)

    Nemeth, Gabor; Szalai, Eszter; Hassan, Ziad; Lipecz, Agnes; Flasko, Zsuzsa; Modis, Laszlo

    2017-01-01

    AIM To analyze the correlations between ocular biomechanical and biometric data of the eye, measured by Scheimpflug-based devices on healthy subjects. METHODS Three consecutive measurements were carried out using the corneal visualization Scheimpflug technology (CorVis ST) device on healthy eyes and the 10 device-specific parameters were recorded. Pentacam HR-derived parameters (corneal curvature radii on the anterior and posterior surfaces; apical pachymetry; corneal volume; corneal aberration data; depth, volume and angle of the anterior chamber) and axial length (AL) from IOLMaster were correlated with the 10 specific CorVis ST parameters. RESULTS Measurements were conducted in 43 eyes of 43 volunteers (age 61.24±15.72y). The 10 specific CorVis ST data showed significant relationships with corneal curvature radii both on the anterior and posterior surface, pachymetric data, root mean square (RMS) data of lower-order aberrations, and posterior RMS of higher-order aberrations and spherical aberration of the posterior cornea. Anterior chamber depth showed a significant relationship, but there were no significant correlations between corneal volume, anterior chamber volume, mean chamber angle or AL and the 10 specific CorVis ST parameters. CONCLUSIONS CorVis ST-generated parameters are influenced by corneal curvature radii, some corneal RMS data, but corneal volume, anterior chamber volume, chamber angle and AL have no correlation with the biomechanical parameters. The parameters measured by CorVis ST seem to refer mostly to corneal properties of the eye. PMID:28251079

  12. The research and application of multi-biometric acquisition embedded system

    Science.gov (United States)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  13. An enhanced PSO-DEFS based feature selection with biometric authentication for identification of diabetic retinopathy

    Directory of Open Access Journals (Sweden)

    Umarani Balakrishnan

    2016-11-01

    Full Text Available Recently, automatic diagnosis of diabetic retinopathy (DR from the retinal image is the most significant research topic in the medical applications. Diabetic macular edema (DME is the major reason for the loss of vision in patients suffering from DR. Early identification of the DR enables to prevent the vision loss and encourage diabetic control activities. Many techniques are developed to diagnose the DR. The major drawbacks of the existing techniques are low accuracy and high time complexity. To overcome these issues, this paper proposes an enhanced particle swarm optimization-differential evolution feature selection (PSO-DEFS based feature selection approach with biometric authentication for the identification of DR. Initially, a hybrid median filter (HMF is used for pre-processing the input images. Then, the pre-processed images are embedded with each other by using least significant bit (LSB for authentication purpose. Simultaneously, the image features are extracted using convoluted local tetra pattern (CLTrP and Tamura features. Feature selection is performed using PSO-DEFS and PSO-gravitational search algorithm (PSO-GSA to reduce time complexity. Based on some performance metrics, the PSO-DEFS is chosen as a better choice for feature selection. The feature selection is performed based on the fitness value. A multi-relevance vector machine (M-RVM is introduced to classify the 13 normal and 62 abnormal images among 75 images from 60 patients. Finally, the DR patients are further classified by M-RVM. The experimental results exhibit that the proposed approach achieves better accuracy, sensitivity, and specificity than the existing techniques.

  14. Anomaly based intrusion detection for a biometric identification system using neural networks

    CSIR Research Space (South Africa)

    Mgabile, T

    2012-10-01

    Full Text Available detection technique that analyses the fingerprint biometric network traffic for evidence of intrusion. The neural network algorithm that imitates the way a human brain works is used in this study to classify normal traffic and learn the correct traffic...

  15. BioTwist: overcoming severe distortions in ridge-based biometrics for successful identification

    NARCIS (Netherlands)

    Kotzerke, Johannes

    2016-01-01

    Biometrics rely on a physical trait's permanence and stability over time, as well as its individuality, robustness and ease to be captured. Challenges arise when working with newborns or infants because of the tininess and fragility of an infant's features, their uncooperative nature and their rapid

  16. Biometric Solutions for Personal Identification

    OpenAIRE

    Larsen, Tormod Emsell

    2008-01-01

    With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint matching is the most mature and most widely used technique of today, several others exist. Among these is ear recognition, which so far has received scant attention, but still has showed good results in performance. The thesis gives a general presentation of the biometric...

  17. A review of data acquisition and difficulties in sensor module of biometric systems

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2013-10-01

    Full Text Available Biometrics refers to the recognition of individuals based on their physiological and/or behavioral characteristics. Thebiometric traits which may be considered for the authentication of a person are face, hand geometry, finger print, vein, iris,etc. A competent selection of a sensor, its mechanism and adaptability is required, as the absence of these will leave thebiometric sensor deceptive to information sensing. Selecting a sensor for a biometric application from the large number ofavailable sensors with different technologies always brought the issue of performance and accuracy. Therefore, various errorrates and sensibility contention differentiate the available biometric sensors. This paper presents the difficulties faced in thesensor module of the biometric system and the incomparable alternatives on the basis of availability of information at sensormodule of the various systems.

  18. Classification of Eucalyptus urograndis hybrids under different water availability based on biometric traits

    Directory of Open Access Journals (Sweden)

    Claudia D. Silva

    2014-08-01

    Full Text Available Aim of study: The eucalyptus grows rapidly and is well suitable to edaphic and bioclimatic conditions in several regions of of the world. The aim of this study was to assess the performance of Eucalyptus urograndis hybrids grown under different water availability conditions.Area of study: The study was performed in south-eastern of BrazilMaterial and Methods: We evaluated five commercial hybrids cultivated in pots with the substrate maintained at 65, 50, 35 and 20% maximum water retention capacity. The evaluation was based on the following characteristics: total height (cm, diameter (mm, number of leaves, leaf area (dm2, and dry weight (g plant-1 of leaf, stem + branches,   root, shoot and total and root/shoot ratio.Main results: All the characteristics evaluated were adversely affected by reduced availability of water in the substrate. The hybrids assessed performed differently in terms of biometric characteristics, irrespective of water availability. Water deficit resulted in a greater reduction in the dry weight production compared to number of leaves, diameter and height. Hybrids H2 and H5 have favorable traits for tolerating drought. The hybrid H2 shows a stronger slowdown in growth as soil moisture levels drop, although its growth rate is low, and H5 increases the root/shoot ratio but maintains growth in terms of height, even under drought conditions.Research highlights: The results obtained in our experiment show that productive hybrids sensitive to drought could also perform better under water deficit conditions, maintaining satisfactory growth despite significant drops in these characteristics.Keywords: Eucalyptus urograndis; water deficit; drought tolerance. 

  19. Development of an image acquisition system for hand vein based on an embedded system

    Science.gov (United States)

    Li, Xiuyan; Liu, Tiegen; Wang, Yunxin; Yuan, Chenhu; Deng, Shichao

    2009-07-01

    As one kind of the latest forms of biometrics, the human hand vein recognition utilizes a state-of-the-art recognition algorithm based on unique veins and capillaries found on human dorsal hand, which possesses the advantages such as well anti-falsification and high noise immunity. For the hand vein recognition, the most important premise is acquiring the high quality hand vein image. According to the special effect of human hand vein on the near infrared (NIR), when a hand is scanned by an image sensor, the vein pattern appears darker than its surroundings. Depending on this characteristic, the NIR light source was utilized to illuminate the image acquisition system for hand vein. And the optimal parameters of light source were chosen and the light source with high uniformity illuminance was manufactured to acquire the more clear hand vein image. Simultaneously, for the purpose of system miniaturization and design flexibility, the embedded image acquisition system for hand vein was designed based on the technology of system on programmable chip (SOPC). FPGA and CMOS image sensor were taken as the core components in the system, and the hardware of acquisition module is realized by configuring NiosII soft-core CPU and some corresponding interface modules on a FPGA. The software was developed by using the NiosII IDE to realize the initialization control to CMOS image sensor and collection, storage and transmission for the image data gathered from CMOS. Then the collected hand vein image was simply preprocessed, which further improved the image quality. Through experiments, the results indicated that this system could obtain the hand vein image with high performance, and it supplied the embedded development platform for hand vein recognition simultaneously. It was significant to develop the hand vein recognition system with small size and high speed.

  20. Biomarkers and biometric measures of adherence to use of ARV-based vaginal rings

    Directory of Open Access Journals (Sweden)

    Randy M Stalter

    2016-05-01

    for further development based on the following measurements: intracellular drug levels, drug levels in hair, the accumulation of a vaginal analyte that diffuses into the ring, and the depletion of an intrinsic ring constituent. Conclusions: While some approaches show significant promise over others, it is recommended that a strategy of using complementary biometric and behavioural approaches be adopted to best understand participants’ adherence to ARV-based ring products in clinical trials.

  1. Biomarkers and biometric measures of adherence to use of ARV-based vaginal rings.

    Science.gov (United States)

    Stalter, Randy M; Moench, Thomas R; MacQueen, Kathleen M; Tolley, Elizabeth E; Owen, Derek H

    2016-01-01

    : intracellular drug levels, drug levels in hair, the accumulation of a vaginal analyte that diffuses into the ring, and the depletion of an intrinsic ring constituent. While some approaches show significant promise over others, it is recommended that a strategy of using complementary biometric and behavioural approaches be adopted to best understand participants' adherence to ARV-based ring products in clinical trials.

  2. Autism from a Biometric Perspective

    Directory of Open Access Journals (Sweden)

    Hari H. Cohly

    2010-04-01

    Full Text Available Purpose:The aim of this pilot study was to test autistic children, siblings and their parents using a biometric device based on the gas discharge visualization (GDV technique in order to assess their psycho-emotional and physiological functional state based on the activity of the autonomic nervous system. Hypothesis: We hypothesize that the biometric assessment based on GDV will enable us: (1 to evaluate some specific features associated with autism spectrum disorder (ASD as well as to compare autistic children to their siblings and to controls; (2 to analyze the differences in individual values of parents of autistic children versus parents of normal children. Results: Out of total of 48 acupuncture points present on ten fingertips of both hands and associated to organs/organ systems, autistic children differed significantly from controls (p < 0.05 in 36 (images without filter and 12 (images with filter, siblings differed significantly from controls (p < 0.05 in 12 (images without filter and seven (images with filter, autistic children differed significantly (p < 0.05 from siblings in eight (images without filter and one (images with filter, fathers of autistic children differed significantly (p < 0.05 from controls in 14 (images without filter and three (images with filter and mothers of autistic children differed significantly (p < 0.05 from controls in five (images without filter and nine (images with filter acupuncture points. Conclusions: All compared groups have shown significant difference on both psycho-emotional (images without filter and physiological (images with filter levels. However, the differences between autistic children and controls expressed on psycho-emotional level were the most significant as compared to the other groups. Therefore, the activity of the sympathetic autonomic nervous system is significantly altered in children with autism. The biometric method based on GDV is a promising step in autism research that may

  3. Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    Jinyu Lu

    2014-01-01

    Full Text Available A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the singular values of each host image's coefficients which are obtained through discrete cosine transform (DCT. Numerical results reveal that proposed method can extract the watermark effectively and illustrate its security and robustness.

  4. Password Based Hand Gesture Controlled Robot

    OpenAIRE

    Shanmukha Rao; CH, Rajasekhar

    2016-01-01

    Gesture is a most natural way of communication between human and computer in real system. Hand gesture is one of the important methods of non-verbal communications for humans. A simulation tool, MATLAB based colour image processing is used to recognize hand gesture. With the help of wireless communication, it is easier to interact with the robot. The objective of this project is to build a password protected wireless gesture control robot using Arduino, RF transmitter and receiver...

  5. Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology.

    Science.gov (United States)

    Paiva, Joana S; Dias, Duarte; Cunha, João P S

    2017-01-01

    In recent years, safer and more reliable biometric methods have been developed. Apart from the need for enhanced security, the media and entertainment sectors have also been applying biometrics in the emerging market of user-adaptable objects/systems to make these systems more user-friendly. However, the complexity of some state-of-the-art biometric systems (e.g., iris recognition) or their high false rejection rate (e.g., fingerprint recognition) is neither compatible with the simple hardware architecture required by reduced-size devices nor the new trend of implementing smart objects within the dynamic market of the Internet of Things (IoT). It was recently shown that an individual can be recognized by extracting features from their electrocardiogram (ECG). However, most current ECG-based biometric algorithms are computationally demanding and/or rely on relatively large (several seconds) ECG samples, which are incompatible with the aforementioned application fields. Here, we present a computationally low-cost method (patent pending), including simple mathematical operations, for identifying a person using only three ECG morphology-based characteristics from a single heartbeat. The algorithm was trained/tested using ECG signals of different duration from the Physionet database on more than 60 different training/test datasets. The proposed method achieved maximal averaged accuracy of 97.450% in distinguishing each subject from a ten-subject set and false acceptance and rejection rates (FAR and FRR) of 5.710±1.900% and 3.440±1.980%, respectively, placing Beat-ID in a very competitive position in terms of the FRR/FAR among state-of-the-art methods. Furthermore, the proposed method can identify a person using an average of 1.020 heartbeats. It therefore has FRR/FAR behavior similar to obtaining a fingerprint, yet it is simpler and requires less expensive hardware. This method targets low-computational/energy-cost scenarios, such as tiny wearable devices (e.g., a

  6. Bridging biometrics and forensics

    Science.gov (United States)

    Yan, Yanjun; Osadciw, Lisa Ann

    2008-02-01

    This paper is a survey on biometrics and forensics, especially on the techniques and applications of face recognition in forensics. This paper describes the differences and connections between biometrics and forensics, and bridges each other by formulating the conditions when biometrics can be applied in forensics. Under these conditions, face recognition, as a non-intrusive and non-contact biometrics, is discussed in detail as an illustration of applying biometrics in forensics. The discussion on face recognition covers different approaches, feature extractions, and decision procedures. The advantages and limitations of biometrics in forensic applications are also addressed.

  7. Authentication based on gestures with smartphone in hand

    Science.gov (United States)

    Varga, Juraj; Švanda, Dominik; Varchola, Marek; Zajac, Pavol

    2017-08-01

    We propose a new method of authentication for smartphones and similar devices based on gestures made by user with the device itself. The main advantage of our method is that it combines subtle biometric properties of the gesture (something you are) with a secret information that can be freely chosen by the user (something you know). Our prototype implementation shows that the scheme is feasible in practice. Further development, testing and fine tuning of parameters is required for deployment in the real world.

  8. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  9. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    database or memory chip. Feature extraction is done with the help of some computational algorithms. The extracted biometric data comprise a template. Fig 1: Diagram of Automated Biometric Systems. § Enrolment is the process of registering a user biometric input in a database. It could be an identification database or a.

  10. Joint Sparse Representation for Robust Multimodal Biometrics Recognition

    Science.gov (United States)

    2014-01-01

    biometric system based on a single source of evidence may not be able to capture meaningful data from some users. For instance, an iris biometric ...images shown above suffer from various artifacts such as sensor noise, blur and occlusion. Biometric Modality # of subjects # of samples Iris 244 3099...Individual Biometrics without error term Finger 1 Finger 2 Finger 3 Finger 4 Iris 1 Iris 2 (a) (b) 20 40 60 80 100 120 140 160 180 200 220 60 65 70

  11. Efficient and privacy-preserving biometric identification in cloud

    OpenAIRE

    Hahn, Changhee; Hur, Junbeom

    2016-01-01

    With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identificat...

  12. Multispectral biometrics systems and applications

    CERN Document Server

    Zhang, David; Gong, Yazhuo

    2016-01-01

    Describing several new biometric technologies, such as high-resolution fingerprint, finger-knuckle-print, multi-spectral backhand, 3D fingerprint, tongueprint, 3D ear, and multi-spectral iris recognition technologies, this book analyzes a number of efficient feature extraction, matching and fusion algorithms and how potential systems have been developed. Focusing on how to develop new biometric technologies based on the requirements of applications, and how to design efficient algorithms to deliver better performance, the work is based on the author’s research with experimental results under different challenging conditions described in the text. The book offers a valuable resource for researchers, professionals and postgraduate students working in the fields of computer vision, pattern recognition, biometrics, and security applications, amongst others.

  13. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  14. Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram

    2014-06-01

    Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.

  15. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  16. Bridging the gap: from biometrics to forensics.

    Science.gov (United States)

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  17. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal......A key driving factor for biometrics is the widespread national and international deployment of biometric systems that has been initiated in the past two years and is about to accelerate. While nearly all current biometric deployments are government-led and principally concerned with national...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...

  18. Biometric citizenship and alienage

    DEFF Research Database (Denmark)

    Stenum, Helle

    Biometric identifiers (finger prints, face scans, iris scans etc.) have increasingly become a key element in technology of EU border and migration management. SIS II, EURODAC and VIS are centralized systems that contain fingerprints of different groups of non-EU citizen, and the biometric......, to the (re)introduction the concept of rights being engraved in your body, depended first and foremost on one’s birth, kinship and geography ? The paper will discuss biometric technology in a historical context and explore the apparent biometric divide between citizens and migrants, the latter positioned...

  19. Biometrics Bodies, Technologies, Biopolitics

    CERN Document Server

    Pugliese, Joseph

    2012-01-01

    Biometric technologies, such as finger- or facial-scan, are being deployed across a variety of social contexts in order to facilitate and guarantee identity verification and authentication. In the post-9/11 world, biometric technologies have experienced an extraordinary period of growth as concerns about security and screening have increased. This book analyses biometric systems in terms of the application of biopolitical power - corporate, military and governmental - on the human body. It deploys cultural theory in examining the manner in which biometric technologies constitute the body as a

  20. Hand eczema guidelines based on the Danish guidelines for the diagnosis and treatment of hand eczema

    DEFF Research Database (Denmark)

    Menné, Torkil; Johansen, Jeanne Duus; Sommerlund, Mette

    2011-01-01

    Background. Classification of hand eczema has traditionally been based both on aetiology and clinical appearance. For 20% of cases, the aetiology is unknown. Objectives. To suggest a classification based on well-defined aetiology as well as on predefined clinical patterns and on the dynamics...... of hand eczema. Methods. Literature studies and discussions among members of the Danish Contact Dermatitis Group. Results. Criteria are given for the aetiological diagnoses of allergic contact dermatitis of the hands, irritant contact dermatitis of the hands, protein contact dermatitis of the hands......, atopic hand eczema and aetiologically unclassifiable hand eczema. Six different clinical patterns are described and illustrated. Suggestions for general treatment principles are given. Conclusion. Operational guidelines for the diagnosis and treatment of hand eczema are described....

  1. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  2. Surgical hand antisepsis-a pilot study comparing povidone iodine hand scrub and alcohol-based chlorhexidine gluconate hand rub.

    Science.gov (United States)

    Lai, Kah Weng; Foo, Tun Lin; Low, Wilson; Naidu, Ganesan

    2012-01-01

    The surgeon uses different methods of surgical hand antisepsis with the aim of reducing surgical site infections. To date, there are no local studies comparing the efficacy of iodine hand scrub against newer alcohol-based hand rubs with active ingredients. Our pilot study compares a traditional aqueous hand scrub using 7.5% Povidone iodine (PVP-I) against a hand rub using Avagard: 61% ethyl alcohol, 1% chlorhexidine gluconate. The outcome measure is the number of Colony Forming Units (CFU) cultured from 10-digit fingertip imprints on agar plates. Ten volunteers underwent 2 hand preparation protocols, with a 30-minute interval in between-Protocol A (3-minute of aqueous scrub using PVP-I) and Protocol B (3-minute of hand rub, until dry, using Avagard). In each protocol, fingertip imprints were obtained immediately after hand preparation (t(0)). The volunteers proceeded to don sterile gloves and performed specific tasks (suturing). At one hour, the gloves were removed and a second set of imprints was obtained (t(1)). Four sets of fingertip imprints were obtained. All 10 participants complied with the supervised hand preparation procedures for each protocol. CFUs of initial fingertip imprints (t(0)): The median CFU counts for initial imprint was significantly higher in the PVP-I treatment (median = 6, Inter Quartile Range (IQR) = 33) compared to the Avagard treatment (median = 0, IQR = 0, P scrub at reducing baseline colony counts and sustaining this antisepsis effect. Alcohol hand rub with an active compound, demonstrated superior efficacy in CFU reduction. Based on our results, and those pooled from other authors, we suggest that alcohol-based hand rubs could be included in the operating theatre as an alternative to traditional surgical scrub for surgical hand antisepsis.

  3. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  4. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  5. Hand Hygiene With Alcohol-Based Hand Rub: How Long Is Long Enough?

    Science.gov (United States)

    Pires, Daniela; Soule, Hervé; Bellissimo-Rodrigues, Fernando; Gayet-Ageron, Angèle; Pittet, Didier

    2017-05-01

    BACKGROUND Hand hygiene is the core element of infection prevention and control. The optimal hand-hygiene gesture, however, remains poorly defined. OBJECTIVE We aimed to evaluate the influence of hand-rubbing duration on the reduction of bacterial counts on the hands of healthcare personnel (HCP). METHODS We performed an experimental study based on the European Norm 1500. Hand rubbing was performed for 10, 15, 20, 30, 45, or 60 seconds, according to the WHO technique using 3 mL alcohol-based hand rub. Hand contamination with E. coli ATCC 10536 was followed by hand rubbing and sampling. A generalized linear mixed model with a random effect on the subject adjusted for hand size and gender was used to analyze the reduction in bacterial counts after each hand-rubbing action. In addition, hand-rubbing durations of 15 and 30 seconds were compared to assert non-inferiority (0.6 log10). RESULTS In total, 32 HCP performed 123 trials. All durations of hand rubbing led to significant reductions in bacterial counts (Phand rubbing were not significantly different from those obtained after 30 seconds. The mean bacterial reduction after 15 seconds of hand rubbing was 0.11 log10 lower (95% CI, -0.46 to 0.24) than after 30 seconds, demonstrating non-inferiority. CONCLUSIONS Hand rubbing for 15 seconds was not inferior to 30 seconds in reducing bacterial counts on hands under the described experimental conditions. There was no gain in reducing bacterial counts from hand rubbing longer than 30 seconds. Further studies are needed to assess the clinical significance of our findings. Infect Control Hosp Epidemiol 2017;38:547-552.

  6. SCAN secure processor and its biometric capabilities

    Science.gov (United States)

    Kannavara, Raghudeep; Mertoguno, Sukarno; Bourbakis, Nikolaos

    2011-04-01

    This paper presents the design of the SCAN secure processor and its extended instruction set to enable secure biometric authentication. The SCAN secure processor is a modified SparcV8 processor architecture with a new instruction set to handle voice, iris, and fingerprint-based biometric authentication. The algorithms for processing biometric data are based on the local global graph methodology. The biometric modules are synthesized in reconfigurable logic and the results of the field-programmable gate array (FPGA) synthesis are presented. We propose to implement the above-mentioned modules in an off-chip FPGA co-processor. Further, the SCAN-secure processor will offer a SCAN-based encryption and decryption of 32 bit instructions and data.

  7. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  8. Iris and periocular biometrics

    CERN Document Server

    Rathgeb, Christian

    2017-01-01

    This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.

  9. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  10. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  11. On Soft Biometrics

    DEFF Research Database (Denmark)

    Nixon, Mark; Correia, Paulo; Nasrollahi, Kamal

    2015-01-01

    Innovation has formed much of the rich history in biometrics. The field of soft biometrics was originally aimed to augment the recognition process by fusion of metrics that were sufficient to discriminate populations rather than individuals. This was later refined to use measures that could be used...... to discriminate individuals, especially using descriptions that can be perceived using human vision and in surveillance imagery. A further branch of this new field concerns approaches to estimate soft biometrics, either using conventional biometrics approaches or just from images alone. These three strands...... combine to form what is now known as soft biometrics. We survey the achievements that have been made in recognition by and in estimation of these parameters, describing how these approaches can be used and where they might lead to. The approaches lead to a new type of recognition, and one similar...

  12. Antimicrobial efficacy of soap and water hand washing versus an alcohol-based hand cleanser.

    Science.gov (United States)

    Holton, Ronald H; Huber, Michaell A; Terezhalmy, Geza T

    2009-12-01

    The emergence of alcohol-based hand cleansers may represent an alternative to soap and water in the clinical dental setting. In this study, the antimicrobial efficacy of traditional hand washing vs. a unique alcohol-based hand cleanser with persistence was evaluated. Two experienced dentists participated over a 10-day period. On days 1-5, each clinician used an antibacterial liquid soap (Dial, Dial Corporation, Scottsdale, AZ). Days 6-10, an alcohol-based hand cleanser (Triseptin Water Optional, Healthpoint Surgical, Fort Worth, TX) was used. Sampling was by modified glove juice technique. The results indicate that the alcohol-based hand cleanser dramatically outperforms the traditional hand washing agent in the general dental setting.

  13. A Review Of Multimodal Biometric Authentication Systems

    OpenAIRE

    Kunal Kumar; Mohammed Farik

    2015-01-01

    Authentication is the process of validating the identity of a person based on certain input that the person provides. Authentication has become a major topic of research due to the increasing number of attacks on computer networks around the globe. This review paper focuses on multimodal biometric authentication systems in use today. The aim is to elicit the best combination of authentication factors for multimodal use. We study the strengths and weakness of selected biometric mechanisms and ...

  14. [Disinfection efficacy of hand hygiene based on chlorhexidine gluconate content and usage of alcohol-based hand-rubbing solution].

    Science.gov (United States)

    Tanaka, Ippei; Watanabe, Kiyoshi; Nakaminami, Hidemasa; Azuma, Chihiro; Noguchi, Norihisa

    2014-01-01

    Recently, the procedure for surgical hand hygiene has been switching to a two-stage method and hand-rubbing method from the traditional hand-scrubbing method. Both the two-stage and hand-rubbing methods use alcohol-based hand-rubbing after hand washing. The former requires 5 min of antiseptic hand washing, and the latter 1 min of nonantiseptic hand washing. For a prolonged bactericidal effect in terms of surgical hand hygiene, chlorhexidine gluconate (CHG) has been noted due to its residual activity. However, no detailed study comparing the disinfection efficacy and prolonged effects according to different contents of CHG and the usage of alcohol-based hand-rubbing has been conducted. The glove juice method is able to evaluate disinfection efficacy and prolonged effects of the disinfectants more accurately because it can collect not only transitory bacteria but also normal inhabitants on hands. In the present study, we examined the disinfection efficacy and prolonged effects on alcohol-based hand-rubbing containing CHG by six hand-rubbing methods and three two-stage methods using the glove juice method. In both methods, 3 mL (one pump dispenser push volume) alcohol-based hand-rubbing solution containing 1% (w/v) CHG showed the highest disinfection efficacy and prolonged effects, and no significant difference was found between the hand-rubbing and two-stage methods. In the two methods of hand hygiene, the hand-rubbing method was able to save time and cost. Therefore, the data strongly suggest that the hand-rubbing method using a one pump dispenser push volume of alcohol-based hand-rubbing solution containing 1% (w/v) CHG is suitable for surgical hand hygiene.

  15. Practical biometrics from aspiration to implementation

    CERN Document Server

    Ashbourn, Julian

    2015-01-01

    This practically-focused text presents a hands-on guide to making biometric technology work in real-life scenarios. Extensively revised and updated, this new edition takes a fresh look at what it takes to integrate biometrics into wider applications. An emphasis is placed on the importance of a complete understanding of the broader scenario, covering technical, human and implementation factors. This understanding may then be exercised through interactive chapters dealing with educational software utilities and the BANTAM Program Manager. Topics and features: provides a concise introduction t

  16. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  17. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    Full Text Available In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  18. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  19. Method for Improving EEG Based Emotion Recognition by Combining It with Synchronized Biometric and Eye Tracking Technologies in a Non-invasive and Low Cost Way

    Science.gov (United States)

    López-Gil, Juan-Miguel; Virgili-Gomá, Jordi; Gil, Rosa; Guilera, Teresa; Batalla, Iolanda; Soler-González, Jorge; García, Roberto

    2016-01-01

    Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric, and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving forty-four people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals, and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self-regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA) data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self-regulation does

  20. Method for Improving EEG Based Emotion Recognition by Combining It with Synchronized Biometric and Eye Tracking Technologies in a Non-invasive and Low Cost Way.

    Science.gov (United States)

    López-Gil, Juan-Miguel; Virgili-Gomá, Jordi; Gil, Rosa; García, Roberto

    2016-01-01

    Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric, and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving forty-four people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals, and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self-regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA) data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self-regulation does

  1. Method for improving EEG based emotion recognition by combining it with synchronized biometric and eye tracking technologies in a non-invasive and low cost way

    Directory of Open Access Journals (Sweden)

    Juan-Miguel López-Gil

    2016-08-01

    Full Text Available Technical advances, particularly the integration of wearable and embedded sensors, facilitate tracking of physiological responses in a less intrusive way. Currently, there are many devices that allow gathering biometric measurements from human beings, such as EEG Headsets or Health Bracelets. The massive data sets generated by tracking of EEG and physiology may be used, among other things, to infer knowledge about human moods and emotions. Apart from direct biometric signal measurement, eye tracking systems are nowadays capable of determining the point of gaze of the users when interacting in ICT environments, which provides an added value research on many different areas, such as psychology or marketing. We present a process in which devices for eye tracking, biometric and EEG signal measurements are synchronously used for studying both basic and complex emotions. We selected the least intrusive devices for different signal data collection given the study requirements and cost constraints, so users would behave in the most natural way possible. On the one hand, we have been able to determine basic emotions participants were experiencing by means of valence and arousal. On the other hand, a complex emotion such as empathy has also been detected. To validate the usefulness of this approach, a study involving 44 people has been carried out, where they were exposed to a series of affective stimuli while their EEG activity, biometric signals and eye position were synchronously recorded to detect self-regulation. The hypothesis of the work was that people who self regulated would show significantly different results when analyzing their EEG data. Participants were divided into two groups depending on whether Electro Dermal Activity (EDA data indicated they self-regulated or not. The comparison of the results obtained using different machine learning algorithms for emotion recognition shows that using EEG activity alone as a predictor for self

  2. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  3. A natural approach to convey numerical digits using hand activity recognition based on hand shape features

    Science.gov (United States)

    Chidananda, H.; Reddy, T. Hanumantha

    2017-06-01

    This paper presents a natural representation of numerical digit(s) using hand activity analysis based on number of fingers out stretched for each numerical digit in sequence extracted from a video. The analysis is based on determining a set of six features from a hand image. The most important features used from each frame in a video are the first fingertip from top, palm-line, palm-center, valley points between the fingers exists above the palm-line. Using this work user can convey any number of numerical digits using right or left or both the hands naturally in a video. Each numerical digit ranges from 0 to9. Hands (right/left/both) used to convey digits can be recognized accurately using the valley points and with this recognition whether the user is a right / left handed person in practice can be analyzed. In this work, first the hand(s) and face parts are detected by using YCbCr color space and face part is removed by using ellipse based method. Then, the hand(s) are analyzed to recognize the activity that represents a series of numerical digits in a video. This work uses pixel continuity algorithm using 2D coordinate geometry system and does not use regular use of calculus, contours, convex hull and datasets.

  4. Corneal topography measurements for biometric applications

    Science.gov (United States)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  5. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? Classified information access ? Employment access ? Insurance claims ? Medical identity theft ? Criminal identity theft ? System reproduction ? Hobbyism Identity Theft: How is it Done? ? CSIR 2012 Slide 6 ? Knowledge based platform ? e.g. PIN... ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity...

  6. Machine Learning for Biometrics

    NARCIS (Netherlands)

    A.A. Salah (Albert Ali); E. Soria; J.D. Martin; R. Magdalena; M. Martinez; A.J. Serrano

    2009-01-01

    htmlabstractBiometrics aims at reliable and robust identification of humans from their personal traits, mainly for security and authentication purposes, but also for identifying and tracking the users of smarter applications. Frequently considered modalities are fingerprint, face, iris, palmprint

  7. Biometrics Technology Review 2002

    National Research Council Canada - National Science Library

    Blackburn, T

    2003-01-01

    .... The report characterizes the main categories of biometric techniques, with a focus on face recognition, which is the least intrusive but most effective means of applying filters at access points to the country...

  8. Biometrics and Kansei engineering

    CERN Document Server

    2012-01-01

    Includes a section on touchscreen devices Proposes a new mathematical model on Iris Recognition Introduces a new technological system dealing with human Kansei Covers the latest achievements in biometric application features

  9. Hand-Geometry Recognition Based on Contour Parameters

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.; Bazen, A.M.; Booij, W.D.T.; Hendrikse, A.J.; Jain, A.K.; Ratha, N.K.

    This paper demonstrates the feasibility of a new method of hand-geometry recognition based on parameters derived from the contour of the hand. The contour is completely determined by the black-and-white image of the hand and can be derived from it by means of simple image-processing techniques. It

  10. iHand: an interactive bare-hand-based augmented reality interface on commercial mobile phones

    Science.gov (United States)

    Choi, Junyeong; Park, Jungsik; Park, Hanhoon; Park, Jong-Il

    2013-02-01

    The performance of mobile phones has rapidly improved, and they are emerging as a powerful platform. In many vision-based applications, human hands play a key role in natural interaction. However, relatively little attention has been paid to the interaction between human hands and the mobile phone. Thus, we propose a vision- and hand gesture-based interface in which the user holds a mobile phone in one hand but sees the other hand's palm through a built-in camera. The virtual contents are faithfully rendered on the user's palm through palm pose estimation, and reaction with hand and finger movements is achieved that is recognized by hand shape recognition. Since the proposed interface is based on hand gestures familiar to humans and does not require any additional sensors or markers, the user can freely interact with virtual contents anytime and anywhere without any training. We demonstrate that the proposed interface works at over 15 fps on a commercial mobile phone with a 1.2-GHz dual core processor and 1 GB RAM.

  11. Score level fusion scheme based on adaptive local Gabor features for face-iris-fingerprint multimodal biometric

    Science.gov (United States)

    He, Fei; Liu, Yuanning; Zhu, Xiaodong; Huang, Chun; Han, Ye; Chen, Ying

    2014-05-01

    A multimodal biometric system has been considered a promising technique to overcome the defects of unimodal biometric systems. We have introduced a fusion scheme to gain a better understanding and fusion method for a face-iris-fingerprint multimodal biometric system. In our case, we use particle swarm optimization to train a set of adaptive Gabor filters in order to achieve the proper Gabor basic functions for each modality. For a closer analysis of texture information, two different local Gabor features for each modality are produced by the corresponding Gabor coefficients. Next, all matching scores of the two Gabor features for each modality are projected to a single-scalar score via a trained, supported, vector regression model for a final decision. A large-scale dataset is formed to validate the proposed scheme using the Facial Recognition Technology database-fafb and CASIA-V3-Interval together with FVC2004-DB2a datasets. The experimental results demonstrate that as well as achieving further powerful local Gabor features of multimodalities and obtaining better recognition performance by their fusion strategy, our architecture also outperforms some state-of-the-art individual methods and other fusion approaches for face-iris-fingerprint multimodal biometric systems.

  12. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  13. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  14. Robotic Hand Controlling Based on Flexible Sensor

    OpenAIRE

    BILGIN, Süleyman; ÜSER, YAVUZ; Mercan, Muhammet

    2016-01-01

    Today's technology has increased the interest in robotic systems andincrease the number of studies realized in this area.  There are many studies on robotic systems inseveral fields to facilitate human life in the literature. In this study, arobot hand is designed to repeat finger movements depending upon flexiblesensors mounted on any wearable glove. In the literature, various sensors thatdetect the finger movement are used. The sensor that detects the angle of thefingers has b...

  15. Haar-like Rectangular Features for Biometric Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rashidi, Maryam

    2013-01-01

    , which mostly have been used for detection, for biometric recognition. The proposed system has been tested for three different biometrics: ear, iris, and hand vein patterns and it is shown that it is robust against most of the mentioned degradations and it outperforms state-of-the-art systems......Developing a reliable, fast, and robust biometric recognition system is still a challenging task. This is because the inputs to these systems can be noisy, occluded, poorly illuminated, rotated, and of very low-resolutions. This paper proposes a probabilistic classifier using Haar-like features...

  16. A Biometric Face Recognition System Using an Algorithm Based on the Principal Component Analysis Technique

    Directory of Open Access Journals (Sweden)

    Gheorghe Gîlcă

    2015-06-01

    Full Text Available This article deals with a recognition system using an algorithm based on the Principal Component Analysis (PCA technique. The recognition system consists only of a PC and an integrated video camera. The algorithm is developed in MATLAB language and calculates the eigenfaces considered as features of the face. The PCA technique is based on the matching between the facial test image and the training prototype vectors. The mathcing score between the facial test image and the training prototype vectors is calculated between their coefficient vectors. If the matching is high, we have the best recognition. The results of the algorithm based on the PCA technique are very good, even if the person looks from one side at the video camera.

  17. Improvement of Varioptic's liquid lens based on electrowetting: how to obtain a short response time and its application in the design of a high resolution iris biometric system

    Science.gov (United States)

    Burger, Benjamin; Meimon, Serge C.; Petit, Cyril; Nguyen, Minh Chau

    2015-02-01

    This communication presents the results obtained for decreasing the response time of electrowetting-based real time focus correctors (liquid lenses). In order to provide a compact iris biometric system demonstrator, we have achieved a response time at 90% of 7.5 ms for a change in focalization from 0 diopter to 10 diopter with a liquid lens having an aperture of 1.9 mm. We have used a hydrodynamic fluid reorganization model to predict the features of these fast liquid lenses and evaluated the sensivity of the response time to the different conception parameters.

  18. Biometrics-based service marketing issues: exploring acceptability and risk factors of iris scans associated with registered travel programmes.

    Science.gov (United States)

    Smith, Alan D

    2008-01-01

    The marketability and viability of biometric technologies by companies marketing their own versions of pre-approved registered travel programmes have generated a number of controversies. Data were collected and analysed to formulate graphs, run regression and correlation analyses, and use Chi-square to formally test basic research propositions on a sample of 241 professionals in the Pittsburgh area. It was found that there was a significant relationship between the respondents' familiarity with new technology (namely web-enabled and internet sophistication) and knowledge of biometrics, in particular iris scans. Participants who frequently use the internet are more comfortable with innovative technology; although individuals with higher income levels have less trust in the government, it appeared that virtually everyone is concerned about trusting the government with their personal information. Healthcare professionals need to document the safety, CRM-related factors, and provide leadership in the international collaboration of biometric-related personal identification technologies, since they will be one of the main beneficiaries of the implementation of such technologies.

  19. Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images

    Directory of Open Access Journals (Sweden)

    R. Youmaran

    2012-01-01

    Full Text Available This paper develops an approach to measure the information content in a biometric feature representation of iris images. In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. The collected data is regularized using a Gaussian model of the feature covariances in order to practically measure the biometric information with limited data samples. An example of this method is shown for iris templates processed using Principal-Component Analysis- (PCA- and Independent-Component Analysis- (ICA- based feature decomposition schemes. From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. This value approximately matches previous estimates of iris information content.

  20. [Biometric and biomechanic analysis of lumbar posterior facets based on a CT-scan database].

    Science.gov (United States)

    Bronsard, N; Serre, T; Staccini, P; Hovorka, I; Thollon, L; Padovani, B; de Peretti, F; Signoli, M; Tropiano, P

    2013-03-01

    Our knowledge on anatomy of lumbar spine is based on few cadaver's study with old and few subjects. CT-scan is very precise for lumbar facet's morphology. We have analysed 400 subjects. The aim of this study is to measure different distances, angles and circles to better understand the mechanical function of the lumbar facets. We have analysed 720 CT-scan. We had 217 men and 183 women with 59 years of mean age. We used native slices of 1.25 mm thick from L1 to S1. We created transversal plan and we put different mark point. We took their coordinates and we have calculated different distances, angles and mechanical circles. We have compared different axis of rotation of the facets. From L1 to S1, the facets goes near to the posterior wall and far from themselves. Moreover, the posterior angle between both facets increase down to the sacrum. The radius of the left side circle and the right one are very closed in 50% of the cases but the three radius are close only in 10% of cases. This study based on 400 subjects shows that there is not a unique axis of rotation for both lumbar posterior facets. We have had only 50% of symmetry between both sides whatever the level studied. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  1. Anatomy of Biometric Passports

    Directory of Open Access Journals (Sweden)

    Dominik Malčík

    2012-01-01

    Full Text Available Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification technology and biometrics, especially (but not only in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation; moreover, specific security mechanisms are optional and can be omitted.

  2. Anatomy of biometric passports.

    Science.gov (United States)

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted).

  3. 3D face analysis for demographic biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Tokola, Ryan A [ORNL; Mikkilineni, Aravind K [ORNL; Boehnen, Chris Bensing [ORNL

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  4. Biometric Authentication Systems Attacks: Liveness Detection to the ...

    African Journals Online (AJOL)

    Before current era of security complexities, password alone was enough to protect systems. However, hackers have perfected algorithms to break through data bases protected only by pass words. This has led to extended research towards the deployment of of Biometric Authentication Systems (BAS). Biometric systems are ...

  5. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Breebaart, Jeroen; Buhan, I.R.; Veldhuis, Raymond N.J.; Vijaya Kumar, B.V.K.; Prabhakar, Salil; Ross, Arun A.

    2010-01-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved

  6. Kinematic Structures Description of Bionic Hand Based on VF Set

    Science.gov (United States)

    Liu, Xiancan; Bai, Pengying; Luo, Min; Gao, Meng; Zhan, Qiang

    2017-03-01

    This paper presents a method for describing kinematic structure of bionic hand based on VF (virtual finger) set. At first, a 20 DOFs (degrees of freedom) human hand kinematic model is built, which is expressed by five fingers’ kinematic chains consisting of kinematic pairs and symbols that represent geometric relationships of kinematic pairs’ axes. Based on the concept of VF, the hand fingers are divided into two types: VFAA having adduction/abduction motion and VFFE having flexion/extension motion. The concept of VF set comprising VFAAs and VFFEs is defined, human hand and six basic grasp postures are described by VF set. Then, the structures corresponding VFAA and VFFE are given according to active and passive forms of finger joints, and VFFE Structure-Base comprising 20 conventional structures is built. Based on VF set and the structures of VFAA and VFFE, VF sets and kinematic structures of several classic bionic hands are given.

  7. Hand gesture recognition based on convolutional neural networks

    Science.gov (United States)

    Hu, Yu-lu; Wang, Lian-ming

    2017-11-01

    Hand gesture has been considered a natural, intuitive and less intrusive way for Human-Computer Interaction (HCI). Although many algorithms for hand gesture recognition have been proposed in literature, robust algorithms have been pursued. A recognize algorithm based on the convolutional neural networks is proposed to recognize ten kinds of hand gestures, which include rotation and turnover samples acquired from different persons. When 6000 hand gesture images were used as training samples, and 1100 as testing samples, a 98% recognition rate was achieved with the convolutional neural networks, which is higher than that with some other frequently-used recognition algorithms.

  8. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    2010-02-25

    Feb 25, 2010 ... most biometric researchers because of its wide application in various security systems. Existing global fingerprint matching algorithms are not efficient as ..... Department of Computer Science and. Electrical Engineering for granting me access to his laboratory at West Virginia. University, USA and for his ...

  9. A phenomenology of occupation-based hand therapy.

    Science.gov (United States)

    Colaianni, Donna J; Provident, Ingrid; DiBartola, Leesa M; Wheeler, Steven

    2015-06-01

    The existing tension between holistic, occupation focused approaches and the medical model in occupational therapy is most evident in the area of hand therapy. Occupation-based hand therapy has been proposed as a means to alleviate this tension. However, there is a lack of research on occupation-based hand therapy. Clearly describing and defining what constitutes occupation-based hand therapy can facilitate efficacy research and help promote occupation-based practice in keeping with the philosophy of the profession. The qualitative approach of phenomenology as described by Moustakas was used. Participants who were occupational therapists with more than 5 years of experience who self -identified as occupation-based practitioners were recruited to the point of saturation using criterion and chain sampling for a final total of 10 participants. Data were collected through audio recorded telephone interviews and electronic mail. The data were reduced and distilled into a description of the experience of providing occupation-based hand therapy. Participants described the experience of providing occupation-based hand therapy around the concepts of influences, psychosocial benefits, procedural elements of practice and challenges. Findings of this study can assist occupational therapists to develop a more occupation-based intervention program through focusing on occupation-based theory, being intentional, using occupation-focused interventions and building an occupation focused context. Findings can also inform future research into the efficacy of occupation-based hand therapy, appropriate timing for balancing occupation with tissue protection, and the effects of therapist experience on their ability to use an occupation-based approach in hand therapy. © 2015 Occupational Therapy Australia.

  10. Virucidal activity of alcohol-based hand rub disinfectants.

    Science.gov (United States)

    Iwasawa, Atsuo; Niwano, Yoshimi; Kohno, Masahiro; Ayaki, Masahiko

    2012-03-01

    We investigated the virucidal activity of commercially available alcohol-based hand rub products against coxsackievirus A7, B5, feline calicivirus F9, and human adenovirus type 3, type 7, type 8 using susceptible cell lines, Vero cells, CRFK cells, and A549 cells. Fifteen tested hand rub products were ethanol (EtOH) for disinfection (Japanese Pharmacopoeia Grade), two EtOH-based products, one povidone iode-containing product, one alkyldiaminoethylglycine hydrochloride-containing product, six benzalkonium chloride (BAK)-containing products, and four chlorohexidine gluconate (CHG)-containing products. Some active ingredients (BAK, benzetonium chloride, and CHG) were diluted with EtOH to make 0.5% and 0.2% solutions. Virus inactivation rates were calculated after contact with each hand rub product for 10 or 60 seconds. Of the hand rub products tested, only the povidone iode-based product showed antiviral activity superior to that of EtOH against all the strains. EtOH solutions of active ingredients (0.2% and 0.5%) also showed decreased antiviral activity. In conclusion, antiviral activity of all the commercially available alcohol-based hand rub products except that containing povidone idode was dependent on their active ingredients. The povidone idode-containing hand rub product kept its effectiveness even after the dilution with EtOH. Although alcohol-based hand rub products are convenient and suitable for the control of some microbes, they are not generally recommended for the control of viral infections.

  11. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  12. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  13. Mathematical and information maintenance of biometric systems

    Science.gov (United States)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  14. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  15. An Adaptive Superpixel Based Hand Gesture Tracking and Recognition System

    Directory of Open Access Journals (Sweden)

    Hong-Min Zhu

    2014-01-01

    Full Text Available We propose an adaptive and robust superpixel based hand gesture tracking system, in which hand gestures drawn in free air are recognized from their motion trajectories. First we employed the motion detection of superpixels and unsupervised image segmentation to detect the moving target hand using the first few frames of the input video sequence. Then the hand appearance model is constructed from its surrounding superpixels. By incorporating the failure recovery and template matching in the tracking process, the target hand is tracked by an adaptive superpixel based tracking algorithm, where the problem of hand deformation, view-dependent appearance invariance, fast motion, and background confusion can be well handled to extract the correct hand motion trajectory. Finally, the hand gesture is recognized by the extracted motion trajectory with a trained SVM classifier. Experimental results show that our proposed system can achieve better performance compared to the existing state-of-the-art methods with the recognition accuracy 99.17% for easy set and 98.57 for hard set.

  16. Alcohol-based hand disinfection: a more robust hand-hygiene method in an intensive care unit.

    Science.gov (United States)

    Tvedt, C; Bukholm, G

    2005-03-01

    This study involved observation of hand-hygiene behaviour and evaluation of the effect of alcohol-based hand disinfection and handwashing with plain liquid soap on microbial flora. The study was performed in a combined medical and surgical intensive care unit. We demonstrated a crude compliance of hand hygiene of 50.4%, which was only performed adequately in 20.8% of cases. Of this group, handwashing and hand-disinfection procedures were performed properly 34.0% and 71.6% of the time, respectively. Hand samples for bacteriological examinations with the glove juice method demonstrated that whilst handwashing was sensitive to the way in which hand hygiene was performed, alcohol-based hand disinfection was less sensitive to such performance. Our study demonstrated that alcohol-based hand disinfection is a robust hand-hygiene method with many advantages in a practical setting. It is very feasible for use in hospital wards.

  17. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  18. Analyzing personalized policies for online biometric verification.

    Directory of Open Access Journals (Sweden)

    Apaar Sadhwani

    Full Text Available Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR subject to constraints on the false accept rate (FAR and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses 12 biometrics for each resident, which represents a five (four, respectively log reduction in FRR relative to fingerprint (iris, respectively policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR and acquires an average of 1.3 fingerprints per resident.

  19. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  20. Analysis of eigenvalue correction applied to biometrics

    NARCIS (Netherlands)

    Hendrikse, A.J.; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan; Bazen, A.M.

    Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic

  1. Ability of Hand Hygiene Interventions Using Alcohol-Based Hand Sanitizers and Soap To Reduce Microbial Load on Farmworker Hands Soiled during Harvest.

    Science.gov (United States)

    de Aceituno, Anna Fabiszewski; Bartz, Faith E; Hodge, Domonique Watson; Shumaker, David J; Grubb, James E; Arbogast, James W; Dávila-Aviña, Jorgé; Venegas, Fabiola; Heredia, Norma; García, Santos; Leon, Juan S

    2015-11-01

    Effective hand hygiene is essential to prevent the spread of pathogens on produce farms and reduce foodborne illness. The U.S. Food and Drug Administration Food Safety Modernization Act Proposed Rule for Produce Safety recommends the use of soap and running water for hand hygiene of produce handlers. The use of alcohol-based hand sanitizer (ABHS) may be an effective alternative hygiene intervention where access to water is limited. There are no published data on the efficacy of either soap or ABHS-based interventions to reduce microbial contamination in agricultural settings. The goal of this study was to assess the ability of two soap-based (traditional or pumice) and two ABHS-based (label-use or two-step) hygiene interventions to reduce microbes (coliforms, Escherichia coli, and Enterococcus spp.) and soil (absorbance of hand rinsate at 600 nm [A600]) on farmworker hands after harvesting produce, compared with the results for a no-hand-hygiene control. With no hand hygiene, farmworker hands were soiled (median A600, 0.48) and had high concentrations of coliforms (geometric mean, 3.4 log CFU per hand) and Enterococcus spp. (geometric mean, 5.3 log CFU per hand) after 1 to 2 h of harvesting tomatoes. Differences in microbial loads in comparison to the loads in the control group varied by indicator organism and hygiene intervention (0 to 2.3 log CFU per hand). All interventions yielded lower concentrations of Enterococcus spp. and E. coli (P hands (P hand washing with soap at reducing indicator organisms on farmworker hands. Based on these results, ABHS is an efficacious hand hygiene solution for produce handlers, even on soiled hands.

  2. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  3. BIOMETRICS IN ZOOTECHNICS

    Directory of Open Access Journals (Sweden)

    Gordana Kralik

    2012-12-01

    Full Text Available University textbook Biometrics in zootechnics, by authors Prof.Dr.Sc.Dr.hc. Gordana Kralik, Prof.Dr. Zoran Škrtić and Assist.Prof.Dr. Zlata Kralik from the Faculty of Agriculture in Osijek, contains the following chapters: 1. Introduction overview, 2. Sample analysis, 3. Parameter estimation, 4. Hypothesis testing, 5. Variance analysis of experimental plans, 6. Regression and correlation, 7. Calculation of statistical parameters in Microsoft Office Excel 2007, 8. Scientific and professional work, Literature, Symbols and formulas, Material (tables and Index – glossary. The textbook is written for undergraduate, graduate and postgraduate students of the Faculty of Agriculture, J.J. Strossmayer University of Osijek. As longtime university teachers, authors noticed the need for publishing textbook Biometrics in zootechnics due to the lack of literature. The textbook can also be used by students from other agricultural universities and agronomists who want to acquire basic knowledge about the use of biometric methods in the zootechnics. The aim of the authors is to clarify the core issues of research work and biometric data processing to interested readers in a simple and acceptable way. Students and professionals who wish to be engaged in research work should be familiar with the planning and conduction of experiments, data collection and analysis, data processing, as well as interpretation of results. From cooperation and contacts with the students, authors have realized the fact that many of them are not prone to mathematics. The textbook is written without mathematical “derivation” and theoretical interpretations and is easily accessible to students and experts to whom it is intended.

  4. Web-based interactive drone control using hand gesture

    Science.gov (United States)

    Zhao, Zhenfei; Luo, Hao; Song, Guang-Hua; Chen, Zhou; Lu, Zhe-Ming; Wu, Xiaofeng

    2018-01-01

    This paper develops a drone control prototype based on web technology with the aid of hand gesture. The uplink control command and downlink data (e.g., video) are transmitted by WiFi communication, and all the information exchange is realized on web. The control command is translated from various predetermined hand gestures. Specifically, the hardware of this friendly interactive control system is composed by a quadrotor drone, a computer vision-based hand gesture sensor, and a cost-effective computer. The software is simplified as a web-based user interface program. Aided by natural hand gestures, this system significantly reduces the complexity of traditional human-computer interaction, making remote drone operation more intuitive. Meanwhile, a web-based automatic control mode is provided in addition to the hand gesture control mode. For both operation modes, no extra application program is needed to be installed on the computer. Experimental results demonstrate the effectiveness and efficiency of the proposed system, including control accuracy, operation latency, etc. This system can be used in many applications such as controlling a drone in global positioning system denied environment or by handlers without professional drone control knowledge since it is easy to get started.

  5. Quantum Biometrics with Retinal Photon Counting

    Science.gov (United States)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  6. 2D Hand Tracking Based on Flocking with Obstacle Avoidance

    Directory of Open Access Journals (Sweden)

    Zihong Chen

    2014-02-01

    Full Text Available Hand gesture-based interaction provides a natural and powerful means for human-computer interaction. It is also a good interface for human-robot interaction. However, most of the existing proposals are likely to fail when they meet some skin-coloured objects, especially the face region. In this paper, we present a novel hand tracking method which can track the features of the hand based on the obstacle avoidance flocking behaviour model to overcome skin-coloured distractions. It allows features to be split into two groups under severe distractions and merge later. The experiment results show that our method can track the hand in a cluttered background or when passing the face, while the Flocking of Features (FoF and the Mean Shift Embedded Particle Filter (MSEPF methods may fail. These results suggest that our method has better performance in comparison with the previous methods. It may therefore be helpful to promote the use of the hand gesture-based human-robot interaction method.

  7. Markerless Kinect-Based Hand Tracking for Robot Teleoperation

    Directory of Open Access Journals (Sweden)

    Guanglong Du

    2012-07-01

    Full Text Available This paper presents a real-time remote robot teleoperation method using markerless Kinect-based hand tracking. Using this tracking algorithm, the positions of index finger and thumb in 3D can be estimated by processing depth images from Kinect. The hand pose is used as a model to specify the pose of a real-time remote robot's end-effector. This method provides a way to send a whole task to a remote robot instead of sending limited motion commands like gesture-based approaches and this method has been tested in pick-and-place tasks.

  8. Attitudes and practices of Irish hospital-based physicians towards hand hygiene and hand rubbing using alcohol-based hand rub: a comparison between 2007 and 2015.

    Science.gov (United States)

    Kingston, L M; Slevin, B L; O'Connell, N H; Dunne, C P

    2017-09-01

    Hand hygiene is the cornerstone of infection prevention and control practices, and reduces healthcare-associated infections significantly. However, international evidence suggests that medical doctors demonstrate poor compliance. To explore and compare practices and attitudes towards hand hygiene, particularly hand rubbing using alcohol-based hand rub (ABHR), among hospital-based physicians in Ireland between 2007 and 2015. In 2007, a random sample of doctors in a large teaching hospital was invited to complete a postal survey using a validated questionnaire. In 2015, the study was replicated among all doctors employed in a university hospital group, including the setting of the original study, using an online survey. Data were analysed using SPSS and Survey Monkey. Predominately positive and improving attitudes and practices were found, with 86% of doctors compliant with hand hygiene before patient contact in 2015, compared with 58% in 2007. Ninety-one percent of doctors were compliant after patient contact in 2015, compared with 76% in 2007. In 2015, only 39% of respondents reported that they 'almost always' used ABHR for hand hygiene. However, this represents 13.5% more than in 2007. Stated barriers to use of ABHR included dermatological issues, poor acceptance, tolerance and poor availability of ABHR products. Greater awareness of hand hygiene guidelines and greater governance appear to have had a positive impact on practice. However, despite this, practice remains suboptimal and there is scope for substantial improvement. Continued and sustained efforts are required in order to build on progress achieved since the World Health Organization hand hygiene guidelines were published in 2009. Copyright © 2017 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  9. An overview on biometric identification methods and implementations

    Science.gov (United States)

    Stroica, Petre; Vladescu, Marian

    2010-11-01

    The paper presents the three most efficient methods of biometric identification: fingerprint recognition, face recognition and iris recognition. The authors evaluated the performance of each method, based on the concept of error rates. The paper also presents an overview of the biometric identification implementations, highlighting the advantages and disadvantages from a practical point of view, based on a balance between reliability and invasiveness of each method.

  10. Logistic Map for Cancellable Biometrics

    Science.gov (United States)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  11. Biometrics — Developments and Potential

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond N.J.

    2014-01-01

    This article describes the use of biometric technology in forensic science, for the development of new methods and tools, improving the current forensic biometric applications, and allowing for the creation of new ones. The article begins with a definition and a summary of the development of this

  12. Effect of home-based hand exercises in women with hand osteoarthritis: a randomised controlled trial.

    Science.gov (United States)

    Hennig, Toril; Hæhre, Liv; Hornburg, Vivian Tryving; Mowinckel, Petter; Norli, Ellen Sauar; Kjeken, Ingvild

    2015-08-01

    Hand exercises are recommended for patients with hand osteoarthritis (HOA), though evidence for their effect is conflicting. To evaluate, in a randomised controlled trial, the effect of HOA information plus home-based hand exercises (exercise group) compared with information only (control group) in women with HOA. Interventions were delivered by two occupational therapists. Exercise group participants received eight follow-up calls over the 3-month study and recorded adherence, pain after exercises and adverse events in a diary. Primary outcome was activity performance measured after 3 months by the Patient-Specific Functional Scale (PSFS), with a range of 0-10. Secondary outcomes were measurements of hand function, disease activity, symptoms and number of responders to treatment according to the OMERACT-OARSI criteria. Of 80 women randomised (40 : 40) (mean age (SD) 60.8 years (7.0)), follow-up was 89% (n=71). An intention-to-treat analysis was performed. The adjusted mean difference for the exercise versus control group was 1.4 points (95% CI 0.6 to 2.2, effect size 1.0) for the PSFS score. Thirteen patients in the exercise group versus three participants in the control group reached a positive minimal clinical important difference of 2.2 points in the PSFS total score, while none versus two, respectively, had a negative change (p=0.007). For secondary outcomes, significant mean differences were found in grip strength and thumb web space, in fatigue, joint pain and the Functional Index for HOA activity performance scores. Sixteen exercise-group participants fulfilled the OMERACT-OARSI response criteria versus two control-group participants (pHand exercises were well tolerated and significantly improved activity performance, grip strength, pain and fatigue in women with HOA. ISRTCN79019063. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  13. Biometric Recognition: Overview and Applications | Iloanusi ...

    African Journals Online (AJOL)

    These advantages make biometric recognition the preferred mode for most virtual and access control. Biometrics is universal and easily implemented with existing or new technologies. This paper discusses biometric recognition; the different modalities of biometric recognition technology; their strengths, limitations and ...

  14. Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers.

    Science.gov (United States)

    Sun, Yunlian; Zhang, Man; Sun, Zhenan; Tan, Tieniu

    2018-02-01

    Biometrics is the technique of automatically recognizing individuals based on their biological or behavioral characteristics. Various biometric traits have been introduced and widely investigated, including fingerprint, iris, face, voice, palmprint, gait and so forth. Apart from identity, biometric data may convey various other personal information, covering affect, age, gender, race, accent, handedness, height, weight, etc. Among these, analysis of demographics (age, gender, and race) has received tremendous attention owing to its wide real-world applications, with significant efforts devoted and great progress achieved. This survey first presents biometric demographic analysis from the standpoint of human perception, then provides a comprehensive overview of state-of-the-art advances in automated estimation from both academia and industry. Despite these advances, a number of challenging issues continue to inhibit its full potential. We second discuss these open problems, and finally provide an outlook into the future of this very active field of research by sharing some promising opportunities.

  15. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  16. Biometrics and ID Cards — Enablers for Personal Security

    Science.gov (United States)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  17. Cross Disciplinary Biometric Systems

    CERN Document Server

    Liu, Chengjun

    2012-01-01

    Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance.  Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their face publicly every day. Face recognition systems display superb performance when they capitalize on the innovative ideas across color science, mathematics, and computer science (e.g., pattern recognition, machine learning, and image processing). The novel ideas lead to the development of new color models and effective ...

  18. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  19. Heart Electrical Actions as Biometric Indicia

    Science.gov (United States)

    Schipper, John F. (Inventor); Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor); Belousof, Eugene (Inventor)

    2013-01-01

    A method and associated system for use of statistical parameters based on peak amplitudes and/or time interval lengths and/or depolarization-repolarization vector angles and/or depolarization-repolarization vector lengths for PQRST electrical signals associated with heart waves, to identify a person. The statistical parameters, estimated to be at least 192, serve as biometric indicia, to authenticate, or to decline to authenticate, an asserted identity of a candidate person.

  20. Biometrics Research and Engineering Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — As the Department of Defense moves forward in its pursuit of integrating biometrics technology into facility access control, the Global War on Terrorism and weapon...

  1. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  2. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  3. Alignment and bit extraction for secure fingerprint biometrics

    Science.gov (United States)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  4. MULTIMODAL BIOMETRIC AUTHENTICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM WITH FINGERPRINT AND IRIS

    Directory of Open Access Journals (Sweden)

    A. Muthukumar

    2012-02-01

    Full Text Available In general, the identification and verification are done by passwords, pin number, etc., which is easily cracked by others. In order to overcome this issue biometrics is a unique tool for authenticate an individual person. Nevertheless, unimodal biometric is suffered due to noise, intra class variations, spoof attacks, non-universality and some other attacks. In order to avoid these attacks, the multimodal biometrics i.e. combining of more modalities is adapted. In a biometric authentication system, the acceptance or rejection of an entity is dependent on the similarity score falling above or below the threshold. Hence this paper has focused on the security of the biometric system, because compromised biometric templates cannot be revoked or reissued and also this paper has proposed a multimodal system based on an evolutionary algorithm, Particle Swarm Optimization that adapts for varying security environments. With these two concerns, this paper had developed a design incorporating adaptability, authenticity and security.

  5. Signal and image processing for biometrics

    CERN Document Server

    Proença, Hugo; Du, Eliza

    2014-01-01

    This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

  6. Gaze as a biometric

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Carmichael, Tandy [Tennessee Technological University; Tourassi, Georgia [ORNL

    2014-01-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  7. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication...

  8. Multi-order analysis framework for comprehensive biometric performance evaluation

    Science.gov (United States)

    Gorodnichy, Dmitry O.

    2010-04-01

    It is not uncommon for contemporary biometric systems to have more than one match below the matching threshold, or to have two or more matches having close matching scores. This is especially true for those that store large quantities of identities and/or are applied to measure loosely constrained biometric traits, such as in identification from video or at a distance. Current biometric performance evaluation standards however are still largely based on measuring single-score statistics such as False Match, False Non-Match rates and the trade-off curves based thereon. Such methodology and reporting makes it impossible to investigate the risks and risk mitigation strategies associated with not having a unique identifying score. To address the issue, Canada Border Services Agency has developed a novel modality-agnostic multi-order performance analysis framework. The framework allows one to analyze the system performance at several levels of detail, by defining the traditional single-score-based metrics as Order-1 analysis, and introducing Order- 2 and Order-3 analysis to permit the investigation of the system reliability and the confidence of its recognition decisions. Implemented in a toolkit called C-BET (Comprehensive Biometrics Evaluation Toolkit), the framework has been applied in a recent examination of the state-of-the art iris recognition systems, the results of which are presented, and is now recommended to other agencies interested in testing and tuning the biometric systems.

  9. Biometric authentication for ID cards with hologram watermarks

    Science.gov (United States)

    Croce Ferri, Lucilla; Mayerhoefer, Astrid; Frank, Marcus; Vielhauer, Claus; Steinmetz, Ralf

    2002-04-01

    We present an analysis of a new technique for the authentication of ID cardholders, based on the integration of a biometrics-based authentication system with digital watermarks. The chosen biometric authentication method is the dynamic signature verification of the ID cardholder, while we use a specific integrity watermark technique we developed, called Hologram Watermark, to embed and retrieve the off-line data onto an ID card. We take advantage of the fact, that two static biometric features (images of the user's face and signature) are already integral part of ID cards for manual verification and extent the stored biometric information by embedding on-line handwriting features of the signature as holographic watermarks in the overall image information of an ID card. Manipulation of any of the image information can be detected and will further disallow biometric verification of the forger. The Hologram Watermark technique produces content-related data using computer-generated hologram coding techniques. These data are embedded with watermarking techniques into the personal data printed on an ID card. The content-related data in this specific application are the dynamic features of the cardholder's signature. The main goal of this paper is to analyze the suitability of dynamic signature verification in combination with the Hologram Watermark technique, to facilitate automated user authentication based on information transparently embedded in ID cards.

  10. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  11. MULTI-MODEL BIOMETRICS AUTHENTICATION FRAMEWORK

    OpenAIRE

    Sneha Kurhekar; Harshvardhan Upadhyay

    2016-01-01

    Authentication is the process to conform the truth of an attribute claimed by real entity. Biometric technology is widely useful for the process of authentication. Today, biometric is becoming a key aspect in a multitude of applications. So this paper proposed the applications of such a multimodal biometric authentication system. Proposed system establishes a real time authentication framework using multi-model biometrics which consists of the embedded system verify the signatures, fingerprin...

  12. The use of biometrics in IT

    OpenAIRE

    Bílý, Petr

    2009-01-01

    Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems wi...

  13. Ocular biometric changes after trabeculectomy

    Directory of Open Access Journals (Sweden)

    Azam Alvani

    2016-01-01

    Full Text Available This review article aimed to evaluate ocular biometric changes after trabeculectomy. The PubMed database was searched using the keywords “axial length” (AL, “anterior chamber depth” (ACD, “corneal astigmatism,” “corneal topography” and “trabeculectomy.” The extracted studies were categorized based on the evaluated parameters and the biometry method (contact and non-contact. Comparable studies with respect to their sample size were combined for statistical analysis. Twenty-five studies including 690 individuals which met the inclusion criteria were selected. After trabeculectomy, a significant and persistent AL reduction, with a range of 0.1-0.19 and 0.1-0.9 mm measured with contact and non-contact methods, respectively, was observed. With respect to topographic changes, 0.38-1.4 diopters (D with-the-rule (WTR astigmatism was induced postoperatively. All studies revealed ACD reduction immediately after surgery, which gradually deepened and approximated its preoperative levels on day 14. ACD reduction was not significant after that period in the majority of cases. In conclusion, changes in ACD is of small amount and of short period, thus it can be ignored; however, reported changes in AL and keratometry are of sufficient magnitude and can affect the refractive prediction of combined cataract surgery and trabeculectomy.

  14. Comparison of an alcohol-based hand rub and water-based chlorhexidine gluconate scrub technique for hand antisepsis prior to elective surgery in horses.

    Science.gov (United States)

    da Silveira, Eduardo Almeida; Bubeck, Kirstin A; Batista, Edisleidy Rodriguez; Piat, Perrine; Laverty, Sheila; Beauchamp, Guy; Archambault, Marie; Elce, Yvonne

    2016-02-01

    This prospective clinical study evaluates the effectiveness of an alcohol-based hand rub (Avagard™) for pre-surgical hand antisepsis in an equine hospital and compares it with traditional scrubbing technique using 4% chlorhexidine gluconate sponges and water. Prior to elective surgery, 3 board-certified surgeons were randomly assigned to hand antisepsis with either technique. Culture samples of each hand were taken at 4 times: before and after neutral soap hand wash, after scrub or rubbing technique, and after surgery. There was no significant difference in mean bacterial colony forming units between scrub and rub techniques over the 3 time periods (P = 0.6), controlling for initial counts. One horse from the scrub group had a skin incision infection following stifle arthroscopy; this was resolved with medical treatment. The alcohol-based hand rub is equivalent in efficacy for pre-surgical hand antisepsis to traditional water-based scrubs in an equine hospital setting.

  15. 3D biometrics systems and applications

    CERN Document Server

    Zhang, David

    2013-01-01

    Includes discussions on popular 3D imaging technologies, combines them with biometric applications, and then presents real 3D biometric systems Introduces many efficient 3D feature extraction, matching, and fusion algorithms Techniques presented have been supported by experimental results using various 3D biometric classifications

  16. Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Breebaart, J.; Buhan, I.R.; Veldhuis, Raymond N.J.

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from, or binding a key to the binary vector derived from the

  17. Reducing viral contamination from finger pads: handwashing is more effective than alcohol-based hand disinfectants

    NARCIS (Netherlands)

    Tuladhar, E.; Hazeleger, W.C.; Koopmans, M.; Zwietering, M.H.; Duizer, E.

    2015-01-01

    Background - Hand hygiene is important for interrupting transmission of viruses through hands. Effectiveness of alcohol-based hand disinfectant has been shown for bacteria but their effectiveness in reducing transmission of viruses is ambiguous. Aim - To test efficacy of alcohol hand disinfectant

  18. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  19. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  20. Survey of attitudes and practices of Irish nursing students towards hand hygiene, including handrubbing with alcohol-based hand rub.

    Science.gov (United States)

    Kingston, Liz M; O'Connell, Nuala H; Dunne, Colum P

    2017-05-01

    Hand hygiene is widely recognised as the most important measure a healthcare worker can take in preventing the spread of healthcare associated infections. As a member of the healthcare team, nursing students have direct patient contact during clinical practice; hence, good hand hygiene practice among nursing students is essential. Low to moderate levels of hand hygiene knowledge and poor attitudes and practices are reported among nursing students. However, less is known about their attitudes and practices of handrubbing with ABHR, even though handrubbing is the recommended optimum practice in most situations. The aim of this study was to explore attitudes and practices of hand hygiene, in particular handrubbing with alcohol-based hand rub, among nursing students in Ireland. This survey employed a descriptive, self-report design using a questionnaire to gather data. It was administered electronically to all undergraduate nursing students (n=342) in the Department of Nursing and Midwifery at the University of Limerick, Ireland in March and April 2015. Response rate was 66%. Attitudes towards hand hygiene were generally positive. Compliance with hand hygiene after contact with body fluid was high (99.5%) and before a clean or aseptic procedure (98.5%). However, suboptimal practices emerged, before touching a patient (85%), after touching a patient (87%) and after touching patients' surroundings (61%), with first year students more compliant than fourth year students. 16% of students were not aware of the clinical contraindications for using alcohol-based hand rub and 9% did not know when to use soap and water and when to use alcohol-based hand rub. Educators and practitioners play an important role in ensuring that nursing students develop appropriate attitudes towards hand hygiene and engage in optimal handrubbing practices. Raising awareness among nursing students of their responsibility in preventing the occurrence and reducing the transmission of HCAI as an on

  1. Hand eczema in hairdressers: a Danish register-based study of the prevalence of hand eczema and its career consequences.

    Science.gov (United States)

    Lysdal, Susan Hovmand; Søsted, Heidi; Andersen, Klaus Ejner; Johansen, Jeanne Duus

    2011-09-01

    Occupational hand eczema is common in hairdressers, owing to wet work and hairdressing chemicals. To estimate the prevalence of hand eczema and its career consequences among hairdressers in Denmark. A register-based study was conducted, comprising all graduates from hairdressing vocational schools from 1985 to 2007 (n = 7840). The participants received a self-administered postal questionnaire including questions on hand eczema, atopic dermatitis, and career change. A response rate of 67.9% (n = 5324) was obtained. Of the respondents, 44.3% no longer worked as hairdressers and had worked for an average of 8.4 years in the profession before leaving it. Hand eczema was more common among ex-hairdressers (48.4%) than among current hairdressers (37.6%) (p career change. In this group, logistic regression analysis showed that chronic hand eczema contributed the most to the decision to change career (odds ratio 50.12; 95% confidence interval 18.3-137). Hairdressers work an average of 8.4 years in the profession before leaving it, and hand eczema contributes significantly to this career change. © 2011 John Wiley & Sons A/S.

  2. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    Science.gov (United States)

    Strait, Robert S.; Pearson, Peter K.; Sengupta, Sailes K.

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  3. Modeling and prototyping of biometric systems using dataflow programming

    Science.gov (United States)

    Minakova, N.; Petrov, I.

    2018-01-01

    The development of biometric systems is one of the labor-intensive processes. Therefore, the creation and analysis of approaches and techniques is an urgent task at present. This article presents a technique of modeling and prototyping biometric systems based on dataflow programming. The technique includes three main stages: the development of functional blocks, the creation of a dataflow graph and the generation of a prototype. A specially developed software modeling environment that implements this technique is described. As an example of the use of this technique, an example of the implementation of the iris localization subsystem is demonstrated. A variant of modification of dataflow programming is suggested to solve the problem related to the undefined order of block activation. The main advantage of the presented technique is the ability to visually display and design the model of the biometric system, the rapid creation of a working prototype and the reuse of the previously developed functional blocks.

  4. Estimating Body Related Soft Biometric Traits in Video Frames

    Directory of Open Access Journals (Sweden)

    Olasimbo Ayodeji Arigbabu

    2014-01-01

    Full Text Available Soft biometrics can be used as a prescreening filter, either by using single trait or by combining several traits to aid the performance of recognition systems in an unobtrusive way. In many practical visual surveillance scenarios, facial information becomes difficult to be effectively constructed due to several varying challenges. However, from distance the visual appearance of an object can be efficiently inferred, thereby providing the possibility of estimating body related information. This paper presents an approach for estimating body related soft biometrics; specifically we propose a new approach based on body measurement and artificial neural network for predicting body weight of subjects and incorporate the existing technique on single view metrology for height estimation in videos with low frame rate. Our evaluation on 1120 frame sets of 80 subjects from a newly compiled dataset shows that the mentioned soft biometric information of human subjects can be adequately predicted from set of frames.

  5. Heartbeat Signal from Facial Video for Biometric Recognition

    DEFF Research Database (Denmark)

    Haque, Mohammad Ahsanul; Nasrollahi, Kamal; Moeslund, Thomas B.

    2015-01-01

    Different biometric traits such as face appearance and heartbeat signal from Electrocardiogram (ECG)/Phonocardiogram (PCG) are widely used in the human identity recognition. Recent advances in facial video based measurement of cardio-physiological parameters such as heartbeat rate, respiratory rate......, and blood volume pressure provide the possibility of extracting heartbeat signal from facial video instead of using obtrusive ECG or PCG sensors in the body. This paper proposes the Heartbeat Signal from Facial Video (HSFV) as a new biometric trait for human identity recognition, for the first time...

  6. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  7. Evaluation of Two Methods of Determining the Efficacies of Two Alcohol-Based Hand Rubs for Surgical Hand Antisepsis

    Science.gov (United States)

    Kampf, Günter; Ostermeyer, Christiane; Heeg, Peter; Paulson, Daryl

    2006-01-01

    The antimicrobial efficacies of preparations for surgical hand antisepsis can be determined according to a European standard (prEN 12791 [EN]) and a U.S. standard (tentative final monograph for health care antiseptic drug products [TFM]). The U.S. method differs in the product application mode (hands and lower forearms, versus hands only in EN), the number of applications (11 over 5 days, versus a single application in EN), the sampling times (0, 3, and 6 h after application, versus 0 and 3 h in EN), the sampling methods (glove juice versus fingertip sampling in EN), and the outcome requirements (absolute bacterial reduction factor [RF], versus noninferiority to reference treatment in EN). We have studied the efficacies of two hand rubs according to both methods. One hand rub was based on 80% ethanol and applied for 2 min, and the other one was based on 45% propan-2-ol, 30% propan-1-ol, and 0.2% mecetronium etilsulfate and applied for 1.5 min. The ethanol-based hand rub was equally effective as the 3-min reference disinfection of prEN 12791 in both the immediate (RFs, 2.97 ± 0.89 versus 2.92 ± 1.03, respectively) and sustained (RFs, 2.20 ± 1.07 versus 2.47 ± 1.25, respectively) effects. According to TFM, the immediate effects were 2.99 log10 (day 1), 3.00 log10 (day 2), and 3.43 log10 (day 5), and bacterial counts were still below baseline after 6 h. The propanol-based hand rub was even more effective than the reference disinfection of prEN 12791 in both the immediate (RFs, 2.35 ± 0.99 versus 1.86 ± 0.87, respectively) and sustained (RFs, 2.17 ± 1.00 versus 1.50 ± 1.26, respectively) effects. According to TFM, the immediate effects were 2.82 log10 (day 1), 3.29 log10 (day 2), and 3.25 log10 (day 5), and bacterial counts were still below baseline after 6 h. Some formulations have been reported to meet the efficacy requirements of one of the methods but not those of the other. That is why we conclude that, despite our results, meeting the efficacy

  8. Comparative antibacterial effectiveness of alcohol and herbal based commercially available hand antiseptics

    Directory of Open Access Journals (Sweden)

    K Vipin Jain

    2013-01-01

    Full Text Available Background: Human skin is a reservoir of numerous microorganisms. Even though hand washing with soap and water alone reduces the microbial load, the complementary uses of hand antiseptics enhance the antimicrobial effect. Aim: To compare the antimicrobial effectiveness of two commercially available hand antiseptics, routinely used in dental practice, after hand washing with antiseptic soap. Method: A clinical trial with cross over design was carried out on 12 health care workers (HCWs. The antibacterial effectiveness of two hand antiseptics (Alcohol based -Sterillium and Herbal Based-Himalaya′s ′Pure Hands′ compared using fingerprint contact sampling on blood agar. Bacterial samples were obtained before and after hand washing (with antiseptic soap and after hand disinfection. The data was tabulated and analyzed using one way ANOVA and Tukey′s post hoc test for pair-wise comparison. Result: There was a slight decrease in the Colony forming units (CFUs count following use of antiseptic soap when compared to the baseline values. A statistically significant reduction (p<0.000 in the CFUs count was seen following use of both hand antiseptics but the mean number of CFUs reduction was more in case of alcohol based hand antiseptic(sterillium than herbal based hand antiseptic(Himalaya′s ′PureHands". Conclusion: Using alcohol based antiseptic soap before hygienic hand disinfection will provide maximum benefit in reducing the microbial count.

  9. A dynamically weighted multi-modal biometric security system

    CSIR Research Space (South Africa)

    Brown, Dane

    2016-09-01

    Full Text Available the match score-level. However, leveraging this potential requires a new approach. This work demonstrates a novel dynamic weighting algorithm for improved image-based biometric feature-fusion. A comparison is performed on uni-modal, bi-modal, tri...

  10. Laboratory evaluation of the IriScan prototype biometric identifier

    Energy Technology Data Exchange (ETDEWEB)

    Bouchier, F.; Ahrens, J.S.; Wells, G.

    1996-04-01

    One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometric device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.

  11. Mobile biometric device (MBD) technology :

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  12. Advances in the biometric recognition methods: a survey on iris and fingerprint recognition

    Science.gov (United States)

    Zaeri, Naser; Alkoot, Fuad

    2010-02-01

    Human recognition based on biometrics finds many important applications in many life sectors and in particular in commercial and law enforcement. This paper aims to give a general overview of the advances in the biometric recognition methods. We concentrate on main methods and accessible ideas presented for human recognition systems based on two types of biometrics: iris and fingerprint. We present a quick overview of the landmark papers that laid the foundation in each track then we present the latest updates and important turns and solutions that developed in each track in the last few years.

  13. Evaluation of antibacterial efficacy of some alcohol-based Hand ...

    African Journals Online (AJOL)

    In this study, we evaluated the antibacterial efficacy of some popular hand sanitizers sold in Ilorin. The well-variant of the agar diffusion test was used to evaluate the efficacy of the products against Staphylococcus aureus, Streptococcus pneumoniae, Escherichia coli, Pseudomonas aeruginosa and Klebsiella pneumoniae.

  14. Hand based visual intent recognition algorithm for wheelchair motion

    CSIR Research Space (South Africa)

    Luhandjula, T

    2010-05-01

    Full Text Available This paper describes an algorithm for a visual human-machine interface that infers a person’s intention from the motion of the hand. Work in progress shows a proof of concept tested on static images. The context for which this solution is intended...

  15. Machine Learning-Empowered Biometric Methods for Biomedicine Applications

    Directory of Open Access Journals (Sweden)

    Qingxue Zhang

    2017-07-01

    Full Text Available Nowadays, pervasive computing technologies are paving a promising way for advanced smart health applications. However, a key impediment faced by wide deployment of these assistive smart devices, is the increasing privacy and security issue, such as how to protect access to sensitive patient data in the health record. Focusing on this challenge, biometrics are attracting intense attention in terms of effective user identification to enable confidential health applications. In this paper, we take special interest in two bio-potential-based biometric modalities, electrocardiogram (ECG and electroencephalogram (EEG, considering that they are both unique to individuals, and more reliable than token (identity card and knowledge-based (username/password methods. After extracting effective features in multiple domains from ECG/EEG signals, several advanced machine learning algorithms are introduced to perform the user identification task, including Neural Network, K-nearest Neighbor, Bagging, Random Forest and AdaBoost. Experimental results on two public ECG and EEG datasets show that ECG is a more robust biometric modality compared to EEG, leveraging a higher signal to noise ratio and also more distinguishable morphological patterns. Among different machine learning classifiers, the random forest greatly outperforms the others and owns an identification rate as high as 98%. This study is expected to demonstrate that properly selected biometric empowered by an effective machine learner owns a great potential, to enable confidential biomedicine applications in the era of smart digital health.

  16. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  17. Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios

    Directory of Open Access Journals (Sweden)

    P. Peer

    2014-01-01

    Full Text Available Cloud computing represents one of the fastest growing areas of technology and offers a new computing model for various applications and services. This model is particularly interesting for the area of biometric recognition, where scalability, processing power, and storage requirements are becoming a bigger and bigger issue with each new generation of recognition technology. Next to the availability of computing resources, another important aspect of cloud computing with respect to biometrics is accessibility. Since biometric cloud services are easily accessible, it is possible to combine different existing implementations and design new multibiometric services that next to almost unlimited resources also offer superior recognition performance and, consequently, ensure improved security to its client applications. Unfortunately, the literature on the best strategies of how to combine existing implementations of cloud-based biometric experts into a multibiometric service is virtually nonexistent. In this paper, we try to close this gap and evaluate different strategies for combining existing biometric experts into a multibiometric cloud service. We analyze the (fusion strategies from different perspectives such as performance gains, training complexity, or resource consumption and present results and findings important to software developers and other researchers working in the areas of biometrics and cloud computing. The analysis is conducted based on two biometric cloud services, which are also presented in the paper.

  18. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    Directory of Open Access Journals (Sweden)

    A. Drosou

    2011-01-01

    Full Text Available Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  19. Hand Gesture Based Wireless Robotic Arm Control for Agricultural Applications

    Science.gov (United States)

    Kannan Megalingam, Rajesh; Bandhyopadhyay, Shiva; Vamsy Vivek, Gedela; Juned Rahi, Muhammad

    2017-08-01

    One of the major challenges in agriculture is harvesting. It is very hard and sometimes even unsafe for workers to go to each plant and pluck fruits. Robotic systems are increasingly combined with new technologies to automate or semi automate labour intensive work, such as e.g. grape harvesting. In this work we propose a semi-automatic method for aid in harvesting fruits and hence increase productivity per man hour. A robotic arm fixed to a rover roams in the in orchard and the user can control it remotely using the hand glove fixed with various sensors. These sensors can position the robotic arm remotely to harvest the fruits. In this paper we discuss the design of hand glove fixed with various sensors, design of 4 DoF robotic arm and the wireless control interface. In addition the setup of the system and the testing and evaluation under lab conditions are also presented in this paper.

  20. Incidence of hand eczema in a population-based twin cohort

    DEFF Research Database (Denmark)

    Lerbaek, A; Kyvik, Kirsten Ohm; Ravn, H

    2007-01-01

    BACKGROUND: Population-based studies on the incidence of hand eczema are sparse. OBJECTIVES: The aim of this prospective follow-up study was to determine the incidence rate of hand eczema in a population-based twin cohort. Secondly, the role of genetic factors and other potential risk factors...... for hand eczema was investigated. METHODS: A questionnaire on self-reported hand eczema was answered by 5610 and 4128 twin individuals in 1996 and 2005, respectively. Data were analysed in a Poisson regression analysis. RESULTS: The crude incidence rate was 8.8 cases per 1000 person-years (95% confidence...... interval, [CI] 7.7-9.9). Incidence rate ratios (IRRs) dependent on the co-twin's hand eczema status revealed a significant, doubled risk for monozygotic twin individuals with a co-twin affected by hand eczema, compared with dizygotic twin individuals with a co-twin affected by hand eczema (IRR 2.4, 95% CI...

  1. BioFoV - An open platform for forensic video analysis and biometric data extraction

    DEFF Research Database (Denmark)

    Almeida, Miguel; Correia, Paulo Lobato; Larsen, Peter Kastmand

    2016-01-01

    to tailor-made software, based on state of art knowledge in fields such as soft biometrics, gait recognition, photogrammetry, etc. This paper proposes an open and extensible platform, BioFoV (Biometric Forensic Video tool), for forensic video analysis and biometric data extraction, aiming to host some...... of the developments that researchers come up with for solving specific problems, but that are often not shared with the community. BioFoV includes a simple to use Graphical User Interface (GUI), is implemented with open software that can run in multiple software platforms, and its implementation is publicly available....

  2. Biometric iris image acquisition system with wavefront coding technology

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Yang, Hsi-Wen; Huang, Shao-Hung; Li, Yung-Hui; Tien, Chung-Hao

    2013-09-01

    Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on; the other scenario is dependent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code

  3. Biometric Secured Result Processing Software For Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Oladipo Oluwasegun

    2015-08-01

    Full Text Available Abstract One of the challenges facing result processing in Nigerian tertiary institutions is the problem of insecurity. Untraceable changes are made to students result and this result to various disasters such as innocent people losing their jobs since their innocence cannot be proven. Biometric based systems operate on behavioral and physiological biometric data to identify a person and grant required access to a user. Physiological characteristics such as fingerprint remains unchanged throughout an individuals life time and thus it can serve as a viable means of identifying and authenticating users who are to access a system. In this study fingerprint biometric based result processing software is developed to ensure that users are well authenticated and are made to see only what they are pre-configured to see and work with. The fingerprint authentication system was developed using visual basic.net. Staff fingerprints were enrolled into the system to form a biometric template which the system validates against at every login attempt on the result processing software. The digital personal one touch ID sdk and other libraries were used in developing the authentication system. The result processing software also ensures that all write transactions to the database are confirmed and identified by forcing another biometric authentication at the point of making a write request to the web server and associated database. This ensures that the exact person initiating the transaction was the same user who logged in to the application. The users identified at login and various confirmation milestones set for write transactions are logged into a table for future reference and audit trail. Conclusively the developed system has helped to eradicate the problem of user impersonation by ensuring only authorized users are made to access the software and in-turn participate in result processing activities.

  4. Machine learning techniques for gait biometric recognition using the ground reaction force

    CERN Document Server

    Mason, James Eric; Woungang, Isaac

    2016-01-01

    This book focuses on how machine learning techniques can be used to analyze and make use of one particular category of behavioral biometrics known as the gait biometric. A comprehensive Ground Reaction Force (GRF)-based Gait Biometrics Recognition framework is proposed and validated by experiments. In addition, an in-depth analysis of existing recognition techniques that are best suited for performing footstep GRF-based person recognition is also proposed, as well as a comparison of feature extractors, normalizers, and classifiers configurations that were never directly compared with one another in any previous GRF recognition research. Finally, a detailed theoretical overview of many existing machine learning techniques is presented, leading to a proposal of two novel data processing techniques developed specifically for the purpose of gait biometric recognition using GRF. This book · introduces novel machine-learning-based temporal normalization techniques · bridges research gaps concerning the effect of ...

  5. Biometric systems technology, design and performance evaluation

    CERN Document Server

    Wayman, James; Maltoni, Davide

    2005-01-01

    A reference book for anyone involved in the design, management or implementation of biometric systems, and provides all the information needed to a build reliable system. It focuses on the four most widely used types of biometric technology - speech, fingerprint, iris and face recognition.

  6. Semiparametric Copula Models for Biometric Score Level

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    In biometric recognition systems, biometric samples (images of faces, finger- prints, voices, gaits, etc.) of people are compared and classifiers (matchers) indicate the level of similarity between any pair of samples by a score. If two samples of the same person are compared, a genuine score is

  7. Controlling Leakage of Biometric Information using Dithering

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Buhan, I.R.; Doumen, J.M.; Hartel, P.H.

    Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric data. Fuzzy extractors can be used to authenticate a user to a server without storing her biometric data directly. However, in the Information Theoretic sense fuzzy extractors will leak information about the

  8. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    We have proposed dual watermarking scheme with multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly offline signature is overlaid translucently on image. Before embedding, speech is compressed using Linear Predictive Coding (LPC) and Gabor face is created ...

  9. Technical, Legal, Economic and Social Aspects of Biometrics for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jernej Bule

    2014-12-01

    Full Text Available This article addresses technical, legal, economic and social aspects of biometrics for cloud computing, featuring application example, gains of such solution, current laws, directives and legislation for biometrics and cloud computing. It is primarily based on Slovenian example due to  common  general  EU  legislation  in  the  field  of  cloud  computing  and  biometrics. Authentication  on  the  Internet  is  still  mainly  done  using  passwords,  while  biometrics  is practically  not  used.  It  is  commonly  known  that  everything  is  moving  to  the  cloud  and biometrics is not an exception. Amount of biometric data is expected to grow significantly over the next few years and only cloud computing is possible to process such amounts of data. Due to these facts and increasing security needs, we propose and implement the use of biometry as a service in the cloud. A challenge regarding the use of biometric solutions in the cloud is the protection of the privacy of individuals and their personal data. In Slovenia privacy legislation is very strong, it permits usage of biometrics only for very specific reasons, but we predict that big players on the market will change this fact globally. One of the important reasons for that is also the fact that biometrics for cloud computing provides some strong benefits and economic incentives. Proper deployment can provide significant savings. Such solutions could improve people’s quality of life in terms of social development, especially in sense of more convenient, safer and reliable identification over multiple government and non-government services.

  10. CAR ACCESS USING MULTIMODAL BIOMETRICS

    OpenAIRE

    Lupu, Catalin

    2010-01-01

    This paper presents the use of multimodal biometrics in order to identify or to verify a person that wants to start the engine of a car. First of all, a fingerprint sensor is posted on the car’s door, one on the steering wheel, a camera for iris recognition on the car's main mirror, and finally a microphone for voice recognition. There are two possibilities: if the person is identified as the car owner or a known user, then he/she can take control over the car; if it’s an intruder, the car ca...

  11. Biometric and intelligent decision making support

    CERN Document Server

    Kaklauskas, Arturas

    2015-01-01

    This book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people’s needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master’s degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities fo...

  12. Mobile networks for biometric data analysis

    CERN Document Server

    Madrid, Natividad; Seepold, Ralf; Orcioni, Simone

    2016-01-01

    This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient’s prevention pl...

  13. SU-E-T-502: Biometrically Accepted Patient Records

    Energy Technology Data Exchange (ETDEWEB)

    Basavatia, A; Kalnicki, S; Garg, M; Lukaj, A; Hong, L [Montefiore Medical Center, Bronx, NY (United States); Fret, J [Montefiore Information Technology, Yonkers, NY (United States); Yaparpalvi, R [Montefiore Medical Center, Bronx, NY (United States); Montefiore Medical Center, Bronx, NY (United States); Tome, W [Montefiore Medical Center/Albert Einstein College of Medicine, Bronx, NY (United States)

    2014-06-01

    Purpose: To implement a clinically useful palm vein pattern recognition biometric system to treat the correct treatment plan to the correct patient each and every time and to check-in the patient into the department to access the correct medical record. Methods: A commercially available hand vein scanning system was paired to Aria and utilized an ADT interface from the hospital electronic health system. Integration at two points in Aria, version 11 MR2, first at the appointment tracker screen for the front desk medical record access and second at the queue screen on the 4D treatment console took place for patient daily time-out. A test patient was utilized to check accuracy of identification as well as to check that no unintended interactions take place between the 4D treatment console and the hand vein scanning system. This system has been in clinical use since December 2013. Results: Since implementation, 445 patients have been enrolled into our biometric system. 95% of patients learn the correct methodology of hand placement on the scanner in the first try. We have had two instances of patient not found because of a bad initial scan. We simply erased the scanned metric and the patient enrolled again in those cases. The accuracy of the match is 100% for each patient, we have not had one patient misidentified. We can state this because we still use patient photo and date of birth as identifiers. A QA test patient is run monthly to check the integrity of the system. Conclusion: By utilizing palm vein scans along with the date of birth and patient photo, another means of patient identification now exits. This work indicates the successful implementation of technology in the area of patient safety by closing the gap of treating the wrong plan to a patient in radiation oncology. FOJP Service Corporation covered some of the costs of the hardware and software of the palm vein pattern recognition biometric system.

  14. Miniature Biometric Sensor Project

    Science.gov (United States)

    Falker, John; Terrier, Douglas; Clayton, Ronald; Hanson, Andrea; Cooper, Tommy; Downs, Meghan; Flint, Stephanie; Reyna, Baraquiel; Simon, Cory; Wilt, Grier

    2015-01-01

    Heart rate monitoring (HRM) is a critical need during exploration missions. Unlike the four separate systems used on ISS today, the single HRM system should perform as a diagnostic tool, perform well during exercise or high level activity, and be suitable for use during EVA. Currently available HRM technologies are dependent on uninterrupted contact with the skin and are prone to data drop-out and motion artifact when worn in the spacesuit or during exercise. Here, we seek an alternative to the chest strap and electrode based sensors currently in use on ISS today. This project aims to develop a single, high performance, robust biosensor with focused efforts on improved heart rate data quality collection during high intensity activity such as exercise or EVA.

  15. Hand eczema in hairdressers: a Danish register-based study of the prevalence of hand eczema and its career consequences

    DEFF Research Database (Denmark)

    Lysdal, Susan Hovmand; Søsted, Heidi; Andersen, Klaus Ejner

    2011-01-01

    Occupational hand eczema is common in hairdressers, owing to wet work and hairdressing chemicals.......Occupational hand eczema is common in hairdressers, owing to wet work and hairdressing chemicals....

  16. Lossy Compression of Biometric Images Implemented Using Floating Point DSP Processor

    Directory of Open Access Journals (Sweden)

    Azuwam Azuwam Ali Alhadi

    2017-01-01

    Full Text Available In this paper, several numbers of biometric images are compressed in order to reduce the number of bits needed in representing an image with conservation of image quality. Biometric images compression is important to solve the problem of efficiently transmitting data and storing large number of biometric images in low capacity of memory device. Biometric images are compressed using two techniques which are DCT and Quantization. The compression algorithm is implemented on general purpose computer and DSP processor in order to compare between both of them in terms processing time and evaluate the performance of this technique by measuring the difference between the original image and reconstructed image using PSNR, SSIM and MSE. Experimental results show DCT algorithm produces a high quality for reconstructed images with acceptable compression rate in terms of quality level is more than 50%. Furthermore, implementing the proposed algorithm using DSP board achieves better performance in terms of processing time compared with PC based.

  17. Using Biometric Characteristics to Increase ITS Security

    Directory of Open Access Journals (Sweden)

    Miroslav Bača

    2007-11-01

    Full Text Available Terrorist attacks in New York City and Washington, Districtof Columbia on the morning of September 11, 2001 havechanged our lives. The secwity problem became very importantregarding all spheres of human activities. Tracking persons(employees, customers etc. in ITS (Intelligent Transport Systemis a huge problem. Biometrics offers a very good solutionfor this problem and is today maybe one of the most promisingtechniques for person's secure verification and authentication;biometric system also features some advantages when comparedto other security systems. When using a biometric systemone has to be careful because the functionality of a biometricapplication can be dramatically aggravated if inappropriatebiometric features are selected. Classification of biometric featureson contact and contactless, or distinction between"strong" and "soft" biometric features gives a framework for usingbiometric features, but it does not ensure that biometric featŁtres are implemented at a satisfactory level. The usage ofmultimodal or unimodal biometric system can significantly increasethe system security but it also opens plenty of questionslike privacy etc. This paper describes the implementation ofbiometric features which can be used in ITS, and delineates anew model of usage.

  18. NUI framework based on real-time head pose estimation and hand gesture recognition

    Directory of Open Access Journals (Sweden)

    Kim Hyunduk

    2016-01-01

    Full Text Available The natural user interface (NUI is used for the natural motion interface without using device or tool such as mice, keyboards, pens and markers. In this paper, we develop natural user interface framework based on two recognition module. First module is real-time head pose estimation module using random forests and second module is hand gesture recognition module, named Hand gesture Key Emulation Toolkit (HandGKET. Using the head pose estimation module, we can know where the user is looking and what the user’s focus of attention is. Moreover, using the hand gesture recognition module, we can also control the computer using the user’s hand gesture without mouse and keyboard. In proposed framework, the user’s head direction and hand gesture are mapped into mouse and keyboard event, respectively.

  19. Post-trabeculectomy ocular biometric changes.

    Science.gov (United States)

    Pakravan, Mohammad; Alvani, Azam; Esfandiari, Hamed; Ghahari, Elham; Yaseri, Mehdi

    2017-03-01

    Trabeculectomy is the most common surgical procedure for the management of glaucoma, which may significantly influence ocular biometry. Axial length and anterior chamber depth tend to decrease, while crystalline lens and choroidal thickness increase post-operatively. An increase in with-the-rule astigmatism is also observed after the procedure. Such biometric changes affect intraocular lens power calculation even years after the procedure. Non-contact biometric methods and postponing cataract surgery after trabeculectomy could reduce calculation errors associated with surgically induced alterations in ocular biometrics. © 2016 Optometry Australia.

  20. The Invisible Hand of Inquiry-Based Learning

    Science.gov (United States)

    Bennett, Mark

    2015-01-01

    The key elements of learning in a classroom remain largely invisible. Teachers cannot expect every student to learn to their fullest capacity; yet they can augment learning within a classroom through inquiry-based learning. In this article, the author describes inquiry-based learning and how to begin this process in the classroom.

  1. Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images

    OpenAIRE

    Youmaran, R.; Adler, A.

    2012-01-01

    This paper develops an approach to measure the information content in a biometric feature representation of iris images. In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. The collected data is regularized using a Gaussian model of the feature covariances in order to practically measure the biometric information with limited data samples. An example of this method is shown for iris templates ...

  2. Principal components analysis based control of a multi-dof underactuated prosthetic hand

    Directory of Open Access Journals (Sweden)

    Magenes Giovanni

    2010-04-01

    Full Text Available Abstract Background Functionality, controllability and cosmetics are the key issues to be addressed in order to accomplish a successful functional substitution of the human hand by means of a prosthesis. Not only the prosthesis should duplicate the human hand in shape, functionality, sensorization, perception and sense of body-belonging, but it should also be controlled as the natural one, in the most intuitive and undemanding way. At present, prosthetic hands are controlled by means of non-invasive interfaces based on electromyography (EMG. Driving a multi degrees of freedom (DoF hand for achieving hand dexterity implies to selectively modulate many different EMG signals in order to make each joint move independently, and this could require significant cognitive effort to the user. Methods A Principal Components Analysis (PCA based algorithm is used to drive a 16 DoFs underactuated prosthetic hand prototype (called CyberHand with a two dimensional control input, in order to perform the three prehensile forms mostly used in Activities of Daily Living (ADLs. Such Principal Components set has been derived directly from the artificial hand by collecting its sensory data while performing 50 different grasps, and subsequently used for control. Results Trials have shown that two independent input signals can be successfully used to control the posture of a real robotic hand and that correct grasps (in terms of involved fingers, stability and posture may be achieved. Conclusions This work demonstrates the effectiveness of a bio-inspired system successfully conjugating the advantages of an underactuated, anthropomorphic hand with a PCA-based control strategy, and opens up promising possibilities for the development of an intuitively controllable hand prosthesis.

  3. Principal components analysis based control of a multi-DoF underactuated prosthetic hand.

    Science.gov (United States)

    Matrone, Giulia C; Cipriani, Christian; Secco, Emanuele L; Magenes, Giovanni; Carrozza, Maria Chiara

    2010-04-23

    Functionality, controllability and cosmetics are the key issues to be addressed in order to accomplish a successful functional substitution of the human hand by means of a prosthesis. Not only the prosthesis should duplicate the human hand in shape, functionality, sensorization, perception and sense of body-belonging, but it should also be controlled as the natural one, in the most intuitive and undemanding way. At present, prosthetic hands are controlled by means of non-invasive interfaces based on electromyography (EMG). Driving a multi degrees of freedom (DoF) hand for achieving hand dexterity implies to selectively modulate many different EMG signals in order to make each joint move independently, and this could require significant cognitive effort to the user. A Principal Components Analysis (PCA) based algorithm is used to drive a 16 DoFs underactuated prosthetic hand prototype (called CyberHand) with a two dimensional control input, in order to perform the three prehensile forms mostly used in Activities of Daily Living (ADLs). Such Principal Components set has been derived directly from the artificial hand by collecting its sensory data while performing 50 different grasps, and subsequently used for control. Trials have shown that two independent input signals can be successfully used to control the posture of a real robotic hand and that correct grasps (in terms of involved fingers, stability and posture) may be achieved. This work demonstrates the effectiveness of a bio-inspired system successfully conjugating the advantages of an underactuated, anthropomorphic hand with a PCA-based control strategy, and opens up promising possibilities for the development of an intuitively controllable hand prosthesis.

  4. Hand Hygiene Practices Among Indian Medical Undergraduates: A Questionnaire-Based Survey.

    Science.gov (United States)

    Modi, Pranav D; Kumar, Pooja; Solanki, Rajavi; Modi, Janhavi; Chandramani, Srinath; Gill, Niharika

    2017-07-12

    Background and objectives To prevent the spread of infections in all healthcare settings, hand hygiene must be routinely practiced. Appropriate hand hygiene techniques can go a long way in reducing nosocomial infections, cross-transmission of microorganisms and the risk of occupational exposure to infectious diseases. World Health Organisation (WHO) has taken an incredible approach called "My Five Moments for Hand Hygiene" which defines the key moments when health-care workers should perform hand hygiene. We thus carried out a survey to assess knowledge of hand hygiene practices among undergraduate medical students.  Materials and methods A cross-sectional survey was conducted among 523 Indian medical undergraduates. The questionnaire used was adapted from the WHO hand hygiene knowledge questionnaire for health-care workers and was distributed both, in print and online formats. The response to each question was examined using percentages. Results Nearly 57% (n=298) of medical students who participated in this study did not receive any formal training in hand hygiene. Only 27% (n=141) students knew that the most frequent source of germs responsible for health-care associated infections were the germs already present on or within the patient. Nearly 68.6% (n= 359) students were unaware of the sequence of hand washing and hand rubbing. Although 71.9% (n=376 ) students claimed that they use an alcohol-based hand rub routinely, only 36.1% (n=189 ) students knew the time required for a hand rub to kill the germs on the hands. Overall hand hygiene knowledge was low in 6.9% (n=36), moderate in 80.9% (n=423) and good in 12.2% (n=23) of respondents.  Conclusions The awareness about hand hygiene practices among medical students is low. Nearly 57% (n=298) of the respondents never received any formal training in hand hygiene throughout their course of medical undergraduate study. To prevent the spread of infections in healthcare settings, medical students should be given

  5. Computer vision-based classification of hand grip variations in neurorehabilitation.

    Science.gov (United States)

    Zariffa, José; Steeves, John D

    2011-01-01

    The complexity of hand function is such that most existing upper limb rehabilitation robotic devices use only simplified hand interfaces. This is in contrast to the importance of the hand in regaining function after neurological injury. Computer vision technology has been used to identify hand posture in the field of Human Computer Interaction, but this approach has not been translated to the rehabilitation context. We describe a computer vision-based classifier that can be used to discriminate rehabilitation-relevant hand postures, and could be integrated into a virtual reality-based upper limb rehabilitation system. The proposed system was tested on a set of video recordings from able-bodied individuals performing cylindrical grasps, lateral key grips, and tip-to-tip pinches. The overall classification success rate was 91.2%, and was above 98% for 6 out of the 10 subjects. © 2011 IEEE

  6. The biometric antecedents to happiness.

    Directory of Open Access Journals (Sweden)

    Petri Böckerman

    Full Text Available It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905 and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980 are associated with happiness in adulthood (2001. Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986 on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  7. A Vein Map Biometric System

    Directory of Open Access Journals (Sweden)

    Felix Fuentes

    2013-08-01

    Full Text Available There is increasing demand world-wide, from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but userfriendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed negatively because of many cultural and hygienic issues associated with them. Comparatively, mapping veins as a human barcode, a new technology, has many advantages over older technologies. Specifically, reproducing a three-dimensional model of a human vein system is impossible to replicate. Vein map technology is distinctive because of its state-of-the-art sensors are only able to recognize vein patterns if hemoglobin is actively flowing through the person

  8. The biometric antecedents to happiness

    Science.gov (United States)

    Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood. PMID:28915269

  9. The biometric antecedents to happiness.

    Science.gov (United States)

    Böckerman, Petri; Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  10. A Framework for Analyzing Biometric Template Aging and Renewal Prediction

    Science.gov (United States)

    2009-03-01

    biometrics that has a paucity of research is template aging and the adult age-progression, particularly facial aging. This dissertation presents a...growth. The transformation formula models a growth pattern and ratios of expansion on the craniofacial regions from adolescence to adult [RaC06a...based facial recognition technologies. Both algorithms/SDKs are camera independent, webcam capable and offer a set of programming samples and

  11. Hand Motion-Based Remote Control Interface with Vibrotactile Feedback for Home Robots

    Directory of Open Access Journals (Sweden)

    Juan Wu

    2013-06-01

    Full Text Available This paper presents the design and implementation of a hand-held interface system for the locomotion control of home robots. A handheld controller is proposed to implement hand motion recognition and hand motion-based robot control. The handheld controller can provide a ‘connect-and-play’ service for the users to control the home robot with visual and vibrotactile feedback. Six natural hand gestures are defined for navigating the home robots. A three-axis accelerometer is used to detect the hand motions of the user. The recorded acceleration data are analysed and classified to corresponding control commands according to their characteristic curves. A vibration motor is used to provide vibrotactile feedback to the user when an improper operation is performed. The performances of the proposed hand motion-based interface and the traditional keyboard and mouse interface have been compared in robot navigation experiments. The experimental results of home robot navigation show that the success rate of the handheld controller is 13.33% higher than the PC based controller. The precision of the handheld controller is 15.4% more than that of the PC and the execution time is 24.7% less than the PC based controller. This means that the proposed hand motion-based interface is more efficient and flexible.

  12. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    Science.gov (United States)

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  13. Binary Biometric Representation through Pairwise Polar Quantization

    NARCIS (Netherlands)

    Chen, C.; Veldhuis, Raymond N.J.; Tistarelli, M.; Nixon, M.

    Binary biometric representations have great significance for data compression and template protection. In this paper, we introduce pairwise polar quantization. Furthermore, aiming to optimize the discrimination between the genuine Hamming distance (GHD) and the imposter Hamming distance (IHD), we

  14. Autopoietic Theory as a Framework for Biometrics

    Directory of Open Access Journals (Sweden)

    Markus Schatten

    2009-01-01

    Full Text Available Autopoietic theory which represents a framework for describing complex non-linear and especially living systems is described in a context of biometric characteristics. It is argued that any living system by performing an internal process of reproducing its structural components yields physical biometric characteristics. Likewise any living system when structurally coupling to another (eventually allopoietic system yields a behavioral or psychological characteristic of the living system. It is shown that any system that can be considered as autopoietic can potentially be measured, authenticated and/or identified using adequate biometric methods, and thus biometrics is applicable to any autopoietic system: living beings, groups of living beings, social systems, organizations as well as information systems. In the end implications of such a conceptualization are discussed as well as possible applications.

  15. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    In 2002, the President of the United States established an organization within the DOD to develop and promulgate biometrics technologies to achieve security in information, information systems, weapons, and facilities...

  16. America Identified: Biometric Technology and Society

    National Research Council Canada - National Science Library

    Michael Qualls

    2012-01-01

    ... to explore "societal perceptions of biometrie technology" (p. vii). Many entry devices that require personal information for identification and may have a camera observing the individual are not bio-metric...

  17. Fast Invariant Contour-Based Classification of Hand Symbols for HCI

    Science.gov (United States)

    Bader, Thomas; Räpple, René; Beyerer, Jürgen

    Video-based recognition of hand symbols is a promising technology for designing new interaction techniques for multi-user environments of the future. However, most approaches still lack performance for direct application for human-computer interaction (HCI).

  18. Biometrically modulated collaborative control for an assistive wheelchair.

    Science.gov (United States)

    Urdiales, Cristina; Fernandez-Espejo, Blanca; Annicchiaricco, Roberta; Sandoval, Francisco; Caltagirone, Carlo

    2010-08-01

    To operate a wheelchair, people with severe physical disabilities may require assistance, which can be provided by robotization. However, medical experts report that an excess of assistance may lead to loss of residual skills, so that it is important to provide just the right amount of assistance. This work proposes a collaborative control system based on weighting the robot's and the user's commands by their respective efficiency to reactively obtain an emergent controller. Thus, the better the person operates, the more control he/she gains. Tests with volunteers have proven, though, that some users may require extra assistance when they become stressed. Hence, we propose a controller that can change the amount of support taking into account supplementary biometric data. In this work, we use an off-the-shelf wearable pulse oximeter. Experiments have demonstrated that volunteers could use our wheelchair in a more efficient way due to the proposed biometric modulated collaborative control.

  19. Self-reported hand hygiene practices, and feasibility and acceptability of alcohol-based hand rubs among village healthcare workers in Inner Mongolia, China.

    Science.gov (United States)

    Li, Y; Wang, Y; Yan, D; Rao, C Y

    2015-08-01

    Good hand hygiene is critical to reduce the risk of healthcare-associated infections. Limited data are available on hand hygiene practices from rural healthcare systems in China. To assess the feasibility and acceptability of sanitizing hands with alcohol-based hand rubs (ABHRs) among Chinese village healthcare workers, and to assess their hand hygiene practice. Five hundred bottles of ABHR were given to village healthcare workers in Inner Mongolia, China. Standardized questionnaires collected information on their work load, availability, and usage of hand hygiene facilities, and knowledge, attitudes, and practices of hand hygiene. In all, 369 (64.2%) participants completed the questionnaire. Although 84.5% of the ABHR recipients believed that receiving the ABHR improved their hand hygiene practice, 78.8% of recipients would pay no more than US$1.5 out of their own pocket (actual cost US$4). The majority (77.2%) who provided medical care at patients' homes never carried hand rubs with them outside their clinics. In general, self-reported hand hygiene compliance was suboptimal, and the lowest compliance was 'before touching a patient'. Reported top three complaints with using ABHR were skin irritation, splashing, and unpleasant residual. Village doctors with less experience practised less hand hygiene. The overall acceptance of ABHR among the village healthcare workers is high as long as it is provided to them for free/low cost, but their overall hand hygiene practice is suboptimal. Hand hygiene education and training is needed in settings outside of traditional healthcare facilities. Published by Elsevier Ltd.

  20. Diabetes is associated with increased hand pain in erosive hand osteoarthritis: data from a population-based study.

    Science.gov (United States)

    Magnusson, Karin; Hagen, Kåre Birger; Østerås, Nina; Nordsletten, Lars; Natvig, Bård; Haugen, Ida K

    2015-02-01

    To explore factors related to hand pain in persons with radiographic hand osteoarthritis (OA). Persons in the Musculoskeletal Pain in Ullensaker Study with radiographic hand OA (≥1 joint with Kellgren/Lawrence grade ≥2) were included (n = 530). We examined the cross-sectional association between possible explanatory variables and hand pain in the entire sample and in 2 hand OA phenotypes (erosive versus nonerosive) using structural equation analyses. Outcome variables were the Australian/Canadian Hand Osteoarthritis Index (AUSCAN; range 0-20) and number of tender finger joints upon palpation (NTJ; range 0-30). The mean age was 65 years (40-79 years) and 375 participants were women (71%). Diabetes mellitus, female sex, lower education status, familial OA, infrequent alcohol drinking, widespread pain, poor mental health, and higher number of finger joints with ultrasound-detected synovitis and radiographic OA were related to more hand pain in the entire sample. Stratified analyses showed that diabetes mellitus was strongly associated with AUSCAN pain (B-unstandardized coefficient = 3.81 [95% confidence interval (95% CI) 2.27, 5.35]) and NTJ (B-unstandardized coefficient = 4.16 [95% CI 2.01, 6.31]) in erosive hand OA only. In nonerosive OA, lower education status, having familial OA, and poor mental health were associated with hand OA pain. Widespread pain was associated with both outcomes in both phenotypes. Structural and inflammatory OA changes as well as demographic factors, psychosocial factors, and diabetes mellitus were associated with pain in hand OA. The strong association between diabetes mellitus and pain in erosive hand OA should be further explored. Copyright © 2015 by the American College of Rheumatology.

  1. Crop Biometric Maps: The Key to Prediction

    Directory of Open Access Journals (Sweden)

    Francisco Rovira-Más

    2013-09-01

    Full Text Available The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  2. Crop biometric maps: the key to prediction.

    Science.gov (United States)

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-09-23

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular "identity." This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  3. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  4. Occupational therapy-based and evidence-supported recommendations for assessment and exercises in hand osteoarthritis.

    Science.gov (United States)

    Kjeken, Ingvild

    2011-12-01

    The aims of this study were to develop recommendations for occupational therapy assessment and design of hand exercise programmes in patients with hand osteoarthritis. An expert group followed a Delphi procedure to reach consensus for up to 10 recommendations for assessment and exercises, respectively. Thereafter, an evidence-based approach was used to identify and appraise research evidence supporting each recommendation, before the recommendations were validated by the expert group. The process resulted in 10 recommendations for assessment and eight for design of exercise programmes. The literature search revealed that there is a paucity of clinical trials to guide recommendations for hand osteoarthritis, and the evidence for the majority of the recommendations was based on expert opinions. Also, even if a systematic review demonstrates some evidence for the efficacy of strength training exercises in hand OA, the evidence for any specific exercise is limited to expert opinions. A first set of recommendations for assessment and exercise in hand osteoarthritis has been developed. For many of the recommendations there is a paucity of research evidence. High-quality studies are therefore needed to establish a high level of evidence concerning functional assessment and the effect of hand exercises in hand osteoarthritis.

  5. A comparison of the antibacterial efficacy and cytotoxicity to cultured human skin cells of 7 commercial hand rubs and Xgel, a new copper-based biocidal hand rub.

    Science.gov (United States)

    Hall, Tony J; Wren, Michael W D; Jeanes, Annette; Gant, Vanya A

    2009-05-01

    Hand cleanliness is important in hospital infection control, but skin irritation from frequent alcohol-based hand rub use reduces compliance. We have compared a new copper biocide/Aloe vera-based biocidal hand rub (Xgel) with 7 commercially available hand rubs. Hand rubs were cultured with human skin cells for 24 hours after which cytotoxicity was assessed using the sulforhodamine B assay. The EN 12054 bacterial suspension test protocol was used to assess biocidal activity of 2 of the least cytotoxic hand rubs (Xgel and Purell). Hand rubs had 50% cytotoxic concentrations ranging from >10% to 10(8) with methicillin-resistant Staphylococcus aureus (MRSA) and Acinetobacter in 1 minute, whereas Purell only reduced CFU by 10(4) and 10(5), respectively. Purell was ineffective against C difficile spores, whereas Xgel produced a 3 x 10(3) reduction in CFU. The hand rubs had a wide range of cytotoxicity values for human skin cells, with Xgel being the least cytotoxic to human skin cells. In the EN 12054 bacterial suspension test, Xgel was more effective than Purell against all organisms tested. It should be noted that these in vitro results may not translate into clinical differences.

  6. Modular finger and hand motion capturing system based on inertial and magnetic sensors

    Directory of Open Access Journals (Sweden)

    Valtin Markus

    2017-03-01

    Full Text Available The assessment of hand posture and kinematics is increasingly important in various fields. This includes the rehabilitation of stroke survivors with restricted hand function. This paper presents a modular, ambulatory measurement system for the assement of the remaining hand function and for closed-loop controlled therapy. The device is based on inertial sensors and utilizes up to five interchangeable sensor strips to achieve modularity and to simplify the sensor attachment. We introduce the modular hardware design and describe algorithms used to calculate the joint angles. Measurements with two experimental setups demonstrate the feasibility and the potential of such a tracking device.

  7. Left-handed metamaterials based on a leaf-shaped configuration

    Science.gov (United States)

    Zhu, Weiren; Zhao, Xiaopeng; Gong, Boyi

    2011-05-01

    Based upon the bionics principle, we present the design of a metal-dielectric-metal sandwiched leaf-shaped metamaterial, and the numerical simulation and experiment have confirmed an obvious left-handed transmission peak by this structure. The retrieved effective permittivity, permeability, and refractive index are all negative around the frequency of the resonant peak, and the planar lens focusing experiment has further confirmed its left-handed features. The results in this paper can be used to explain the resonance mechanism of the left-handed metamaterials fabricated by means of the nano-self-assembly approach, and thus may greatly promote the development of optical metamaterials.

  8. Neonatal ethanol exposure from ethanol-based hand sanitisers in isolettes.

    Science.gov (United States)

    Hsieh, Shizuka; Sapkota, Amir; Wood, Rebecca; Bearer, Cynthia; Kapoor, Shiv

    2018-01-01

    The aims of this study is to measure the ethanol vapours in the isolette after use of hands cleaned with ethanol-based hand sanitiser (EBHS). Two squirts (1.5 mL) of hand sanitiser were rubbed on hands for 10 or 20 s before inserting the hands in the isolette for 5 min. Ethanol vapours were measured in the isolette with photoionisation detector and alcohol breathalyser for 30 min. Peak ethanol concentration in the isolette was considerably higher with a 10 s hand rub (381±192 ppm) compared with a 20 s hand rub (99±50 ppm), and dissipated to ≤5 ppm within 30 min. Under routine care, EBHS use by care providers exposes neonates in isolettes to 3.7-7.3 or 1.4-2.8 mg/kg ethanol per day with 10 or 20 s hand rubs, respectively. The expected blood level from average single exposure is 0.036 mg/dL with 10 s hand rub and may increase further with multiple exposures in a short period. Preterm neonates in the isolette are at risk of inadvertent exposure to ethanol. The expected blood alcohol level from this exposure is small and below 1 mg/dL level recommended by European Medicines Agency to limit the ethanol exposure in children. The unintended ethanol exposure can be avoided by rubbing hands for at least 20 s after applying EBHS. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  9. Acute alcohol intoxication in a child following ingestion of an ethyl-alcohol-based hand sanitizer.

    Science.gov (United States)

    Hertzog, James H; Radwick, Allison

    2015-07-01

    While uncommon, ingestion of ethanol-based hand sanitizers by children may be associated with significant intoxication. We report the case of a 7-year-old with acute alcohol intoxication following hand sanitizer ingestion. Alcohol elimination in this patient followed zero-order kinetics with a clearance rate of 22.5 mg/kg/h, consistent with the limited pharmacokinetic information available for children who experience alcohol intoxication from more traditional sources.

  10. A real-time vision-based hand gesture interaction system for virtual EAST

    Energy Technology Data Exchange (ETDEWEB)

    Wang, K.R., E-mail: wangkr@mail.ustc.edu.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui (China); University of Science and Technology of China, Hefei, Anhui (China); Xiao, B.J.; Xia, J.Y. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui (China); University of Science and Technology of China, Hefei, Anhui (China); Li, Dan [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui (China); Luo, W.L. [709th Research Institute, Shipbuilding Industry Corporation (China)

    2016-11-15

    Highlights: • Hand gesture interaction is first introduced to EAST model interaction. • We can interact with EAST model by a bared hand and a web camera. • We can interact with EAST model with a distance to screen. • Interaction is free, direct and effective. - Abstract: The virtual Experimental Advanced Superconducting Tokamak device (VEAST) is a very complicated 3D model, to interact with which, the traditional interaction devices are limited and inefficient. However, with the development of human-computer interaction (HCI), the hand gesture interaction has become a much popular choice in recent years. In this paper, we propose a real-time vision-based hand gesture interaction system for VEAST. By using one web camera, we can use our bare hand to interact with VEAST at a certain distance, which proves to be more efficient and direct than mouse. The system is composed of four modules: initialization, hand gesture recognition, interaction control and system settings. The hand gesture recognition method is based on codebook (CB) background modeling and open finger counting. Firstly, we build a background model with CB algorithm. Then, we segment the hand region by detecting skin color regions with “elliptical boundary model” in CbCr flat of YCbCr color space. Open finger which is used as a key feature of gesture can be tracked by an improved curvature-based method. Based on the method, we define nine gestures for interaction control of VEAST. Finally, we design a test to demonstrate effectiveness of our system.

  11. A Goal Unrealized: Patient Empowerment on Hand Hygiene- A Web-Based Survey from India.

    Science.gov (United States)

    Vijayalakshmi, S; Ramkumar, S; Narayan, K A; Vaithiyanathan, P

    2017-04-01

    Each year, millions of patients around the world are affected by Health Care Associated Infections (HCAIs). Understanding and assessing the global burden of HCAI is one of the key areas of work to improve the hand hygiene. To assess the patient empowerment and awareness on hand hygiene among online users. A web-based cross-sectional survey was conducted during September 2013 to December 2013 among adults. A predesigned questionnaire to assess the awareness on hand hygiene was sent to volunteers through emails and social networking sites. The data were transferred to excel sheet and analyzed in Epi info and represented in proportions and percentages. Total 94 (57%) participants responded to the survey among which 51.1% were males and 48.9% were females. Majority of them belongs to the age group of 20 to 35 years. Only 28.7% of them said they will ever ask health care worker to wash their hands before they examine. A 27.7% of the participants reported that their country/community have a program that educates/communicates with patients about the importance of hand hygiene. Adherence and compliance to hand hygiene practices is suboptimal among people. There seems to be a lack of knowledge regarding hand hygiene.

  12. [Hand osteoarthritis].

    Science.gov (United States)

    Šenolt, Ladislav

    Hand osteoarthritis (OA) is a common chronic disorder causing pain and limitation of mobility of affected joints. The prevalence of hand OA increases with age and more often affects females. Clinical signs obviously do not correlate with radiographic findings - symptomatic hand OA affects approximately 26 % of adult subjects, but radiographic changes can be found in up to two thirds of females and half of males older than 55 years.Disease course differ among individual patients. Hand OA is a heterogeneous disease. Nodal hand OA is the most common subtype affecting interphalangeal joints, thumb base OA affects first carpometacarpal joint. Erosive OA represents a specific subtype of hand OA, which is associated with joint inflammation, more pain, functional limitation and erosive findings on radiographs.Treatment of OA is limited. Analgesics and nonsteroidal anti-inflammatory drugs are the only agents reducing symptoms. New insights into the pathogenesis of disease should contribute to the development of novel effective treatment of hand OA.

  13. Fusing iris and palmprint at image level for multi-biometrics verification

    Science.gov (United States)

    Liu, Jingwang; Hou, Yan; Wang, Jingyan; Li, Yongping; Wang, Quanquan; Man, Jiaju; Xie, Honglan; He, Jianhua

    2011-12-01

    The phase-based image matching is effective for both iris and palm recognition tasks. Hence, we can expect that the approach may be useful for multimodal biometric system having palmprint and iris recognition capabilities. This paper investigates the fusion of palmprint and iris biometric at image level. A new image fusion algorithm named Baud limited image product (BLIP) especially for phase-based image matching is proposed. Based on this, a new multi-biometric fusion scheme at image level that combines BLIP and phase-based image matching is proposed. The effective region of iris and palm images are first extracted respectively, then they are fused into one small size image using BLIP, finally matched with the template using phase-based image matching to get a score. The experimental results show that this new scheme can not only improve the system accuracy performance, but also reduce the memory size used to store the template and time consumed by the matching.

  14. Efficacy of alcohols and alcohol-based hand disinfectants against human enterovirus 71.

    Science.gov (United States)

    Chang, S-C; Li, W-C; Huang, K-Y; Huang, Y-C; Chiu, C-H; Chen, C-J; Hsieh, Y-C; Kuo, C-Y; Shih, S-R; Lin, T-Y

    2013-04-01

    Human enterovirus 71 (HEV71) infections are a significant public health threat in the Asia-Pacific region and occasionally cause severe neurological complications and even death in children. Although good hand hygiene is important for controlling infection, relevant data regarding the efficacy of widely used hand disinfectants against HEV71 are still lacking. To investigate the virucidal activity of alcohols and alcohol-based hand disinfectants against HEV71. A common alcohol-based hand disinfectant (0.5% chlorhexidine gluconate + 70% isopropanol) as well as different concentrations of isopropanol and ethanol were tested for virucidal activity against HEV71 using the suspension and the fingerpad tests. In suspension tests, 85% and 95% ethanol achieved a mean log10 reduction factor in HEV71 titre of >3 and nearly 6, respectively, within 10 min. By contrast, 70% and 75% ethanol and any concentration of isopropanol (70-95%) produced a factor of 4, while both 75% ethanol and a chlorhexidine gluconate-containing formula were ineffective against HEV71 with a mean log10 reduction factor of alcohol-based hand disinfectants based on 70% ethanol or isopropanol have poor effectiveness against HEV71. Ninety-five percent ethanol is the most effective concentration, but still cannot fully inactivate HEV71 and may be impractical for use in many instances. Hand hygiene with alcohol-based hand disinfectants alone is not recommended for preventing HEV71 transmission. Copyright © 2013 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  15. Patient-centred hand hygiene information in orthopaedics units: an evidence-based implementation project.

    Science.gov (United States)

    Ong, Arielle Yi Jia; Tan, Joanne; Yeo, Hui Ling; Goh, Mien Li

    2017-03-01

    This project aimed to improve patients' knowledge on the importance of hand hygiene. It involved providing patients with a patient and family education on the importance of hand hygiene using a patient information leaflet that introduces the rationale of hand hygiene, possible consequences of poor hand hygiene, and the seven steps of hand hygiene. This projected used a preimplementation and postimplementation audit strategy using the Joanna Briggs Institute Practical Application of Clinical Evidence System and Getting Research Into Practice programs. The implementation occurred in three phases over a period of 6 months from January 2014 to June 2014. The audits took place in two orthopaedic wards in a large acute care setting tertiary hospital in Singapore and involved a sample size of 54 patients. It involved going through the medical records of the cases, assessment of patient knowledge based on the audit criteria, and checking if the patients received the patient information leaflet on hand hygiene. The postimplementation audit found significant improvements in all three audit criteria. The percentage of patients who demonstrated knowledge in the importance of hand hygiene saw an improvement of 48.1%. There was an improvement of 44.5% in nurses' compliance to the documentation of patient education being carried out. The percentage of patients who received a patient information leaflet on hand hygiene saw an increase of 36.1%. This project demonstrated that a preimplementation and postimplementation audit is a viable method to implement change and translate evidence into practice. Through this project, patients gained an understanding on the importance of hand hygiene and could take better ownership of their well being. This may potentially improve hospitalization experience and benefit health outcomes. The positive results of this project are contributed by the enthusiastic involvement of all the stakeholders, from patients and their caregivers to the bedside

  16. [Research on proportional control system of prosthetic hand based on FMG signals].

    Science.gov (United States)

    Yi, Jinhua; Yu, Hongliu; Li, Panpan; Zhao, Shengnan

    2013-02-01

    The control of prosthetic hand is always a focus in prosthesis research. For solving current problems of controlling signals of skin surface electrical signals, we applied force myography (FMG) signals in prosthetic control of this system. The control system based on FMG signals were designed, containing signal acquisition and pre-processing, prosthetic control, motor driving and so on. Two-freedom artificial hand with proportional control was proposed through acquiring two-channel FMG signals from the amputee stump. The proportional control of prosthetic hand was achieved according to the average of FMG amplitude. The results showed that the control system had a great potential to control artificial hand and to realize speed adjustment effectively. Besides, the Virtual instrument software LabVIEW is adopted to establish the FMG signal collection and calibration of experiment system.

  17. Frequency weightings based on biodynamics of fingers-hand-arm system.

    Science.gov (United States)

    Dong, Ren G; Welcome, Daniel E; Wu, John Z

    2005-07-01

    The frequency weighting for assessing hand-transmitted vibration exposure is critical to obtaining a true dose-response relationship. Any valid weighting must have a solid theoretical foundation. The objectives of this study are to examine the biodynamic foundation for assessing the vibration exposure and to develop a set of biodynamic methods to formulate the frequency weightings for different anatomical locations of the fingers-hand-arm system. The vibration transmissibility measured on the fingers, hand, wrist, elbow, shoulder, and head was used to define the transmitted acceleration-based (TAB) frequency weighting. The apparent masses measured at the fingers and the palm of the hand were used to construct the biodynamic force-based (BFB) weightings. These weightings were compared with the ISO weighting specified in ISO 5349-1 (2001). The results of this study suggest that the frequency weightings for the vibration-induced problems at different anatomical locations of the hand-arm system can be basically divided into three groups: (a) the weighting for the fingers and hand, (b) the weighting for the wrist, elbow, and shoulder, and (c) the weighting for the head. The ISO weighting is highly correlated with the weighting for the second group but not with the first and third groups. The TAB and BFB finger weightings are quite different at frequencies lower than 100 Hz, but they show similar trends at higher frequencies. Both TAB and BFB finger weightings at frequencies higher than 20 Hz are greater than the ISO weighting.

  18. Human-Computer Interaction Based on Hand Gestures Using RGB-D Sensors

    Directory of Open Access Journals (Sweden)

    Sergio Llorente

    2013-09-01

    Full Text Available In this paper we present a new method for hand gesture recognition based on an RGB-D sensor. The proposed approach takes advantage of depth information to cope with the most common problems of traditional video-based hand segmentation methods: cluttered backgrounds and occlusions. The algorithm also uses colour and semantic information to accurately identify any number of hands present in the image. Ten different static hand gestures are recognised, including all different combinations of spread fingers. Additionally, movements of an open hand are followed and 6 dynamic gestures are identified. The main advantage of our approach is the freedom of the user’s hands to be at any position of the image without the need of wearing any specific clothing or additional devices. Besides, the whole method can be executed without any initial training or calibration. Experiments carried out with different users and in different environments prove the accuracy and robustness of the method which, additionally, can be run in real-time.

  19. Review of modern biometric user authentication and their development prospects

    Science.gov (United States)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  20. 75 FR 39323 - Amendment to the Biometric Visa Program

    Science.gov (United States)

    2010-07-08

    ... Program. Under the Biometric Visa Program, applicants for diplomatic or official visas, for visas to... majority of travelers, the Biometric Visa Program performs a travel facilitation function by allowing for...

  1. Implications of applying biometrics to travel documents

    Science.gov (United States)

    van Renesse, Rudolf L.

    2002-04-01

    The Dutch government currently considers the decentralized storage of the enrolled template of the document holder on a chip embedded in the travel-document in order to allow biometric verification if the document is presented by the rightful holder. The main purpose of the intended biometric application is combating the misuse of travel-documents by look-alikes. Because travel-documents simultaneously function as identity documents, this misuse not only involves border crossing but also acquiring services from government, municipality and the private sector. This paper recognizes some inherent problems: (1) due to human factors, false reject rates will expectedly be considerable, and look-alikes will claim to be falsely rejected (2) the look-alike may sabotage the biometric functionality of the travel-document and (3) the enrolment process may be fraudulently frustrated. Partial solutions are layered biometrics and centralized storage of personalized templates in the registers of travel-documents or their semi-centralized storage in municipal registers. The usefulness of decentralized storage of biometric templates on travel-documents is discussed.

  2. Tracking and Classification of In-Air Hand Gesture Based on Thermal Guided Joint Filter.

    Science.gov (United States)

    Kim, Seongwan; Ban, Yuseok; Lee, Sangyoun

    2017-01-17

    The research on hand gestures has attracted many image processing-related studies, as it intuitively conveys the intention of a human as it pertains to motional meaning. Various sensors have been used to exploit the advantages of different modalities for the extraction of important information conveyed by the hand gesture of a user. Although many works have focused on learning the benefits of thermal information from thermal cameras, most have focused on face recognition or human body detection, rather than hand gesture recognition. Additionally, the majority of the works that take advantage of multiple modalities (e.g., the combination of a thermal sensor and a visual sensor), usually adopting simple fusion approaches between the two modalities. As both thermal sensors and visual sensors have their own shortcomings and strengths, we propose a novel joint filter-based hand gesture recognition method to simultaneously exploit the strengths and compensate the shortcomings of each. Our study is motivated by the investigation of the mutual supplementation between thermal and visual information in low feature level for the consistent representation of a hand in the presence of varying lighting conditions. Accordingly, our proposed method leverages the thermal sensor's stability against luminance and the visual sensors textural detail, while complementing the low resolution and halo effect of thermal sensors and the weakness against illumination of visual sensors. A conventional region tracking method and a deep convolutional neural network have been leveraged to track the trajectory of a hand gesture and to recognize the hand gesture, respectively. Our experimental results show stability in recognizing a hand gesture against varying lighting conditions based on the contribution of the joint kernels of spatial adjacency and thermal range similarity.

  3. Tracking and Classification of In-Air Hand Gesture Based on Thermal Guided Joint Filter

    Directory of Open Access Journals (Sweden)

    Seongwan Kim

    2017-01-01

    Full Text Available The research on hand gestures has attracted many image processing-related studies, as it intuitively conveys the intention of a human as it pertains to motional meaning. Various sensors have been used to exploit the advantages of different modalities for the extraction of important information conveyed by the hand gesture of a user. Although many works have focused on learning the benefits of thermal information from thermal cameras, most have focused on face recognition or human body detection, rather than hand gesture recognition. Additionally, the majority of the works that take advantage of multiple modalities (e.g., the combination of a thermal sensor and a visual sensor, usually adopting simple fusion approaches between the two modalities. As both thermal sensors and visual sensors have their own shortcomings and strengths, we propose a novel joint filter-based hand gesture recognition method to simultaneously exploit the strengths and compensate the shortcomings of each. Our study is motivated by the investigation of the mutual supplementation between thermal and visual information in low feature level for the consistent representation of a hand in the presence of varying lighting conditions. Accordingly, our proposed method leverages the thermal sensor’s stability against luminance and the visual sensors textural detail, while complementing the low resolution and halo effect of thermal sensors and the weakness against illumination of visual sensors. A conventional region tracking method and a deep convolutional neural network have been leveraged to track the trajectory of a hand gesture and to recognize the hand gesture, respectively. Our experimental results show stability in recognizing a hand gesture against varying lighting conditions based on the contribution of the joint kernels of spatial adjacency and thermal range similarity.

  4. Effect of a school-based hand washing promotion program on knowledge and hand washing behavior of girl students in a middle school of Delhi

    OpenAIRE

    Ankur Garg; Davendra Kumar Taneja; Suresh Kumar Badhan; Gopal Krishan Ingle

    2013-01-01

    The intervention study was conducted in a school of New Delhi to assess the effect of a school based hand-washing promotion program on knowledge and hand-washing behavior among school children and extent of information sharing with parents. Intervention was carried out on randomly selected 300 students (100 each from 6th class to 8th class) with 281 students being part of the final analysis. Tools of the study were hand-washing questionnaire and household survey performa; essay, poster, sloga...

  5. Assessing the optimal location for alcohol-based hand rub dispensers in a patient room in an intensive care unit

    NARCIS (Netherlands)

    Boog, M.C.; Erasmus, V.; De Graaf, J.M.; Van Beeck, E.H.E.; Melles, M.; Van Beeck, E.F.

    2013-01-01

    Background The introduction of alcohol-based hand rub dispensers has had a positive influence on compliance of healthcare workers with the recommended guidelines for hand hygiene. However, establishing the best location for alcohol-based hand rub dispensers remains a problem, and no method is

  6. Assessing the optimal location for alcohol-based hand rub dispensers in a patient room in an intensive care unit

    NARCIS (Netherlands)

    M.C. Boog (Matthijs); V. Erasmus (Vicky); J.M. de Graaf (Jitske); E.A.H.E. van Beeck (Elise); M. Melles (Marijke); E.F. van Beeck (Ed)

    2013-01-01

    textabstractBackground: The introduction of alcohol-based hand rub dispensers has had a positive influence on compliance of healthcare workers with the recommended guidelines for hand hygiene. However, establishing the best location for alcohol-based hand rub dispensers remains a problem, and no

  7. Use of Biometrics within Sub-Saharan Refugee Communities

    Science.gov (United States)

    2013-12-01

    fingerprint patterns, iris pattern recognition, and facial recognition as a means of establishing an individual’s identity. Biometrics creates and... Biometrics typically comprises fingerprint patterns, iris pattern recognition, and facial recognition as a means of establishing an individual’s identity...Fingerprint comparison is the oldest form of identification, but iris recognition is considered the most accurate biometric technology for identity

  8. Biometrics and their use in e-passports

    NARCIS (Netherlands)

    Prof. Bart Jacobs; B.A.M. Ben Schouten

    2007-01-01

    A succesful design, deployment and operation of biometric systems depends highly on the results for existing biometrical technologies and components. These existing technologies as well as new solutions need to be evaluated on their performance. However it is often forgotten that the biometric

  9. Biometrics in Forensic Science: Challenges, Lessons and New Technologies

    NARCIS (Netherlands)

    Tistarelli, Massimo; Grosso, Enrico; Meuwly, Didier

    2014-01-01

    Biometrics has historically found its natural mate in Forensics. The first applications found in the literature and over cited so many times, are related to biometric measurements for the identification of multiple offenders from some of their biometric and anthropometric characteristics (tenprint

  10. Animal biometrics: quantifying and detecting phenotypic appearance.

    Science.gov (United States)

    Kühl, Hjalmar S; Burghardt, Tilo

    2013-07-01

    Animal biometrics is an emerging field that develops quantified approaches for representing and detecting the phenotypic appearance of species, individuals, behaviors, and morphological traits. It operates at the intersection between pattern recognition, ecology, and information sciences, producing computerized systems for phenotypic measurement and interpretation. Animal biometrics can benefit a wide range of disciplines, including biogeography, population ecology, and behavioral research. Currently, real-world applications are gaining momentum, augmenting the quantity and quality of ecological data collection and processing. However, to advance animal biometrics will require integration of methodologies among the scientific disciplines involved. Such efforts will be worthwhile because the great potential of this approach rests with the formal abstraction of phenomics, to create tractable interfaces between different organizational levels of life. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Correlation of iris biometrics and DNA

    DEFF Research Database (Denmark)

    Harder, Stine; Clemmensen, Line Katrine Harder; Dahl, Anders Bjorholm

    2013-01-01

    The presented work concerns prediction of complex human phenotypes from genotypes. We were interested in correlating iris color and texture with DNA. Our data consist of 212 eye images along with DNA: 32 single-nucleotide polymorphisms (SNPs). We used two types of biometrics to describe the eye...... images: One for iris color and one for iris texture. Both biometrics were high dimensional and a sparse principle component analysis (SPCA) reduced the dimensions and resulted in a representation of data with good interpretability. The correlations between the sparse principal components (SPCs....... The SNPs (rs12896399, rs3733542, rs6475555, rs12913832) and (rs12896399, rs3733542, rs12913832) had the highest correlation to the canonical variable for color and texture, respectively. Three of the most contributing SNPs were the same for both biometrics, revealing a covariance between iris color...

  12. A Survey of Keystroke Dynamics Biometrics

    Directory of Open Access Journals (Sweden)

    Pin Shen Teh

    2013-01-01

    Full Text Available Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.

  13. Fuzzy logic-based mobile computing system for hand rehabilitation after neurological injury.

    Science.gov (United States)

    Chiu, Yu-Hsien; Chen, Tien-Wen; Chen, Yenming J; Su, Ching-I; Hwang, Kao-Shing; Ho, Wen-Hsien

    2017-10-13

    Effective neurological rehabilitation requires long term assessment and treatment. The rapid progress of virtual reality-based assistive technologies and tele-rehabilitation has increased the potential for self-rehabilitation of various neurological injuries under clinical supervision. The objective of this study was to develop a fuzzy inference mechanism for a smart mobile computing system designed to support in-home rehabilitation of patients with neurological injury in the hand by providing an objective means of self-assessment. A commercially available tablet computer equipped with a Bluetooth motion sensor was integrated in a splint to obtain a smart assistive device for collecting hand motion data, including writing performance and the corresponding grasp force. A virtual reality game was also embedded in the smart splint to support hand rehabilitation. Quantitative data obtained during the rehabilitation process were modeled by fuzzy logic. Finally, the improvement in hand function was quantified with a fuzzy rule database of expert opinion and experience. Experiments in chronic stroke patients showed that the proposed system is applicable for supporting in-home hand rehabilitation. The proposed virtual reality system can be customized for specific therapeutic purposes. Commercial development of the system could immediately provide stroke patients with an effective in-home rehabilitation therapy for improving hand problems.

  14. Handwriting Recognition in Free Space Using WIMU-Based Hand Motion Analysis

    Directory of Open Access Journals (Sweden)

    Shashidhar Patil

    2016-01-01

    Full Text Available We present a wireless-inertial-measurement-unit- (WIMU- based hand motion analysis technique for handwriting recognition in three-dimensional (3D space. The proposed handwriting recognition system is not bounded by any limitations or constraints; users have the freedom and flexibility to write characters in free space. It uses hand motion analysis to segment hand motion data from a WIMU device that incorporates magnetic, angular rate, and gravity sensors (MARG and a sensor fusion algorithm to automatically distinguish segments that represent handwriting from nonhandwriting data in continuous hand motion data. Dynamic time warping (DTW recognition algorithm is used to recognize handwriting in real-time. We demonstrate that a user can freely write in air using an intuitive WIMU as an input and hand motion analysis device to recognize the handwriting in 3D space. The experimental results for recognizing handwriting in free space show that the proposed method is effective and efficient for other natural interaction techniques, such as in computer games and real-time hand gesture recognition applications.

  15. Effect of a school-based hand washing promotion program on knowledge and hand washing behavior of girl students in a middle school of Delhi.

    Science.gov (United States)

    Garg, Ankur; Taneja, Davendra Kumar; Badhan, Suresh Kumar; Ingle, Gopal Krishan

    2013-01-01

    The intervention study was conducted in a school of New Delhi to assess the effect of a school based hand-washing promotion program on knowledge and hand-washing behavior among school children and extent of information sharing with parents. Intervention was carried out on randomly selected 300 students (100 each from 6th class to 8th class) with 281 students being part of the final analysis. Tools of the study were hand-washing questionnaire and household survey performa; essay, poster, slogan writing competition; classroom interactions. Data were analyzed in the SPSS 16.0 software and Mcnemar test and Student paired t-test were used. After the program, 95% felt that hand should be washed frequently. Overall, there was a significant improvement in the knowledge regarding hand-washing and frequency of hand-washing practices after the intervention. 42% children shared this information with their parents. The intervention proved effective in improving awareness and highlights the potential of school for hand-washing promotion activities.

  16. Sensory feedback from a prosthetic hand based on air-mediated pressure from the hand to the forearm skin.

    Science.gov (United States)

    Antfolk, Christian; Björkman, Anders; Frank, Sven-Olof; Sebelius, Fredrik; Lundborg, Göran; Rosen, Birgitta

    2012-07-01

    Lack of sensory feedback is a drawback in today's hand prostheses. We present here a non-invasive simple sensory feedback system, which provides the user of a prosthetic hand with sensory feedback on the arm stump. It is mediated by air in a closed loop system connecting silicone pads on the prosthetic hand with pads on the amputation stump. The silicone pads in a "tactile display" on the amputation stump expand when their corresponding sensor-bulb in the prosthesis is touched, evoking an experience of "real touch". Twelve trans-radial amputees and 20 healthy non-amputees participated in the study. We investigated the capacity of the system to mediate detection of touch, discrimination between different levels of pressure and, on the amputees also, the ability to locate touch. The results showed a median touch threshold of 80 and 60 g in amputees and non-amputees, respectively, and 90% and 80% correct answers, respectively, in discrimination between 2 levels of pressure. The amputees located touch (3 sites) correctly in 96% of trials. This simple sensory feedback system has the potential to restore sensory feedback in hand amputees and thus it could be a useful tool to enhance prosthesis use.

  17. Association of Wage With Employee Participation in Health Assessments and Biometric Screening.

    Science.gov (United States)

    Sherman, Bruce W; Addy, Carol

    2017-01-01

    To understand differences in health risk assessment (HRA) and biometric screening participation rates among benefits-enrolled employees in association with wage category. Cross-sectional analysis of employee eligibility file and health benefits (wellness and claims) data. Data from self-insured employers participating in the RightOpt private exchange (Conduent HR Services) during 2014. Active employees from 4 companies continuously enrolled in health insurance for which wage data were available. Measures included HRA and biometric screening participation rates and wage status, with employee age, sex, employer, job tenure, household income, geographic location, and health benefits deductible as a percentage of total wages serving as covariates. Employees were separated into 5 groups based on wage status. Logistic regression analysis incorporated other measures as covariates to adjust for differences between groups, with HRA and biometric screening participation rates determined as binary outcomes. Participation rates for HRA and biometric screening were 90% and 87%, respectively, in the highest wage category, decreasing to 67% and 60%, respectively, among the lowest wage category. Employee wage status is associated with significant differences in HRA and biometric participation rates. Generalizing the results generated by modest participation in these offerings to entire populations may risk misinterpretation of results based on variable participation rates across wage categories.

  18. RGBD Video Based Human Hand Trajectory Tracking and Gesture Recognition System

    Directory of Open Access Journals (Sweden)

    Weihua Liu

    2015-01-01

    Full Text Available The task of human hand trajectory tracking and gesture trajectory recognition based on synchronized color and depth video is considered. Toward this end, in the facet of hand tracking, a joint observation model with the hand cues of skin saliency, motion and depth is integrated into particle filter in order to move particles to local peak in the likelihood. The proposed hand tracking method, namely, salient skin, motion, and depth based particle filter (SSMD-PF, is capable of improving the tracking accuracy considerably, in the context of the signer performing the gesture toward the camera device and in front of moving, cluttered backgrounds. In the facet of gesture recognition, a shape-order context descriptor on the basis of shape context is introduced, which can describe the gesture in spatiotemporal domain. The efficient shape-order context descriptor can reveal the shape relationship and embed gesture sequence order information into descriptor. Moreover, the shape-order context leads to a robust score for gesture invariant. Our approach is complemented with experimental results on the settings of the challenging hand-signed digits datasets and American sign language dataset, which corroborate the performance of the novel techniques.

  19. The use of occupation-based assessments and intervention in the hand therapy setting - A survey.

    Science.gov (United States)

    Grice, Kimatha Oxford

    2015-01-01

    Descriptive survey. This study specifically explored the use of occupation-based assessments and intervention in the hand therapy setting, but also more generally, current practice trends about all assessments being utilized in this setting, frequency of their use, and therapists' perceptions about them. An online survey was distributed via email to members of the American Society of Hand Therapists (ASHT). The survey consisted of ten questions and was administered via Survey Monkey. Responses were received from 22% of those surveyed. A descriptive analysis was completed of the results and indicated that over half use occupation-based assessments on a daily basis; most are related to ADL function and used for the development of goals. The primary reason for not utilizing occupation-based assessments is time limitation. Seventy-nine percent believe these measures are important for the services provided in the hand therapy setting. Occupation-based assessments and intervention are not utilized as much as therapists would like in the hand therapy setting, primarily due to time constraints. While not formally assessed, the majority of those who responded indicated that they do address occupation in their assessments and interventions. Not applicable. Copyright © 2015 Hanley & Belfus. Published by Elsevier Inc. All rights reserved.

  20. Object-based processes in the planning of goal-directed hand movements

    NARCIS (Netherlands)

    Bekkering, H.; Pratt, J.

    2004-01-01

    Theories in motor control suggest that the parameters specified during the planning of goal-directed hand movements to a visual target are defined in spatial parameters like direction and amplitude. Recent findings in the visual attention literature, however, argue widely for early object-based

  1. Real time OCT-based angiography device with hand-held probe (Conference Presentation)

    Science.gov (United States)

    Moiseev, Alexander A.; Gelikonov, Grigory V.; Ksenofontov, Sergey Y.; Gelikonov, Valentin M.; Matveev, Lev A.; Zaitsev, Vladimir Y.; Matveev, Alexander L.; Sirotkina, Marina A.; Gladkova, Natalia D.; Vitkin, I. Alex

    2017-02-01

    This work is dedicated to development of the OCT system with angiography for everyday clinical use. Two major problems were solved during the development: compensation of specific tissue displacements, induced by contact scanning mode and physiological motion of patients (e.g. respiratory and cardiac motions) and on-line visualization of vessel net, to provide the feedback for system operator. The performance of the resulting OCT-based microangiography device with hand-held probe was evaluated by visualization of vessels nets of volunteers oral mucosa and skin on different locations (hands, face, abdomen etc.). Success-rate more than 90% was demonstrated during the experiments.

  2. Efficacy of two distinct ethanol-based hand rubs for surgical hand disinfection – a controlled trial according to prEN 12791

    Science.gov (United States)

    Kampf, Günter; Ostermeyer, Christiane

    2005-01-01

    Background Aim of the study was to determine the efficacy of two distinct ethanol-based hand rubs for surgical hand disinfection in a controlled cross-over trial according to prEN 12791. Methods 20 subjects were included. Hands were washed for 1 min with soap. The bacterial prevalue was obtained by rubbing finger tips in TSB for 1 min. Then, each subject treated the hands with the reference procedure (n-propanol, 60% v/v) or the product (Sterillium® Rub, based on 80% ethanol; Avagard, based on 61% ethanol and 1% chlorhexidine gluconate) which were all applied in 3 to 4 portions each of 3 ml for a total of 3 min. Bacterial postvalues (immediate effect) were taken from one hand, the other hand was gloved for 3 h. After gloves were taken off the second postvalue was taken for the assessment of a sustained effect. Results Bacterial pre-values were between 4.38 ± 0.66 and 4.46 ± 0.71. Sterillium® Rub achieved the required immediate (mean log10-reduction of 2.59 ± 1.19) and sustained effect (1.73 ± 1.08) compared with the reference treatment (immediate effect: 2.58 ± 1.16; sustained effect: 1.67 ± 0.96). Avagard, however, did not achieve the required immediate (1.82 ± 1.40) and sustained effect (1.41 ± 1.08) in comparison to the reference disinfection (immediate effect: 2.98 ± 0.90; sustained effect: 2.56 ± 1.17; p Rub can be regarded to be effective for surgical hand disinfection, but Avagard can not. The addition of 1% chlorhexidine gluconate to 61% ethanol (w/w) did not outweigh an ethanol concentration of 80% (w/w). PMID:15784148

  3. Comparative antimicrobial efficacy of alcohol-based hand rub and conventional surgical scrub in a medical center.

    Science.gov (United States)

    Shen, Ni-Jiin; Pan, Sung-Ching; Sheng, Wang-Huei; Tien, Kwei-Lian; Chen, Mei-Ling; Chang, Shan-Chwen; Chen, Yee-Chun

    2015-06-01

    Hand hygiene is the cornerstone of aseptic techniques to reduce surgical site infection. Conventional surgical scrub is effective for disinfecting a surgeon's hands. However, the compliance of conventional scrub may be hindered by skin damage, allergy, and time. Alcohol-based hand rub has a satisfactory antimicrobial effect, but mostly in laboratory settings. Our aim was to compare a conventional surgical scrub with an alcohol-based hand rub to evaluate antimicrobial efficacy. From June 1, 2010 to July 31, 2011, 128 healthcare workers were enrolled in the study. They used an alcohol-based hand rub or a conventional surgical scrub as preoperative hand antisepsis during their routine practice. Hand sampling for cultures were performed before and after operations. Positive culture plates were further processed for pathogen identification. The culture positive rate of the alcohol-based hand rub was 6.2% before operations and 10.8% after operations. Both rates were lower than the conventional surgical scrub [47.6% before operations (p rub was a significant protective factor for positive hand cultures. The alcohol-based hand rub was more efficacious for surgical antisepsis and had sustained efficacy, compared to conventional surgical scrub. We suggest that alcohol-based hand rubs could be an alternative surgical antiseptic in the operative theater. Copyright © 2013. Published by Elsevier B.V.

  4. Effects of alcohol-based hand hygiene solutions on breath alcohol detection in the emergency department.

    Science.gov (United States)

    Emerson, Beth L; Whitfill, Travis; Baum, Carl R; Garlin-Kane, Katherine; Santucci, Karen

    2016-12-01

    This study aimed to investigate the effects of alcohol-based hand hygiene solution (ABHS) use by care providers on point-of-care alcohol breath analyzer interpretation under different clinically relevant conditions. Among each test condition (foam vehicle with immediate testing, gel vehicle with immediate testing, allowing hands to dry after the use of ABHS, and donning gloves after the use of ABHS), alcohol was detected in breath at 1 minute after use of ABHS. Because the use of ABHS by individuals administering breath alcohol detection may result in false-positive detection of alcohol, staff using these devices should consider traditional hand hygiene with soap and water. Copyright © 2016 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  5. Vision-Based Pose Estimation for Robot-Mediated Hand Telerehabilitation

    Directory of Open Access Journals (Sweden)

    Giuseppe Airò Farulla

    2016-02-01

    Full Text Available Vision-based Pose Estimation (VPE represents a non-invasive solution to allow a smooth and natural interaction between a human user and a robotic system, without requiring complex calibration procedures. Moreover, VPE interfaces are gaining momentum as they are highly intuitive, such that they can be used from untrained personnel (e.g., a generic caregiver even in delicate tasks as rehabilitation exercises. In this paper, we present a novel master–slave setup for hand telerehabilitation with an intuitive and simple interface for remote control of a wearable hand exoskeleton, named HX. While performing rehabilitative exercises, the master unit evaluates the 3D position of a human operator’s hand joints in real-time using only a RGB-D camera, and commands remotely the slave exoskeleton. Within the slave unit, the exoskeleton replicates hand movements and an external grip sensor records interaction forces, that are fed back to the operator-therapist, allowing a direct real-time assessment of the rehabilitative task. Experimental data collected with an operator and six volunteers are provided to show the feasibility of the proposed system and its performances. The results demonstrate that, leveraging on our system, the operator was able to directly control volunteers’ hands movements.

  6. Active gesture-changeable underactuated finger for humanoid robot hand based on multiple tendons

    Directory of Open Access Journals (Sweden)

    D. Che

    2010-12-01

    Full Text Available The concept called gesture-changeable under-actuated (GCUA function is utilized to improve the dexterities of traditional under-actuated hands and reduce the control difficulties of dexterous hands. Based on GCUA function, a novel mechanical finger by multiple tendons: GCUA-T finger, is designed. The finger uses tendon mechanisms to achieve GCUA function which includes traditional underactuated (UA grasping motion and special pre-bending (PB, or pre-shaping motion before UA grasping. Operation principles and force analyses of the fingers are given, and the effect of GCUA function on the movements of a hand is discussed. The finger can satisfy the requirements of grasping and operating with low dependence on control system and low cost on manufacturing expenses, which develops a new way between dexterous hand and traditional under-actuated hand.

    This paper was presented at the IFToMM/ASME International Workshop on Underactuated Grasping (UG2010, 19 August 2010, Montréal, Canada.

  7. Vision-Based Pose Estimation for Robot-Mediated Hand Telerehabilitation.

    Science.gov (United States)

    Airò Farulla, Giuseppe; Pianu, Daniele; Cempini, Marco; Cortese, Mario; Russo, Ludovico O; Indaco, Marco; Nerino, Roberto; Chimienti, Antonio; Oddo, Calogero M; Vitiello, Nicola

    2016-02-05

    Vision-based Pose Estimation (VPE) represents a non-invasive solution to allow a smooth and natural interaction between a human user and a robotic system, without requiring complex calibration procedures. Moreover, VPE interfaces are gaining momentum as they are highly intuitive, such that they can be used from untrained personnel (e.g., a generic caregiver) even in delicate tasks as rehabilitation exercises. In this paper, we present a novel master-slave setup for hand telerehabilitation with an intuitive and simple interface for remote control of a wearable hand exoskeleton, named HX. While performing rehabilitative exercises, the master unit evaluates the 3D position of a human operator's hand joints in real-time using only a RGB-D camera, and commands remotely the slave exoskeleton. Within the slave unit, the exoskeleton replicates hand movements and an external grip sensor records interaction forces, that are fed back to the operator-therapist, allowing a direct real-time assessment of the rehabilitative task. Experimental data collected with an operator and six volunteers are provided to show the feasibility of the proposed system and its performances. The results demonstrate that, leveraging on our system, the operator was able to directly control volunteers' hands movements.

  8. Stereotypical hand movements in 144 subjects with Rett syndrome from the population-based Australian database.

    Science.gov (United States)

    Carter, Philippa; Downs, Jenny; Bebbington, Ami; Williams, Simon; Jacoby, Peter; Kaufmann, Walter E; Leonard, Helen

    2010-02-15

    Stereotypic hand movements are a feature of Rett Syndrome but few studies have observed their nature systematically. Video data in familiar settings were obtained on subjects (n = 144) identified from an Australian population-based database. Hand stereotypies were demonstrated by most subjects (94.4%), 15 categories were observed and midline wringing was seen in approximately 60% of subjects. There was a median of two stereotypies per subject but this number decreased with age. Clapping and mouthing of hands were more prevalent in girls younger than 8 years and wringing was more prevalent in women 19 years or older. Clapping was commoner in those with p.R306C and early truncating mutations, and much rarer in those with p.R106W, p.R270X, p.R168X, and p.R255X. Stereotypies tended to be less frequent in those with more severe mutations. Otherwise, there were no clear relationships between our categories of stereotypies and mutation. Approximately a quarter each had predominantly right and left handed stereotypies and for the remaining half, no clear laterality was seen. Results were similar for all cases and when restricted to those with a pathogenic mutation. Hand stereotypies changed with increasing age but limited relationships with MECP2 mutations were identified. (c) 2009 Movement Disorder Society.

  9. Classification of right-hand grasp movement based on EMOTIV Epoc+

    Science.gov (United States)

    Tobing, T. A. M. L.; Prawito, Wijaya, S. K.

    2017-07-01

    Combinations of BCT elements for right-hand grasp movement have been obtained, providing the average value of their classification accuracy. The aim of this study is to find a suitable combination for best classification accuracy of right-hand grasp movement based on EEG headset, EMOTIV Epoc+. There are three movement classifications: grasping hand, relax, and opening hand. These classifications take advantage of Event-Related Desynchronization (ERD) phenomenon that makes it possible to differ relaxation, imagery, and movement state from each other. The combinations of elements are the usage of Independent Component Analysis (ICA), spectrum analysis by Fast Fourier Transform (FFT), maximum mu and beta power with their frequency as features, and also classifier Probabilistic Neural Network (PNN) and Radial Basis Function (RBF). The average values of classification accuracy are ± 83% for training and ± 57% for testing. To have a better understanding of the signal quality recorded by EMOTIV Epoc+, the result of classification accuracy of left or right-hand grasping movement EEG signal (provided by Physionet) also be given, i.e.± 85% for training and ± 70% for testing. The comparison of accuracy value from each combination, experiment condition, and external EEG data are provided for the purpose of value analysis of classification accuracy.

  10. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    Science.gov (United States)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  11. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  12. Practical Biometric Authentication with Template Protection

    NARCIS (Netherlands)

    Tuyls, P.; Akkermans, A.H.M.; Kevenaar, T.A.M.; Schrijen, G.J.; Bazen, A.M.; Veldhuis, Raymond N.J.; Kanade, T.; Jain, A.K.; Ratha, N.K.

    We show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. Therefore we first make a fixed length representation of the fingerprint data by applying Gabor filtering. Next we introduce the reliable

  13. Iris biometric system design using multispectral imaging

    Science.gov (United States)

    Widhianto, Benedictus Yohanes Bagus Y. B.; Nasution, Aulia M. T.

    2016-11-01

    An identity recognition system is a vital component that cannot be separated from life, iris biometric is one of the biometric that has the best accuracy reaching 99%. Usually, iris biometric systems use infrared spectrum lighting to reduce discomfort caused by radiation when the eye is given direct light, while the eumelamin that is forming the iris has the most flourescent radiation when given a spectrum of visible light. This research will be conducted by detecting iris wavelengths of 850 nm, 560 nm, and 590 nm, where the detection algorithm will be using Daugman algorithm by using a Gabor wavelet extraction feature, and matching feature using a Hamming distance. Results generated will be analyzed to identify how much differences there are, and to improve the accuracy of the multispectral biometric system and as a detector of the authenticity of the iris. The results obtained from the analysis of wavelengths 850 nm, 560 nm, and 590 nm respectively has an accuracy of 99,35 , 97,5 , 64,5 with a matching score of 0,26 , 0,23 , 0,37.

  14. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  15. Towards Biometric Assessment of Audience Affect

    DEFF Research Database (Denmark)

    Lyng Wieland, Jakob; Larsen, Lars Bo; Laursen, Jeanette Kølbæk

    2016-01-01

    This paper investigates how reliable affective responses can be obtained using objective biometric measures for media audience research. We use Galvanic Skin Response (GSR) to detect sixteen respondents’ arousal levels and as an objective measure to show how self- reporting disrupts the experience...

  16. Fulltime biometric mouse design for continuous authentication ...

    African Journals Online (AJOL)

    We formulate a full-time biometric mouse (FBM) design that would ensure thumb positioning and its ergonomics while ensuring comfort and maximum contact with the scanner to enable continuous authentication of the user in a speedy, easy and non-strenuous way. The mouse employs a simple algorithm that ensures ...

  17. Capillary-Patterns for Biometric Authentication

    NARCIS (Netherlands)

    Paloma Benedicto, J.; Bruekers, A.A.M.; Presura, C.N.; Garcia Molina, G.

    2007-01-01

    In this report, we present a method using the capillary structuresunder the "distal interphalangeal joint" (DIP joint), which is located between the second and third (distal) phalanges of the finger, for achieving secure biometric authentication. Images of the DIPjoint are acquired using a

  18. Towards Implementing An Efficient Biometric Authentication ...

    African Journals Online (AJOL)

    Towards Implementing An Efficient Biometric Authentication Framework For Nigeria Customer Banking Systems. ... The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more information about how to ...

  19. CBEFF Common Biometric Exchange File Format

    Science.gov (United States)

    2001-01-03

    for the Financial Services Industry : Certificate Management”. - BioAPI Consortium: http://www.bioapi.org - BioAPI Consortium BIOAPI Specification... financial services industry . X9.84 is a draft standard developed for Biometric Information Management and Security. Section 8 of the X9.84 draft standard

  20. Experimental Implementation of a Biometric Laser Synaptic Sensor

    Directory of Open Access Journals (Sweden)

    Alexander N. Pisarchik

    2013-12-01

    Full Text Available We fabricate a biometric laser fiber synaptic sensor to transmit information from one neuron cell to the other by an optical way. The optical synapse is constructed on the base of an erbium-doped fiber laser, whose pumped diode current is driven by a pre-synaptic FitzHugh–Nagumo electronic neuron, and the laser output controls a post-synaptic FitzHugh–Nagumo electronic neuron. The implemented laser synapse displays very rich dynamics, including fixed points, periodic orbits with different frequency-locking ratios and chaos. These regimes can be beneficial for efficient biorobotics, where behavioral flexibility subserved by synaptic connectivity is a challenge.

  1. HANDS2: accurate assignment of homoeallelic base-identity in allopolyploids despite missing data.

    Science.gov (United States)

    Khan, Amina; Belfield, Eric J; Harberd, Nicholas P; Mithani, Aziz

    2016-07-05

    Characterization of homoeallelic base-identity in allopolyploids is difficult since homeologous subgenomes are closely related and becomes further challenging if diploid-progenitor data is missing. We present HANDS2, a next-generation sequencing-based tool that enables highly accurate (>90%) genome-wide discovery of homeolog-specific base-identity in allopolyploids even in the absence of a diploid-progenitor. We applied HANDS2 to the transcriptomes of various cruciferous plants belonging to genus Brassica. Our results suggest that the three C genomes in Brassica are more similar to each other than the three A genomes, and provide important insights into the relationships between various Brassica tetraploids and their diploid-progenitors at a single-base resolution.

  2. Comparison of hand-craft feature based SVM and CNN based deep learning framework for automatic polyp classification.

    Science.gov (United States)

    Younghak Shin; Balasingham, Ilangko

    2017-07-01

    Colonoscopy is a standard method for screening polyps by highly trained physicians. Miss-detected polyps in colonoscopy are potential risk factor for colorectal cancer. In this study, we investigate an automatic polyp classification framework. We aim to compare two different approaches named hand-craft feature method and convolutional neural network (CNN) based deep learning method. Combined shape and color features are used for hand craft feature extraction and support vector machine (SVM) method is adopted for classification. For CNN approach, three convolution and pooling based deep learning framework is used for classification purpose. The proposed framework is evaluated using three public polyp databases. From the experimental results, we have shown that the CNN based deep learning framework shows better classification performance than the hand-craft feature based methods. It achieves over 90% of classification accuracy, sensitivity, specificity and precision.

  3. Applying the Upper Integral to the Biometric Score Fusion Problem in the Identification Model

    Directory of Open Access Journals (Sweden)

    Khalid Fakhar

    2015-08-01

    Full Text Available This paper presents a new biometric score fusion approach in an identification system using the upper integral with respect to Sugeno’s fuzzy measure. First, the proposed method considers each individual matcher as a fuzzy set in order to handle uncertainty and imperfection in matching scores. Then, the corresponding fuzzy entropy estimates the reliability of the information provided by each biometric matcher. Next, the fuzzy densities are generated based on rank information and training accuracy. Finally, the results are aggregated using the upper fuzzy integral. Experimental results compared with other fusion methods demonstrate the good performance of the proposed approach.

  4. Can Intensive Use of Alcohol-Based Hand Rubs Lead to Passive Alcoholization?

    Directory of Open Access Journals (Sweden)

    Olivier Thomas

    2010-07-01

    Full Text Available Hand disinfection with alcohols-based hand rubs (ABHRs are known to be the most effective measure to prevent nosocomial infections in healthcare. ABHRs contain on average 70% by weight of one or more alcohols. During the hand rubbing procedure, users are exposed to these alcohols not only through dermal contact, but also via inhalation, due to the physical and chemical properties of alcohols volatilizing from alcoholic solutions or gels into the air. Ethanol ingestion is well known to increase risks of several diseases (affecting the pancreas, liver, cardiovascular system…, but there is a lack of knowledge about the effects of exposure to other alcohols (including n- or isopropanol via inhalation and dermal contact, despite the worldwide use of ABHRs. This work aims at discussing possible health effects related to unintentional alcoholization (via inhalation and dermal contact from professional ABHR usage to suggest the need for more research in this area (but not to question the value of ABHRs. Based upon an average of 30 hand rubbings per healthcare professional per day, it can be assumed that a healthcare worker may be exposed to a maximum 5,500 mg/m3 per work shift, five times above the recommended occupational time weighted average limit. Thus, in order to answer the question posed in the title, studies on spatial and temporal variability of alcohol emission from ABHRs in real world situations and studies on certain high risk individuals are needed.

  5. Can Intensive Use of Alcohol-Based Hand Rubs Lead to Passive Alcoholization?

    Science.gov (United States)

    Bessonneau, Vincent; Clément, Michel; Thomas, Olivier

    2010-01-01

    Hand disinfection with alcohols-based hand rubs (ABHRs) are known to be the most effective measure to prevent nosocomial infections in healthcare. ABHRs contain on average 70% by weight of one or more alcohols. During the hand rubbing procedure, users are exposed to these alcohols not only through dermal contact, but also via inhalation, due to the physical and chemical properties of alcohols volatilizing from alcoholic solutions or gels into the air. Ethanol ingestion is well known to increase risks of several diseases (affecting the pancreas, liver, cardiovascular system…), but there is a lack of knowledge about the effects of exposure to other alcohols (including n- or isopropanol) via inhalation and dermal contact, despite the worldwide use of ABHRs. This work aims at discussing possible health effects related to unintentional alcoholization (via inhalation and dermal contact) from professional ABHR usage to suggest the need for more research in this area (but not to question the value of ABHRs). Based upon an average of 30 hand rubbings per healthcare professional per day, it can be assumed that a healthcare worker may be exposed to a maximum 5,500 mg/m3 per work shift, five times above the recommended occupational time weighted average limit. Thus, in order to answer the question posed in the title, studies on spatial and temporal variability of alcohol emission from ABHRs in real world situations and studies on certain high risk individuals are needed. PMID:20948945

  6. Hand gesture guided robot-assisted surgery based on a direct augmented reality interface.

    Science.gov (United States)

    Wen, Rong; Tay, Wei-Liang; Nguyen, Binh P; Chng, Chin-Boon; Chui, Chee-Kong

    2014-09-01

    Radiofrequency (RF) ablation is a good alternative to hepatic resection for treatment of liver tumors. However, accurate needle insertion requires precise hand-eye coordination and is also affected by the difficulty of RF needle navigation. This paper proposes a cooperative surgical robot system, guided by hand gestures and supported by an augmented reality (AR)-based surgical field, for robot-assisted percutaneous treatment. It establishes a robot-assisted natural AR guidance mechanism that incorporates the advantages of the following three aspects: AR visual guidance information, surgeon's experiences and accuracy of robotic surgery. A projector-based AR environment is directly overlaid on a patient to display preoperative and intraoperative information, while a mobile surgical robot system implements specified RF needle insertion plans. Natural hand gestures are used as an intuitive and robust method to interact with both the AR system and surgical robot. The proposed system was evaluated on a mannequin model. Experimental results demonstrated that hand gesture guidance was able to effectively guide the surgical robot, and the robot-assisted implementation was found to improve the accuracy of needle insertion. This human-robot cooperative mechanism is a promising approach for precise transcutaneous ablation therapy. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  7. Hand-Eye LRF-Based Iterative Plane Detection Method for Autonomous Robotic Welding

    Directory of Open Access Journals (Sweden)

    Sungmin Lee

    2015-12-01

    Full Text Available This paper proposes a hand-eye LRF-based (laser range finder welding plane-detection method for autonomous robotic welding in the field of shipbuilding. The hand-eye LRF system consists of a 6 DOF manipulator and an LRF attached to the wrist of the manipulator. The welding plane is detected by the LRF with only the wrist's rotation to minimize a mechanical error caused by the manipulator's motion. A position on the plane is determined as an average position of the detected points on the plane, and a normal vector to the plane is determined by applying PCA (principal component analysis to the detected points. In this case, the accuracy of the detected plane is analysed by simulations with respect to the wrist's angle interval and the plane angle. As a result of the analysis, an iterative plane-detection method with the manipulator's alignment motion is proposed to improve the performance of plane detection. For verifying the feasibility and effectiveness of the proposed plane-detection method, experiments are carried out with a prototype of the hand-eye LRF-based system, which consists of a 1 DOF wrist's joint, an LRF system and a rotatable plane. In addition, the experimental results of the PCA-based plane detection method are compared with those of the two representative plane-detection methods, based on RANSAC (RANdom SAmple Consensus and the 3D Hough transform in both accuracy and computation time's points of view.

  8. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    Directory of Open Access Journals (Sweden)

    Josua Tarigan

    2004-01-01

    Full Text Available As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges will face when develop biometric technology as control in accounting information system are standardization, hybrid technology uses, life cycle management. Abstract in Bahasa Indonesia : Adanya keinginan setiap organisasi untuk mencari metode pengamanan authentication yang lebih untuk akses user, dijawab dengan adanya teknologi biometric security yang mendapat perhatian yang cukup besar bagi organisasi. Implementasi teknologi biometric security cukup luas dalam sistem informasi akuntansi yaitu sebagai pengendalian pada physical access, virtual access, e-commerce applications dan covert surveillance. Dalam mengimplementasikan teknologi biometric, ada tiga tahapan yang harus dilakukan organisasi, yakni strategic planning and budgeting, developing a system reliability plan dan documentation. Tantangan yang akan dihadapi dalam mengembangkan teknologi biometric sebagai pengendalian dalam sistem informasi akuntansi yakni standarisasi, aplikasi teknologi hybrid dan manajemen siklus hidup pada biometric security. Kata kunci: authentication, akses user dan biometric security.

  9. Modelling of Biometric Identification System with Given Parameters Using Colored Petri Nets

    Science.gov (United States)

    Petrosyan, G.; Ter-Vardanyan, L.; Gaboutchian, A.

    2017-05-01

    Biometric identification systems use given parameters and function on the basis of Colored Petri Nets as a modelling language developed for systems in which communication, synchronization and distributed resources play an important role. Colored Petri Nets combine the strengths of Classical Petri Nets with the power of a high-level programming language. Coloured Petri Nets have both, formal intuitive and graphical presentations. Graphical CPN model consists of a set of interacting modules which include a network of places, transitions and arcs. Mathematical representation has a well-defined syntax and semantics, as well as defines system behavioural properties. One of the best known features used in biometric is the human finger print pattern. During the last decade other human features have become of interest, such as iris-based or face recognition. The objective of this paper is to introduce the fundamental concepts of Petri Nets in relation to tooth shape analysis. Biometric identification systems functioning has two phases: data enrollment phase and identification phase. During the data enrollment phase images of teeth are added to database. This record contains enrollment data as a noisy version of the biometrical data corresponding to the individual. During the identification phase an unknown individual is observed again and is compared to the enrollment data in the database and then system estimates the individual. The purpose of modeling biometric identification system by means of Petri Nets is to reveal the following aspects of the functioning model: the efficiency of the model, behavior of the model, mistakes and accidents in the model, feasibility of the model simplification or substitution of its separate components for more effective components without interfering system functioning. The results of biometric identification system modeling and evaluating are presented and discussed.

  10. Approach to Hand Tracking and Gesture Recognition Based on Depth-Sensing Cameras and EMG Monitoring

    Directory of Open Access Journals (Sweden)

    Ondrej

    2014-06-01

    Full Text Available In this paper, a new approach for hand tracking and gesture recognition based on the Leap Motion device and surface electromyography (SEMG is presented. The system is about to process the depth image information and the electrical activity produced by skeletal muscles on forearm. The purpose of such combination is enhancement in the gesture recognition rate. As a first we analyse the conventional approaches toward hand tracking and gesture recognition and present the results of various researches. Successive topic gives brief overview of depth-sensing cameras with focus on Leap motion device where we test its accuracy of fingers recognition. The vision-SEMG-based system is to be potentially applicable to many areas of human computer interaction.

  11. Hand-Based Gesture Recognition for Vehicular Applications Using IR-UWB Radar.

    Science.gov (United States)

    Khan, Faheem; Leem, Seong Kyu; Cho, Sung Ho

    2017-04-11

    Modern cars continue to offer more and more functionalities due to which they need a growing number of commands. As the driver tries to monitor the road and the graphic user interface simultaneously, his/her overall efficiency is reduced. In order to reduce the visual attention necessary for monitoring, a gesture-based user interface is very important. In this paper, gesture recognition for a vehicle through impulse radio ultra-wideband (IR-UWB) radar is discussed. The gestures can be used to control different electronic devices inside a vehicle. The gestures are based on human hand and finger motion. We have implemented a real-time version using only one radar sensor. Studies on gesture recognition using IR-UWB radar have rarely been carried out, and some studies are merely simple methods using the magnitude of the reflected signal or those whose performance deteriorates largely due to changes in distance or direction. In this study, we propose a new hand-based gesture recognition algorithm that works robustly against changes in distance or direction while responding only to defined gestures by ignoring meaningless motions. We used three independent features, i.e., variance of the probability density function (pdf) of the magnitude histogram, time of arrival (TOA) variation and the frequency of the reflected signal, to classify the gestures. A data fitting method is included to differentiate between gesture signals and unintended hand or body motions. We have used the clustering technique for the classification of the gestures. Moreover, the distance information is used as an additional input parameter to the clustering algorithm, such that the recognition technique will not be vulnerable to distance change. The hand-based gesture recognition proposed in this paper would be a key technology of future automobile user interfaces.

  12. Modulation of grasping force in prosthetic hands using neural network-based predictive control.

    Science.gov (United States)

    Pasluosta, Cristian F; Chiu, Alan W L

    2015-01-01

    This chapter describes the implementation of a neural network-based predictive control system for driving a prosthetic hand. Nonlinearities associated with the electromechanical aspects of prosthetic devices present great challenges for precise control of this type of device. Model-based controllers may overcome this issue. Moreover, given the complexity of these kinds of electromechanical systems, neural network-based modeling arises as a good fit for modeling the fingers' dynamics. The results of simulations mimicking potential situations encountered during activities of daily living demonstrate the feasibility of this technique.

  13. Efficacy of soap and water and alcohol-based hand-rub preparations against live H1N1 influenza virus on the hands of human volunteers.

    Science.gov (United States)

    Grayson, M Lindsay; Melvani, Sharmila; Druce, Julian; Barr, Ian G; Ballard, Susan A; Johnson, Paul D R; Mastorakos, Tasoula; Birch, Christopher

    2009-02-01

    Although pandemic and avian influenza are known to be transmitted via human hands, there are minimal data regarding the effectiveness of routine hand hygiene (HH) protocols against pandemic and avian influenza. Twenty vaccinated, antibody-positive health care workers had their hands contaminated with 1 mL of 10(7) tissue culture infectious dose (TCID)(50)/0.1 mL live human influenza A virus (H1N1; A/New Caledonia/20/99) before undertaking 1 of 5 HH protocols (no HH [control], soap and water hand washing [SW], or use of 1 of 3 alcohol-based hand rubs [61.5% ethanol gel, 70% ethanol plus 0.5% chlorhexidine solution, or 70% isopropanol plus 0.5% chlorhexidine solution]). H1N1 concentrations were assessed before and after each intervention by viral culture and real-time reverse-transcriptase polymerase chain reaction (PCR). The natural viability of H1N1 on hands for >60 min without HH was also assessed. There was an immediate reduction in culture-detectable and PCR-detectable H1N1 after brief cutaneous air drying--14 of 20 health care workers had H1N1 detected by means of culture (mean reduction, 10(3-4) TCID(50)/0.1 mL), whereas 6 of 20 had no viable H1N1 recovered; all 20 health care workers had similar changes in PCR test results. Marked antiviral efficacy was noted for all 4 HH protocols, on the basis of culture results (14 of 14 had no culturable H1N1; (Phand rubs, although the actual difference was only 1-100 virus copies/microL. There was minimal reduction in H1N1 after 60 min without HH. HH with SW or alcohol-based hand rub is highly effective in reducing influenza A virus on human hands, although SW is the most effective intervention. Appropriate HH may be an important public health initiative to reduce pandemic and avian influenza transmission.

  14. Behavioral Biometrics in Assisted Living: A Methodology for Emotion Recognition

    Directory of Open Access Journals (Sweden)

    S. Xefteris

    2016-08-01

    Full Text Available Behavioral biometrics aim at providing algorithms for the automatic recognition of individual behavioral traits, stemming from a person’s actions, attitude, expressions and conduct. In the field of ambient assisted living, behavioral biometrics find an important niche. Individuals suffering from the early stages of neurodegenerative diseases (MCI, Alzheimer’s, dementia need supervision in their daily activities. In this context, an unobtrusive system to monitor subjects and alert formal and informal carers providing information on both physical and emotional status is of great importance and positively affects multiple stakeholders. The primary aim of this paper is to describe a methodology for recognizing the emotional status of a subject using facial expressions and to identify its uses, in conjunction with pre-existing risk-assessment methodologies, for its integration into the context of a smart monitoring system for subjects suffering from neurodegenerative diseases. Paul Ekman’s research provided the background on the universality of facial expressions as indicators of underlying emotions. The methodology then makes use of computational geometry, image processing and graph theory algorithms for the detection of regions of interest and then a neural network is used for the final classification. Findings are coupled with previous published work for risk assessment and alert generation in the context of an ambient assisted living environment based on Service oriented architecture principles, aimed at remote web-based estimation of the cognitive and physical status of MCI and dementia patients.

  15. A novel biometric signature: multi-site, remote (> 100 m) photo-plethysmography using ambient light

    NARCIS (Netherlands)

    Verkruijsse, W.; Bodlaender, M.P.

    2010-01-01

    We propose a novel biometric signature based on the principle of multi-site remote photo-plethysmography (remote PPG). This signature can be measured using video cameras. Traditional PPG uses a contact sensor to measure slight skin color changes that occur with every heartbeat. Recently we have

  16. Assessing Factors Affecting Physician's Intention to Adopt Biometric Authentication Technology in Electronic Medical Records

    Science.gov (United States)

    Corazao, Cesar E.

    2014-01-01

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulated the privacy and security of patient information. Since HIPPA became a law, hospital operators have struggled to comply fully with its security and privacy provisions. The proximity-based biometric authentication (PBBA) technology evolved in last decade to help…

  17. Moisturizing effect of alcohol-based hand rub containing okra polysaccharide.

    Science.gov (United States)

    Kanlayavattanakul, M; Rodchuea, C; Lourith, N

    2012-06-01

    A natural, moisturizing alcohol-based hand rub (ABHR) containing okra (Abelmoschus esculentus) polysaccharide was formulated to reduce the dryness caused by traditional hand-cleansing products. The ABHR developed also reduced infectious disease transmission. Preliminary evaluations of the stable natural hand hygiene preparations were conducted to determine preference and short-term moisturizing efficacy in volunteers. Formulations contained varying amounts of gelling agent (0.5% and 0.3% w/v). Accelerated stability testing using a centrifugation assay and six heating/cooling cycles of the ABHR bases were performed. Then, okra polysaccharide (5%, 7%, 10% and 15% w/w) was incorporated into the base, and stability tests were repeated. The moisturizing okra polysaccharide was compatible with the formulations at all concentrations. All of the formulated ABHRs were stable. Sensory evaluation was conducted in 36 volunteers. The two most preferred okra ABHRs were patch-tested in 12 volunteers; results indicated none of the preparations caused irritation. Efficacy of the most preferred moisturizing ABHR containing 0.3% gelling agent and 10% (w/v) okra extract was determined. Short-term moisturizing efficacy of a single application was examined in 20 volunteers. The okra ABHR hydrated skin significantly better than a control ABHR (P okra is safe, efficacious and possesses desirable properties. The formulation can be applied every 3 h for good hand hygiene with moisturizing efficacy. © 2012 The Authors. ICS © 2012 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  18. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  19. Are Haar-like Rectangular Features for Biometric Recognition Reducible?

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2013-01-01

    ? This paper proposes total sensitivity analysis about the mean for this purpose for two different biometric traits, iris and face. Experimental results on multiple public databases show the superiority of the proposed system, using the found influential features, compared to state-of-the-art biometric......Biometric recognition is still a very difficult task in real-world scenarios wherein unforeseen changes in degradations factors like noise, occlusion, blurriness and illumination can drastically affect the extracted features from the biometric signals. Very recently Haar-like rectangular features...... which have usually been used for object detection were introduced for biometric recognition resulting in systems that are robust against most of the mentioned degradations [9]. The problem with these features is that one can define many different such features for a given biometric signal...

  20. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  1. Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study

    Directory of Open Access Journals (Sweden)

    I. G. Damousis

    2012-01-01

    Full Text Available We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs, Artificial Neural Networks (ANNs, Fuzzy Expert Systems (FESs, and Support Vector Machines (SVMs. The fusion of biometrics leads to security systems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not included in the training dataset. The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature.

  2. Repeatability of grasp recognition for robotic hand prosthesis control based on sEMG data.

    Science.gov (United States)

    Palermo, Francesca; Cognolato, Matteo; Gijsberts, Arjan; Muller, Henning; Caputo, Barbara; Atzori, Manfredo

    2017-07-01

    Control methods based on sEMG obtained promising results for hand prosthetics. Control system robustness is still often inadequate and does not allow the amputees to perform a large number of movements useful for everyday life. Only few studies analyzed the repeatability of sEMG classification of hand grasps. The main goals of this paper are to explore repeatability in sEMG data and to release a repeatability database with the recorded experiments. The data are recorded from 10 intact subjects repeating 7 grasps 12 times, twice a day for 5 days. The data are publicly available on the Ninapro web page. The analysis for the repeatability is based on the comparison of movement classification accuracy in several data acquisitions and for different subjects. The analysis is performed using mean absolute value and waveform length features and a Random Forest classifier. The accuracy obtained by training and testing on acquisitions at different times is on average 27.03% lower than training and testing on the same acquisition. The results obtained by training and testing on different acquisitions suggest that previous acquisitions can be used to train the classification algorithms. The inter-subject variability is remarkable, suggesting that specific characteristics of the subjects can affect repeatibility and sEMG classification accuracy. In conclusion, the results of this paper can contribute to develop more robust control systems for hand prostheses, while the presented data allows researchers to test repeatability in further analyses.

  3. The effect of inquiry-based, hands-on labs on achievement in middle school science

    Science.gov (United States)

    Miller, Donna Kaye Green

    The purpose of this quasi-experimental study was to measure the difference in science achievement between students who had been taught with an inquiry-based, hands-on pedagogical approach and those who had not. Improving student academic achievement and standardized test scores is the major objective of teachers, parents, school administrators, government entities, and students themselves. One major barrier to this academic success in Georgia, and the entire United States, has been the paucity of success in middle level science classes. Many studies have been conducted to determine the learning approaches that will best enable students to not only acquire a deeper understanding of science concepts, but to equip them to apply that new knowledge in their daily activities. Inquiry-based, hands-on learning involves students participating in activities that reflect methods of scientific investigation. The effective utilization of the inquiry-based learning approach demands inclusion of learners in a self-directed learning environment, the ability to think critically, and an understanding of how to reflect and reason scientifically. The treatment group using an inquiry-based, hands-on program did score slightly higher on the CRCT. However, the results revealed that there was not a significant difference in student achievement. This study showed that the traditionally instructed control group had slightly higher interest in science than the inquiry-based treatment group. The findings of this research study indicated that the NCLB mandates might need to be altered if there are no significant academic gains that result from the use of inquiry-based strategies.

  4. Combining Hand-crafted Rules and Unsupervised Learning in Constraint-based Morphological Disambiguation

    CERN Document Server

    Oflazer, K; Oflazer, Kemal; Tur, Gokhan

    1996-01-01

    This paper presents a constraint-based morphological disambiguation approach that is applicable languages with complex morphology--specifically agglutinative languages with productive inflectional and derivational morphological phenomena. In certain respects, our approach has been motivated by Brill's recent work, but with the observation that his transformational approach is not directly applicable to languages like Turkish. Our system combines corpus independent hand-crafted constraint rules, constraint rules that are learned via unsupervised learning from a training corpus, and additional statistical information from the corpus to be morphologically disambiguated. The hand-crafted rules are linguistically motivated and tuned to improve precision without sacrificing recall. The unsupervised learning process produces two sets of rules: (i) choose rules which choose morphological parses of a lexical item satisfying constraint effectively discarding other parses, and (ii) delete rules, which delete parses sati...

  5. Simple Ontology of Manipulation Actions based on Hand-Object Relations

    DEFF Research Database (Denmark)

    Wörgötter, Florentin; Aksoy, E. E.; Krüger, Norbert

    2013-01-01

    Humans can perform a multitude of different actions with their hands (manipulations). In spite of this, so far there have been only a few attempts to represent manipulation types trying to understand the underlying principles. Here we first discuss how manipulation actions are structured in space...... and time. For this we use as temporal anchor points those moments where two objects (or hand and object) touch or un-touch each other during a manipulation. We show that by this one can define a relatively small tree-like manipulation ontology. We find less than 30 fundamental manipulations. The temporal...... and encoded. Examples of manipulations recognition and execution by a robot based on this representation are given at the end of this study....

  6. A video-based system for hand-driven stop-motion animation.

    Science.gov (United States)

    Han, Xiaoguang; Fu, Hongbo; Zheng, Hanlin; Liu, Ligang; Wang, Jue

    2013-01-01

    Stop-motion is a well-established animation technique but is often laborious and requires craft skills. A new video-based system can animate the vast majority of everyday objects in stop-motion style, more flexibly and intuitively. Animators can perform and capture motions continuously instead of breaking them into increments and shooting one still picture per increment. More important, the system permits direct hand manipulation without resorting to rigs, achieving more natural object control for beginners. The system's key component is two-phase keyframe-based capturing and processing, assisted by computer vision techniques. With this system, even amateurs can generate high-quality stop-motion animations.

  7. Tongue prints in biometric authentication: A pilot study

    OpenAIRE

    Jeddy, Nadeem; Radhika, T; Nithya, S

    2017-01-01

    Background and Objectives: Biometric authentication is an important process for the identification and verification of individuals for security purposes. There are many biometric systems that are currently in use and also being researched. Tongue print is a new biometric authentication tool that is unique and cannot be easily forged because no two tongue prints are similar. The present study aims to evaluate the common morphological features of the tongue and its variations in males and femal...

  8. Improving Speaker Recognition by Biometric Voice Deconstruction

    Directory of Open Access Journals (Sweden)

    Luis Miguel eMazaira-Fernández

    2015-09-01

    Full Text Available Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g. YouTube to broadcast its message. In this new scenario, classical identification methods (such fingerprints or face recognition have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. Through the present paper, a new methodology to characterize speakers will be shown. This methodology is benefiting from the advances achieved during the last years in understanding and modelling voice production. The paper hypothesizes that a gender dependent characterization of speakers combined with the use of a new set of biometric parameters extracted from the components resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract gender-dependent extended biometric parameters are given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  9. A Prosthetic Hand Body Area Controller Based on Efficient Pattern Recognition Control Strategies.

    Science.gov (United States)

    Benatti, Simone; Milosevic, Bojan; Farella, Elisabetta; Gruppioni, Emanuele; Benini, Luca

    2017-04-15

    Poliarticulated prosthetic hands represent a powerful tool to restore functionality and improve quality of life for upper limb amputees. Such devices offer, on the same wearable node, sensing and actuation capabilities, which are not equally supported by natural interaction and control strategies. The control in state-of-the-art solutions is still performed mainly through complex encoding of gestures in bursts of contractions of the residual forearm muscles, resulting in a non-intuitive Human-Machine Interface (HMI). Recent research efforts explore the use of myoelectric gesture recognition for innovative interaction solutions, however there persists a considerable gap between research evaluation and implementation into successful complete systems. In this paper, we present the design of a wearable prosthetic hand controller, based on intuitive gesture recognition and a custom control strategy. The wearable node directly actuates a poliarticulated hand and wirelessly interacts with a personal gateway (i.e., a smartphone) for the training and personalization of the recognition algorithm. Through the whole system development, we address the challenge of integrating an efficient embedded gesture classifier with a control strategy tailored for an intuitive interaction between the user and the prosthesis. We demonstrate that this combined approach outperforms systems based on mere pattern recognition, since they target the accuracy of a classification algorithm rather than the control of a gesture. The system was fully implemented, tested on healthy and amputee subjects and compared against benchmark repositories. The proposed approach achieves an error rate of 1.6% in the end-to-end real time control of commonly used hand gestures, while complying with the power and performance budget of a low-cost microcontroller.

  10. [Severe cases with hand, foot and mouth disease: data based on national pilot hand, foot and mouth disease surveillance system].

    Science.gov (United States)

    Zheng, Y M; Chang, Z R; Jiang, L L; Ji, H; Chen, G P; Luo, P; Pan, J J; Tian, X L; Wei, L L; Huo, D; Miao, Z P; Zou, X N; Chen, J H; Liao, Q H

    2017-06-10

    Objective: To investigate the clinical severity, etiological classification and risk factors of severe cases with hand, foot and mouth disease (HFMD). Methods: A total of 1 489 records on severe and fatal HFMD cases reported to the national pilot surveillance system of HFMD were used to analyze the demographic, medical treatment, etiological classification of the cases. Treatment outcome related risk factors were also studied with multi-variable stepwise logistic regression method. Results: Seven out of the 1 489 severe HFMD cases died of this disease. A total of 960 (72.9%) were under three years old and 62.9% were male and most of the cases (937, 62.9%) resided in rural areas. Among all the cases, 494 (33.2%) went to seek the first medical assistance at the institutions of village or township level. Durations between disease onset and first medical attendance, being diagnosed as the disease or diagnosed as severe cases were 0(0-1) d, 1 (0-2) d and 2 (1-4) d, respectively. In total, 773 (51.9%) of the severe HFMD cases were diagnosed as with aseptic meningitis, 260 (17.5%) with brainstem encephalitis, 377 (25.3%) with non-brainstem encephalitis, 6 (0.4%) with encephalomyelitis, 1 (0.1%) with acute flaccid paralysis, 4 (0.3%) with pulmonary hemorrhage/pulmonary edema and 68 (4.6%) with cardiopulmonary failure. Of the etiologically diagnosed 1 217 severe and fatal HFMD cases, 642 (52.8%) were with EV71, other enterovirus 261 (21.5%), Cox A16 36 (3.0%), 1 (0.1%) with both EV71 and Cox A16. However, 277 (22.8%) showed negative on any pathogenic virus. Complication (Z=3.15, P=0.002) and duration between onset and diagnosed as severe cases (Z=3.95, P<0.001) were shown as key factors related to treatment outcomes. Conclusions: Most severe HFMD cases appeared in boys, especially living in the rural areas. Frequently seen complications would include aseptic meningitis, non-brainstem encephalitis and brainstem encephalitis. EV71 was the dominant etiology for severe and

  11. Generating One Biometric Feature from Another: Faces from Fingerprints

    Science.gov (United States)

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877

  12. Generating One Biometric Feature from Another: Faces from Fingerprints

    Directory of Open Access Journals (Sweden)

    Seref Sagiroglu

    2010-04-01

    Full Text Available This study presents a new approach based on artificial neural networks for generating one biometric feature (faces from another (only fingerprints. An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces.

  13. Occupation-based intervention in hand injury rehabilitation: Experiences of occupational therapists in Malaysia.

    Science.gov (United States)

    Che Daud, Ahmad Zamir; Yau, Matthew K; Barnett, Fiona; Judd, Jenni

    2016-01-01

    In a previous study consensus was sought from Malaysian occupational therapists of occupation-based intervention (OBI) that was perceived as a means and an end. Occupation as a means refers to occupational and purposeful tasks as a therapeutic agent while occupation as an end refers to occupation as an outcome of intervention. The purpose of this follow-up study was to describe the occupational therapists' experiences of providing OBI in hand injury rehabilitation in Malaysia. Sixteen occupational therapists with more than five years of experience in hand rehabilitation were individually interviewed on their experiences of using OBI in practice. Data were thematically analysed using interpretative phenomenological analysis. Definition of "Occupation as a means", and "Occupation as an end" was broadened after data analysis of interviews to include two new themes: "Rewarding yet challenging" and "Making OBI a reality". Occupational therapists had positive experiences with OBI and perceived that occupation as a means and an end can be merged into a single therapy session when the occupational therapists use an occupation that is therapeutic. Although occupation as a means and as an end have different purposes, when the ultimate goal is to enhance the clients' maximum level of functioning both can be used for successful rehabilitation of hand injuries.

  14. Hand-held internet tablets for school-based data collection.

    Science.gov (United States)

    Denny, Simon J; Milfont, Taciano L; Utter, Jennifer; Robinson, Elizabeth M; Ameratunga, Shanthi N; Merry, Sally N; Fleming, Theresa M; Watson, Peter D

    2008-07-26

    In the last 20 years, researchers have been using computer self-administered questionnaires to gather data on a wide range of adolescent health related behaviours. More recently, researchers collecting data in schools have started to use smaller hand-held computers for their ease of use and portability. The aim of this study is to describe a new technology with wi-fi enabled hand-held internet tablets and to compare adolescent preferences of laptop computers or hand-held internet tablets in administering a youth health and well-being questionnaire in a school setting. A total of 177 students took part in a pilot study of a national youth health and wellbeing survey. Students were randomly assigned to internet tablets or laptops at the start of the survey and were changed to the alternate mode of administration about half-way through the questionnaire. Students at the end of the questionnaire were asked which of the two modes of administration (1) they preferred, (2) was easier to use, (3) was more private and confidential, and (4) was easier to answer truthfully. Many students expressed no preference between laptop computers or internet tablets. However, among the students who expressed a preference between laptop computers or internet tablets, the majority of students found the internet tablets more private and confidential (p internet tablets is a feasible methodology for school-based surveys especially when asking about sensitive information.

  15. Soft object deformation monitoring and learning for model-based robotic hand manipulation.

    Science.gov (United States)

    Cretu, Ana-Maria; Payeur, Pierre; Petriu, Emil M

    2012-06-01

    This paper discusses the design and implementation of a framework that automatically extracts and monitors the shape deformations of soft objects from a video sequence and maps them with force measurements with the goal of providing the necessary information to the controller of a robotic hand to ensure safe model-based deformable object manipulation. Measurements corresponding to the interaction force at the level of the fingertips and to the position of the fingertips of a three-finger robotic hand are associated with the contours of a deformed object tracked in a series of images using neural-network approaches. The resulting model captures the behavior of the object and is able to predict its behavior for previously unseen interactions without any assumption on the object's material. The availability of such models can contribute to the improvement of a robotic hand controller, therefore allowing more accurate and stable grasp while providing more elaborate manipulation capabilities for deformable objects. Experiments performed for different objects, made of various materials, reveal that the method accurately captures and predicts the object's shape deformation while the object is submitted to external forces applied by the robot fingers. The proposed method is also fast and insensitive to severe contour deformations, as well as to smooth changes in lighting, contrast, and background.

  16. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  17. Hand collection - hand harvest

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a summary of activities related to the collection and harvest of seeds on Neal Smith National Wildlife Refuge between 1992 and 2009. Information about hand...

  18. Actin-based motility of Listeria: Right-handed helical trajectories

    Science.gov (United States)

    Rangarajan, Murali

    2012-06-01

    Bacteria such as Listeria monocytogenes recruit cellular machinery to move in and between cells. Understanding the mechanism of motility, including force and torque generation and the resultant displacements, holds keys to numerous applications in medicine and biosensing. In this work, a simple back-of-the-envelope calculation is presented to illustrate that a biomechanical model of actin-based motility of a rigid surface through persistently attached filaments propelled by affinity-modulated molecular motors can produce a right-handed helical trajectory consistent with experimental observations. The implications of the mechanism to bacterial motility are discussed.

  19. Comparative review of studies on aging effects in context of biometric authentication

    Science.gov (United States)

    Scheidat, Tobias; Heinze, Juliane; Vielhauer, Claus; Dittmann, Jana; Kraetzer, Christian

    2011-02-01

    The performance of a biometric system from the point of view of authentication, enrollment and usability depends not only on the algorithms, hardware and software used, but also on aging effects of the human body. Thus, the examination of the influence of ageing depended physiological and mental variances of potential user groups is an important part of biometric research. In this paper a survey of studies is presented which examining effects of biological aging on enrollment and authentication performance as well as usability of biometric systems based on modalities fingerprint, face and iris. In order to compare the findings of the studies and overcome the problem, that nearly every one of these studies uses its own database with varying number of users and different sensors, measurements and/or aging levels, we developed a novel graphical representation of the results. It provides an overview of changes appearing with increasing age and possible influences on performance or usability. The outcomes of a high number of evaluations are compared for each of the three biometric modalities in context of aging and finally concluded in the novel graphical representation.

  20. A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices

    Directory of Open Access Journals (Sweden)

    Chorng-Shiuh Koong

    2014-01-01

    Full Text Available With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.

  1. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.

    Science.gov (United States)

    Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.

  2. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    Science.gov (United States)

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  3. Deep learning-based artificial vision for grasp classification in myoelectric hands.

    Science.gov (United States)

    Ghazaei, Ghazal; Alameer, Ali; Degenaar, Patrick; Morgan, Graham; Nazarpour, Kianoush

    2017-06-01

    Computer vision-based assistive technology solutions can revolutionise the quality of care for people with sensorimotor disorders. The goal of this work was to enable trans-radial amputees to use a simple, yet efficient, computer vision system to grasp and move common household objects with a two-channel myoelectric prosthetic hand. We developed a deep learning-based artificial vision system to augment the grasp functionality of a commercial prosthesis. Our main conceptual novelty is that we classify objects with regards to the grasp pattern without explicitly identifying them or measuring their dimensions. A convolutional neural network (CNN) structure was trained with images of over 500 graspable objects. For each object, 72 images, at [Formula: see text] intervals, were available. Objects were categorised into four grasp classes, namely: pinch, tripod, palmar wrist neutral and palmar wrist pronated. The CNN setting was first tuned and tested offline and then in realtime with objects or object views that were not included in the training set. The classification accuracy in the offline tests reached [Formula: see text] for the seen and [Formula: see text] for the novel objects; reflecting the generalisability of grasp classification. We then implemented the proposed framework in realtime on a standard laptop computer and achieved an overall score of [Formula: see text] in classifying a set of novel as well as seen but randomly-rotated objects. Finally, the system was tested with two trans-radial amputee volunteers controlling an i-limb UltraTM prosthetic hand and a motion controlTM prosthetic wrist; augmented with a webcam. After training, subjects successfully picked up and moved the target objects with an overall success of up to [Formula: see text]. In addition, we show that with training, subjects' performance improved in terms of time required to accomplish a block of 24 trials despite a decreasing level of visual feedback. The proposed design constitutes a

  4. Deep learning-based artificial vision for grasp classification in myoelectric hands

    Science.gov (United States)

    Ghazaei, Ghazal; Alameer, Ali; Degenaar, Patrick; Morgan, Graham; Nazarpour, Kianoush

    2017-06-01

    Objective. Computer vision-based assistive technology solutions can revolutionise the quality of care for people with sensorimotor disorders. The goal of this work was to enable trans-radial amputees to use a simple, yet efficient, computer vision system to grasp and move common household objects with a two-channel myoelectric prosthetic hand. Approach. We developed a deep learning-based artificial vision system to augment the grasp functionality of a commercial prosthesis. Our main conceptual novelty is that we classify objects with regards to the grasp pattern without explicitly identifying them or measuring their dimensions. A convolutional neural network (CNN) structure was trained with images of over 500 graspable objects. For each object, 72 images, at {{5}\\circ} intervals, were available. Objects were categorised into four grasp classes, namely: pinch, tripod, palmar wrist neutral and palmar wrist pronated. The CNN setting was first tuned and tested offline and then in realtime with objects or object views that were not included in the training set. Main results. The classification accuracy in the offline tests reached 85 % for the seen and 75 % for the novel objects; reflecting the generalisability of grasp classification. We then implemented the proposed framework in realtime on a standard laptop computer and achieved an overall score of 84 % in classifying a set of novel as well as seen but randomly-rotated objects. Finally, the system was tested with two trans-radial amputee volunteers controlling an i-limb UltraTM prosthetic hand and a motion controlTM prosthetic wrist; augmented with a webcam. After training, subjects successfully picked up and moved the target objects with an overall success of up to 88 % . In addition, we show that with training, subjects’ performance improved in terms of time required to accomplish a block of 24 trials despite a decreasing level of visual feedback. Significance. The proposed design constitutes a substantial

  5. Biometrics "Foundation Documents"

    Science.gov (United States)

    2009-01-01

    physiological components of acoustic speech production. His findings were based on the analysis of x-rays of individuals making specified phonic ... acoustic speech production, based on the analysis of x-rays of individuals making specified phonic sounds.1 In 1970, Dr. Joseph Perkell used motion x-rays...pattern for identification is proposed 1960s Face recognition becomes semi-automated 1960 First model of acoustic speech production is created 1963

  6. Establishment Code Hand Palm (Palm Code 2D Gabor-Based Method

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Putra

    2013-03-01

    Full Text Available Palmprint is relatively new in physiological biometrics. Palmprint ROI segmentation and feature extraction are two important issues in palm print recognition. This paper introduces two steps in the center of mass moment method for ROI segmentation that will be applied in the Gabor 2D filter to obtain palm code as palmprint feature vector. Normalized Hamming distance was used to measure the similarity degrees of two feature vectors of palmprint. The system was tested using database 1000 palmprint images generated from 5 samples from each of the 200 persons randomly selected with ROI 64 x 64 and 128 x 128 pixel. Experiment results show that this system can achieve high performance with a success rate about 98.7% (FRR = 1.17%, FAR = 0.11%, T = 0.376 with ROI 64 x 64 pixel.

  7. A sensory feedback system for prosthetic hand based on evoked tactile sensation.

    Science.gov (United States)

    Liu, X X; Chai, G H; Qu, H E; Lan, N

    2015-01-01

    The lack of reliable sensory feedback has been one of the barriers in prosthetic hand development. Restoring sensory function from prosthetic hand to amputee remains a great challenge to neural engineering. In this paper, we present the development of a sensory feedback system based on the phenomenon of evoked tactile sensation (ETS) at the stump skin of residual limb induced by transcutaneous electrical nerve stimulation (TENS). The system could map a dynamic pattern of stimuli to an electrode placed on the corresponding projected finger areas on the stump skin. A pressure transducer placed at the tip of prosthetic fingers was used to sense contact pressure, and a high performance DSP processor sampled pressure signals, and calculated the amplitude of feedback stimulation in real-time. Biphasic and charge-balanced current pulses with amplitude modulation generated by a multi-channel laboratory stimulator were delivered to activate sensory nerves beneath the skin. We tested this sensory feedback system in amputee subjects. Preliminary results showed that the subjects could perceive different levels of pressure at the tip of prosthetic finger through evoked tactile sensation (ETS) with distinct grades and modalities. We demonstrated the feasibility to restore the perceptual sensation from prosthetic fingers to amputee based on the phenomenon of evoked tactile sensation (ETS) with TENS.

  8. Smartphone based hand-held quantitative phase microscope using the transport of intensity equation method.

    Science.gov (United States)

    Meng, Xin; Huang, Huachuan; Yan, Keding; Tian, Xiaolin; Yu, Wei; Cui, Haoyang; Kong, Yan; Xue, Liang; Liu, Cheng; Wang, Shouyu

    2016-12-20

    In order to realize high contrast imaging with portable devices for potential mobile healthcare, we demonstrate a hand-held smartphone based quantitative phase microscope using the transport of intensity equation method. With a cost-effective illumination source and compact microscope system, multi-focal images of samples can be captured by the smartphone's camera via manual focusing. Phase retrieval is performed using a self-developed Android application, which calculates sample phases from multi-plane intensities via solving the Poisson equation. We test the portable microscope using a random phase plate with known phases, and to further demonstrate its performance, a red blood cell smear, a Pap smear and monocot root and broad bean epidermis sections are also successfully imaged. Considering its advantages as an accurate, high-contrast, cost-effective and field-portable device, the smartphone based hand-held quantitative phase microscope is a promising tool which can be adopted in the future in remote healthcare and medical diagnosis.

  9. Biometric Quantization through Detection Rate Optimized Bit Allocation

    NARCIS (Netherlands)

    Chen, C.; Veldhuis, Raymond N.J.; Kevenaar, T.A.M.; Akkermans, A.H.M.

    2009-01-01

    Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for

  10. Factors impacting on the adoption of biometric technology by South ...

    African Journals Online (AJOL)

    of biometric authentication in the South African banking sector as a means of authentication. The study constitutes exploratory research and is limited to the use of biometric technology within the financial services sector. Within this sector, specific focus is placed on the four leading South African banks. A survey was ...

  11. Biometric Authentication Systems Attacks: Liveness Detection to the ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... Keywords: Liveness, Biometrics, Biometric Systems, Authentication, Verification,. Vulnerabilities, attacks, Threats. 1.0 Introduction. Informaton security is the profession that protects the Confidentiality,. Integrity and Availability (CIA) of information systems and information services. The CIA triad is the pillar of.

  12. Forensic biometrics: From two communities to one discipline

    NARCIS (Netherlands)

    Meuwly, Didier; Meuwly, Didier; Veldhuis, Raymond N.J.

    2012-01-01

    This article describes how the fields of biometrics and forensic science can contribute and benefit from each other. The aim is to foster the development of new methods and tools improving the current forensic biometric applications and allowing for the creation of new ones. The article begins with

  13. Factors impacting on the adoption of biometric technology by South ...

    African Journals Online (AJOL)

    A survey was conducted, and the fi ndings show common agreement and acceptance of biometric authentication as a way to improve information security in the various banking channels despite its not being widely implemented. With regard to factors infl uencing the adoption of biometric authentication, the study identifi ed ...

  14. Multimodal Biometrics Recognition by Dimensionality Diminution Method

    Directory of Open Access Journals (Sweden)

    Suvarnsing Bhable

    2015-12-01

    Full Text Available Multimodal biometric system utilizes two or more character modalities, e.g., face, ear, and fingerprint, Signature, plamprint to improve the recognition accuracy of conventional unimodal methods. We propose a new dimensionality reduction method called Dimension Diminish Projection (DDP in this paper. DDP can not only preserve local information by capturing the intra-modal geometry, but also extract between-class relevant structures for classification effectively. Experimental results show that our proposed method performs better than other algorithms including PCA, LDA and MFA.

  15. On humanitarian refugee biometrics and new forms of intervention

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    This article traces a development from UNHCR's initial use of biometrics in a few pilot projects (early/mid-2000s), to the emergence of a UNHCR policy where biometric registration is considered a "strategic decision". Next it engages key insights from current debates about 'materiality' and agentic...... capacity in combination with current debates about new forms of intervention. Finally, these insights are combined into a framework through which the last part of the article engages critically with this development of humanitarian refugee biometrics by posing the following question: how does an approach...... biometric refugee data, has affected the relationship between UNHCR, donor states, host states and refugees, the article shows how UNHCR's trialling of new biometric technologies, combined with actual and potential data-sharing practices, has advanced the technology's performance as well as its...

  16. Pain expression as a biometric

    DEFF Research Database (Denmark)

    Haque, Mohammad A.; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    Developing a vision-based efficient and automatic pain intensity measurement system requires the understanding of the relationship between self-reported pain intensity and pain expression in the facial videos. In this paper, we first demonstrate how pain expression in facial video frames may not ...

  17. A 3D Hand-drawn Gesture Input Device Using Fuzzy ARTMAP-based Recognizer

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2006-06-01

    Full Text Available In this paper, a novel input device based on 3D dynamic hand-drawn gestures is presented. It makes use of inertial sensor and pattern recognition technique. Fuzzy ARTMAP based recognizer is adopted to realize gesture recognition by using 3-axis acceleration signals directly instead of reproduced trajectories of gestures. The proposed method may relax motion constraints during inputting a gesture, which is more convenient for user. This prototype of input device has been implemented on a remote controller to manipulate TVs. The recognition rate of 20 gestures is higher than 97%. It clearly shows the effectiveness and feasibility of the proposed input device. As a result, it is a powerful, flexible interface for modern electronic products.

  18. Hand Therapy

    Science.gov (United States)

    ... Therapist? Media Find a Hand Surgeon Home Anatomy Hand Therapy Email to a friend * required fields From * ... ensure a healthy style of work. Find a Hand Therapist Search for a hand therapist in your ...

  19. Interacting with mobile devices by fusion eye and hand gestures recognition systems based on decision tree approach

    Science.gov (United States)

    Elleuch, Hanene; Wali, Ali; Samet, Anis; Alimi, Adel M.

    2017-03-01

    Two systems of eyes and hand gestures recognition are used to control mobile devices. Based on a real-time video streaming captured from the device's camera, the first system recognizes the motion of user's eyes and the second one detects the static hand gestures. To avoid any confusion between natural and intentional movements we developed a system to fuse the decision coming from eyes and hands gesture recognition systems. The phase of fusion was based on decision tree approach. We conducted a study on 5 volunteers and the results that our system is robust and competitive.

  20. EEG-based classification of fast and slow hand movements using Wavelet-CSP algorithm.

    Science.gov (United States)

    Robinson, Neethu; Vinod, A P; Ang, Kai Keng; Tee, Keng Peng; Guan, Cuntai T

    2013-08-01

    A brain-computer interface (BCI) acquires brain signals, extracts informative features, and translates these features to commands to control an external device. This paper investigates the application of a noninvasive electroencephalography (EEG)-based BCI to identify brain signal features in regard to actual hand movement speed. This provides a more refined control for a BCI system in terms of movement parameters. An experiment was performed to collect EEG data from subjects while they performed right-hand movement at two different speeds, namely fast and slow, in four different directions. The informative features from the data were obtained using the Wavelet-Common Spatial Pattern (W-CSP) algorithm that provided high-temporal-spatial-spectral resolution. The applicability of these features to classify the two speeds and to reconstruct the speed profile was studied. The results for classifying speed across seven subjects yielded a mean accuracy of 83.71% using a Fisher Linear Discriminant (FLD) classifier. The speed components were reconstructed using multiple linear regression and significant correlation of 0.52 (Pearson's linear correlation coefficient) was obtained between recorded and reconstructed velocities on an average. The spatial patterns of the W-CSP features obtained showed activations in parietal and motor areas of the brain. The results achieved promises to provide a more refined control in BCI by including control of movement speed.

  1. Dermal and pulmonary absorption of ethanol from alcohol-based hand rub.

    Science.gov (United States)

    Ahmed-Lecheheb, D; Cunat, L; Hartemann, P; Hautemanière, A

    2012-05-01

    Ethanol intoxication of healthcare workers (HCWs) using alcohol-based hand rubs (ABHRs) in the workplace is a potentially serious issue. This study quantified the level of ethanol absorption among HCWs after hygienic hand disinfection. Eighty-six HCWs from Nancy University Hospital were tested before and after a 4-h shift. Participants used ABHR containing 70% ethanol. Levels of ethanol, acetaldehyde and acetate in blood and urine were determined using gas chromatography. A breathalyzer was used to measure the level of ethanol in expired air. Ethanol [mean concentration 0.076 (standard deviation 0.05) mg/L] was detected in the expired air of 28 HCWs 1-2 min post exposure. Ethanol, acetaldehyde and acetate were undetectable in blood after a 4-h shift, and urine tests were negative in all participants. Ethanol exposure from ABHR, particularly inhalation of vapours, resulted in positive breathalyzer readings 1-2 min after exposure. Dermal absorption of ethanol was not detected. Pulmonary absorption was detected but was below toxic levels. Copyright © 2012 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  2. 3D printed simulation models based on real patient situations for hands-on practice.

    Science.gov (United States)

    Kröger, E; Dekiff, M; Dirksen, D

    2017-11-01

    During the last few years, the curriculum of many dentistry schools in Germany has been reorganised. Two key aspects of the applied changes are the integration of up-to-date teaching methods and the promotion of interdisciplinarity. To support these efforts, an approach to fabricating individualised simulation models for hands-on courses employing 3D printing is presented. The models are based on real patients, thus providing students a more realistic preparation for real clinical situations. As a wide variety of dental procedures can be implemented, the simulation models can also contribute to a more interdisciplinary dental education. The data used for the construction of the models were acquired by 3D surface scanning. The data were further processed with 3D modelling software. Afterwards, the models were fabricated by 3D printing with the PolyJet technique. Three models serve as examples: a prosthodontic model for training veneer preparation, a conservative model for practicing dental bonding and an interdisciplinary model featuring carious teeth and an insufficient crown. The third model was evaluated in a hands-on course with 22 fourth-year dental students. The students answered a questionnaire and gave their personal opinion. Whilst the concept of the model received very positive feedback, some aspects of the implementation were criticised. We discuss these observations and suggest ways for further improvement. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. Virtual Control of Prosthetic Hand Based on Grasping Patterns and Estimated Force from Semg

    OpenAIRE

    Zhu Gao-Ke; Xu Li-Sha; Zhang Yi; Deng Hua

    2016-01-01

    Myoelectric prosthetic hands aim to serve upper limb amputees. The myoelectric control of the hand grasp action is a kind of real-time or online method. Thus it is of great necessity to carry on a study of online prosthetic hand electrical control. In this paper, the strategy of simultaneous EMG decoding of grasping patterns and grasping force was realized by controlling a virtual multi-degree-freedom prosthetic hand and a real one-degree-freedom prosthetic hand simultaneously. The former rea...

  4. Adaptive estimation of hand movement trajectory in an EEG based brain-computer interface system.

    Science.gov (United States)

    Robinson, Neethu; Guan, Cuntai; Vinod, A P

    2015-12-01

    The various parameters that define a hand movement such as its trajectory, speed, etc, are encoded in distinct brain activities. Decoding this information from neurophysiological recordings is a less explored area of brain-computer interface (BCI) research. Applying non-invasive recordings such as electroencephalography (EEG) for decoding makes the problem more challenging, as the encoding is assumed to be deep within the brain and not easily accessible by scalp recordings. EEG based BCI systems can be developed to identify the neural features underlying movement parameters that can be further utilized to provide a detailed and well defined control command set to a BCI output device. A real-time continuous control is better suited for practical BCI systems, and can be achieved by continuous adaptive reconstruction of movement trajectory than discrete brain activity classifications. In this work, we adaptively reconstruct/estimate the parameters of two-dimensional hand movement trajectory, namely movement speed and position, from multi-channel EEG recordings. The data for analysis is collected by performing an experiment that involved center-out right-hand movement tasks in four different directions at two different speeds in random order. We estimate movement trajectory using a Kalman filter that models the relation between brain activity and recorded parameters based on a set of defined predictors. We propose a method to define these predictor variables that includes spatial, spectral and temporally localized neural information and to select optimally informative variables. The proposed method yielded correlation of (0.60 ± 0.07) between recorded and estimated data. Further, incorporating the proposed predictor subset selection, the correlation achieved is (0.57 ± 0.07, p reduction in number of predictors (76%) for the savings of computational time. The proposed system provides a real time movement control system using EEG-BCI with control over movement speed

  5. [Survival of Gram-positive spore-forming bacteria including Bacillus cereus after hand washing using alcohol-based handrub].

    Science.gov (United States)

    Ogawa, Midori; Takada, Shinichiro; Takahashi, Masao; Yasuda, Etsuko; Watase, Mariko; Taniguchi, Hatsumi

    2006-12-01

    Hand washing is the most fundamental method for preventing infection. Currently, hand washing with an alcohol-based handrub is the international gold standard method. However, in our study we found many samples of ineffective hand washing using an alcohol-based handrub. The rates of ineffective samples were 10.4% (5/48) in 2004 and 34.3% (12/35) in 2005. We examined the morphology by Gram staining and biochemical properties of the bacteria which remained after hand washing in 2005. Their colonies were divided into 3 groups (round colonies, irregular-shaped and diffusive colonies). The round colonies were considered Staphylococcus spp., and the irregular-shaped colonies or diffusive colonies were considered Gram-positive spore-forming bacteria. In the 12 ineffective hand washing samples (more than the same number of bacteria colonies as before hand washing, or > or = 300), there were 3 samples considered to be the result of the survival of Staphylococcus spp., and 9 samples considered to be the result of the survival of Gram-positive spore-forming bacteria including Bacillus cereus. Based on these results, we should take careful measures, such as wearing sterile gloves if necessary. We should never be overconfident regarding the effect of hand washing.

  6. 2010 Biometrics Conference Held in Arlington, Virginia on January 20-21, 2010

    Science.gov (United States)

    2010-01-21

    appropriate funds for an independent federal entity to oversee all forensic science activities . #2: Establish standard terminology to be used in...Systems for Video Technology 14th (1): 4–20 Current Biometrics Some commonly measured features • Physical – Fingerprints (Palm/hand geometry) – Face...nystagmus,  albinism Fi   id b   h i l   ( ) nger: ac urns, mec an ca wear masonry  Face: missing features, detection errors, cultural  constraints

  7. [System of biometric identification: by the way of control].

    Science.gov (United States)

    Simões, José Augusto

    2011-01-01

    The ethics and morals make the line between lawful to unlawful, the right and wrong, acceptable from the unacceptable. Furthermore the purpose of ethics in the field of profesional practice is, in particular the application of moral standards based on honesty, courtesy and honour. But they are not the only ones. Confidentiality should be the first of duties the professional has no right to disclose information that was only reported in their work and because it was necessary to run it. This requirement aims to protect the recipient of the service and avoid damage to society. The professional should also encourage members of his team, because solidarity is a very effective way to improve the intellectual and moral qualities of work partners and ensure their involvement. When you have an honest professional conduct within and outside of professional practice, you attract confidence and prestige, which is an incentive to drive, with safety, the proper course of his career. The purpose of the biometric control based on the need to expedite the fulfilment of a goal whose integration is recognized by law under the control of the employer's: the setting of working hours, monitoring the attendance and registration of working time. This record is also the accounting and control of additional work. To consider the biometric control as an appropriate mean to ensure a «legitimate purpose», the Law 67/98 requires the National Commission for Data Protection, in each case, to ascertain whether the prevailing interests the rights and freedoms guarantees data subjects on the interest for the treatment of data relied upon by the employer. This procedure seems to be the best fit to the principle of proportionality and therefore the processing of data should be refused where it appears unjustified, inappropriate and excessive, or when, by their lack of reliability, it undermines the purpose of determining it.

  8. ORNL Biometric Eye Model for Iris Recognition

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Barstow, Del R [ORNL; Karakaya, Mahmut [ORNL; Chaum, Edward [University of Tennessee, Knoxville (UTK); Boehnen, Chris Bensing [ORNL

    2012-01-01

    Iris recognition has been proven to be an accurate and reliable biometric. However, the recognition of non-ideal iris images such as off angle images is still an unsolved problem. We propose a new biometric targeted eye model and a method to reconstruct the off-axis eye to its frontal view allowing for recognition using existing methods and algorithms. This allows for existing enterprise level algorithms and approaches to be largely unmodified by using our work as a pre-processor to improve performance. In addition, we describe the `Limbus effect' and its importance for an accurate segmentation of off-axis irides. Our method uses an anatomically accurate human eye model and ray-tracing techniques to compute a transformation function, which reconstructs the iris to its frontal, non-refracted state. Then, the same eye model is used to render a frontal view of the reconstructed iris. The proposed method is fully described and results from synthetic data are shown to establish an upper limit on performance improvement and establish the importance of the proposed approach over traditional linear elliptical unwrapping methods. Our results with synthetic data demonstrate the ability to perform an accurate iris recognition with an image taken as much as 70 degrees off-axis.

  9. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  10. Device for biometric verification of maternity

    Directory of Open Access Journals (Sweden)

    Lalović Komlen

    2015-01-01

    Full Text Available Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templates with a goal to provide a 100% guarantee maternity for each new born child. Scanning the fingerprints of both mother and the child simultaneously, at moment of birth, and pairing them with unique ID reference removes potential fears occurring from hospital negligence to malicious activities, while the data encryption raises the whole process to the highest level of security and confidentiality. The main contribution of the device that removes the fear that almost every mother has in this period as it provides an answer to the question: “Is this my baby?” with a 100% guarantee “It’s certainly yours!”

  11. Evaluation of Non Diseased Specified Outcome Measures in Hand Injuries to Assess Activity and Participation Based on ICF Content.

    Science.gov (United States)

    Farzad, Maryam; Layeghi, Fereydoun; Asgari, Ali; Hosseini, Seyed Ali; Rassafiani, Mehdi

    2014-06-01

    The objective of the study is to provide information about non disease specified outcome measures which evaluate disability in patients who have impairments in hand and upper extremity and to find the extent to which they are evaluating "disability" based on ICF hand Core Set (activity limitation and participation restriction). MEDLINE, CINAHL, GOOGLE SCHOLAR , OVID and SCIENCE DIRECT databases were systematically searched for studies on non disease specified outcome measures used to evaluate upper extremity function; only studies written in English were considered. We reviewed titles and abstracts of the identified studies to determine whether the studies met predefined eligibility criteria (eg, non disease specified out come measures used in hand injured patients). All the outcome measures which had eligibility included. After full text review ,7 non disease specified outcome measures in hand were identified. Studies were extracted, and the information retrieved from them. All the outcome measures which had incuded, were linked with ICF hand core set disability part (activity and participation). All of them only linked to 16 (42 %) components of ICF hand Core Set, which were most activity and less participation from ICF. None of the non disease specified out come measures in hand injuries cover all domains of disability from the ICF Hand Core Set.

  12. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...boarded vessel used the SEEK II to collect biometrics including fingerprints, iris scans, and facial recognition photos. Following system setup and...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel

  13. Evidence-based soft tissue rheumatology: epicondylitis and hand stenosing tendinopathy.

    Science.gov (United States)

    Alvarez-Nemegyei, Jose; Canoso, Juan J

    2004-02-01

    Lateral and medial epicondylitis represent overuse tendinopathies of wrist extensor and wrist flexor muscles, respectively. In lateral epicondylitis, a short-term therapeutic efficacy of glucocorticoid injection and limited evidence on the efficacy of acupuncture has been shown. De Quervain tendinopathy is caused by tendinous impingement by a thickened retinaculum. There is limited evidence on the efficacy of glucocorticoid injection in this condition.Trigger finger usually results from tendon entrapment beneath a thickened A1 flexor pulley. An association with hand tool use and diabetes has been shown in this condition, and there is evidence on the therapeutic efficacy of glucocorticoid injection. No other therapeutic modality has shown efficacy or has been assessed in a placebo-controlled clinical trial in these conditions.It can be concluded that epicondylitis and stenosing tendinopathy are readily diagnosed, and most patients recover with current therapies. However, still unsolved issues preclude a purely evidence-based approach to these entities.

  14. Multiband Slot-Based Dual Composite Right/Left-Handed Transmission Line

    Directory of Open Access Journals (Sweden)

    E. Abdo-Sanchez

    2012-10-01

    Full Text Available A dual Composite Right-/Left-Handed Transmission Line (CRLH TL implementation that presents multiband behaviour is proposed in this contribution. The artificial TL is realized by loading a host microstrip line with alternate rectangular stubs and slots. The required series and shunt immittances are respectively provided by the slot and the stub. Due to the distributed nature of these immittances, the resultant phase response presents theoretically infinite RH and LH alternate bands, thus being appropriate for multiband applications. The design methodology is described with the help of a proposed TLs-based equivalent circuit and highlights the simplicity for balance condition. Full wave simulated results of the dispersion characteristics and frequency response of a unit-cell and a three-cells structure are presented.

  15. Contributions to biometrics : curvatures, heterogeneous cross-resolution FR and anti spoofing

    OpenAIRE

    Tang, Yinhang

    2016-01-01

    Face is one of the best biometrics for person recognition related application, because identifying a person by face is human instinctive habit, and facial data acquisition is natural, non-intrusive, and socially well accepted. In contrast to traditional appearance-based 2D face recognition, shape-based 3D face recognition is theoretically more stable and robust to illumination variance, small head pose changes, and facial cosmetics. The curvatures are the most important geometric attributes t...

  16. Improving the discrimination of hand motor imagery via virtual reality based visual guidance.

    Science.gov (United States)

    Liang, Shuang; Choi, Kup-Sze; Qin, Jing; Pang, Wai-Man; Wang, Qiong; Heng, Pheng-Ann

    2016-08-01

    While research on the brain-computer interface (BCI) has been active in recent years, how to get high-quality electrical brain signals to accurately recognize human intentions for reliable communication and interaction is still a challenging task. The evidence has shown that visually guided motor imagery (MI) can modulate sensorimotor electroencephalographic (EEG) rhythms in humans, but how to design and implement efficient visual guidance during MI in order to produce better event-related desynchronization (ERD) patterns is still unclear. The aim of this paper is to investigate the effect of using object-oriented movements in a virtual environment as visual guidance on the modulation of sensorimotor EEG rhythms generated by hand MI. To improve the classification accuracy on MI, we further propose an algorithm to automatically extract subject-specific optimal frequency and time bands for the discrimination of ERD patterns produced by left and right hand MI. The experimental results show that the average classification accuracy of object-directed scenarios is much better than that of non-object-directed scenarios (76.87% vs. 69.66%). The result of the t-test measuring the difference between them is statistically significant (p = 0.0207). When compared to algorithms based on fixed frequency and time bands, contralateral dominant ERD patterns can be enhanced by using the subject-specific optimal frequency and the time bands obtained by our proposed algorithm. These findings have the potential to improve the efficacy and robustness of MI-based BCI applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Effectiveness of three surgical alcohol-based hand rubs on skin flora.

    Science.gov (United States)

    Zandiyeh, Mitra; Roshanaei, Ghodratollah

    2015-01-01

    It is proved that surgical hand disinfectant contains alcohol, and has favorable properties such as strong and rapid antibacterial effect, ease of application, and suitable effect on skin. Therefore, nowadays use of them has been gradually replacing traditional surgical hand scrub with antibacterial soap. Hence, several domestic and imported products are available to the healthcare facilities in Iran. This study was done in order to determine the antibacterial effect of Decosept, Sterillium, and Septicidine on skin flora. This clinical trial was carried out on 20 volunteers. Subjects disinfected their hands with three test products. At first, subjects washed their hands with soap. Then pre-value sample was taken from the finger tips in Tryptic Soy Broth (TSB). After that, the hands were disinfected with one of the surgical hand rubs with as much volume as necessary to keep the hands wet, at the recommended application time. Immediate post-value sample was taken from one hand and the other hand was gloved for 3 h. After removing the surgical glove, 3 h post-value sample (sustained effect) was taken from the hand. All products remarkably decreased the colony forming units (CFU) immediately (P rubs. Considering the short application time, less volume used, and more antibacterial effect, however, Sterillium seems to be a better choice.

  18. Computer-based measurements of joint space analysis using metacarpal morphometry in hand radiograph for evaluation of rheumatoid arthritis.

    Science.gov (United States)

    Snekhalatha, U; Anburajan, M

    2017-09-01

    The aim and objectives are as follows: (i) to perform an automated segmentation of the hand from radiographs using a dual tree complex wavelet-based watershed algorithm; ii) to compare the measured statistical features of the joint space of the hand using gray level co-occurrence matrix (GLCM) method with standard diagnostic parameters of rheumatoid arthritis (RA). Fifty-three patients with RA and 17 age- and sex-matched healthy controls were included in the study. The erythrocyte sedimentation rate (ESR), C-reactive protein, rheumatoid factor, health assessment questionnaire score (HAQ), disease activity score (DAS) and hand radiographs of all the subjects were obtained. Joint space width and cortical thickness were measured in metacarpophalangeal joints (MCP) and metacarpal bone semi-automatically using MIMICS software. Dual tree complex wavelet transform-based watershed algorithm was applied for automated segmentation, and feature extraction was performed using the GLCM method in hand radiographs of the total population. In the RA group (n = 53), the joint space width measured in the MCP1, MCP3, MCP5 of the hand were reduced significantly (P measured combined cortical thickness at the second, third and fourth metacarpal bones of the hand were reduced significantly (P measured statistical features at MCP3 hand joint in the total population studied. © 2015 Asia Pacific League of Associations for Rheumatology and Wiley Publishing Asia Pty Ltd.

  19. HANDS: a tool for genome-wide discovery of subgenome-specific base-identity in polyploids.

    Science.gov (United States)

    Mithani, Aziz; Belfield, Eric J; Brown, Carly; Jiang, Caifu; Leach, Lindsey J; Harberd, Nicholas P

    2013-09-24

    The analysis of polyploid genomes is problematic because homeologous subgenome sequences are closely related. This relatedness makes it difficult to assign individual sequences to the specific subgenome from which they are derived, and hinders the development of polyploid whole genome assemblies. We here present a next-generation sequencing (NGS)-based approach for assignment of subgenome-specific base-identity at sites containing homeolog-specific polymorphisms (HSPs): 'HSP base Assignment using NGS data through Diploid Similarity' (HANDS). We show that HANDS correctly predicts subgenome-specific base-identity at >90% of assayed HSPs in the hexaploid bread wheat (Triticum aestivum) transcriptome, thus providing a substantial increase in accuracy versus previous methods for homeolog-specific base assignment. We conclude that HANDS enables rapid and accurate genome-wide discovery of homeolog-specific base-identity, a capability having multiple applications in polyploid genomics.

  20. HANDS: a tool for genome-wide discovery of subgenome-specific base-identity in polyploids.

    KAUST Repository

    Mithani, Aziz

    2013-09-24

    The analysis of polyploid genomes is problematic because homeologous subgenome sequences are closely related. This relatedness makes it difficult to assign individual sequences to the specific subgenome from which they are derived, and hinders the development of polyploid whole genome assemblies.We here present a next-generation sequencing (NGS)-based approach for assignment of subgenome-specific base-identity at sites containing homeolog-specific polymorphisms (HSPs): \\'HSP base Assignment using NGS data through Diploid Similarity\\' (HANDS). We show that HANDS correctly predicts subgenome-specific base-identity at >90% of assayed HSPs in the hexaploid bread wheat (Triticum aestivum) transcriptome, thus providing a substantial increase in accuracy versus previous methods for homeolog-specific base assignment.We conclude that HANDS enables rapid and accurate genome-wide discovery of homeolog-specific base-identity, a capability having multiple applications in polyploid genomics.

  1. Evaluation of human hand thermal images using wavelet transform based local spatial features - biomed 2013.

    Science.gov (United States)

    Suganthi, S S; Ramakrishnan, S

    2013-01-01

    Transform-based spatial analyses of medical Infrared (IR) images are found to be useful to extract local information, which can be used to identify the abnormalities associated with in region of interest. In this work, human hand infrared images are analyzed by extracting local spatial features using wavelet transform method. The images for this study were acquired using uncooled micro bolometer with focal plane array technology based medical IR camera with dedicated software having high array resolution and spectral response under controlled protocol. The acquired images were decomposed into Intrinsic Mode Functions (IMFs) using bidimensional empirical mode decomposition. Extrema points were detected using eight connected neighbor window method and interpolated using thin plate spline interpolation technique to generate IMFs. The edge information were extracted from local phase of the first IMF. Edges were detected using phase congruency measure by applying Gabor function based wavelet transform. The results showed that it was possible to detect edges from only the first IMF without being influenced by other IMFs. It was further observed that the edge intermittence that arises due to noise component was reduced by treating images with local phase distributions. Hence, it appears that the edge information extraction could enhance the diagnostic relevance of thermal image analysis.

  2. Evidence-based practices to increase hand hygiene compliance in health care facilities: An integrated review.

    Science.gov (United States)

    Neo, Jun Rong Jeffrey; Sagha-Zadeh, Rana; Vielemeyer, Ole; Franklin, Ella

    2016-06-01

    Hand hygiene (HH) in health care facilities is a key component to reduce pathogen transmission and nosocomial infections. However, most HH interventions (HHI) have not been sustainable. This review aims to provide a comprehensive summary of recently published evidence-based HHI designed to improve HH compliance (HHC) that will enable health care providers to make informed choices when allocating limited resources to improve HHC and patient safety. The Medline electronic database (using PubMed) was used to identify relevant studies. English language articles that included hand hygiene interventions and related terms combined with health care environments or related terms were included. Seventy-three studies that met the inclusion criteria were summarized. Interventions were categorized as improving awareness with education, facility design, and planning, unit-level protocols and procedures, hospital-wide programs, and multimodal interventions. Past successful HHIs may not be as effective when applied to other health care environments. HH education should be interactive and engaging. Electronic monitoring and reminders should be implemented in phases to ensure cost-effectiveness. To create hospitalwide programs that engage end users, policy makers should draw expertise from interdisciplinary fields. Before implementing the various components of multimodal interventions, health care practitioners should identify and examine HH difficulties unique to their organizations. Future research should seek to achieve the following: replicate successful HHI in other health care environments, develop reliable HHC monitoring tools, understand caregiver-patient-family interactions, examine ways (eg, hospital leadership, financial support, and strategies from public health and infection prevention initiatives) to sustain HHC, and use simulated lab environments to refine study designs. Copyright © 2016 Association for Professionals in Infection Control and Epidemiology, Inc

  3. Variation of biometric parameters in corn cobs under the influence of nitrogen fertilization

    Science.gov (United States)

    Gigel, Prisecaru; Florin, Sala

    2017-07-01

    Biometric parameters as elements of productivity on corn cobs, along with plant density per unit area (ha) are essential in achieving production. The influence of differentiated fertilization with nitrogen was evaluated at the level of productivity elements on corn cobs, Andreea hybrid. Biometric parameters of the corn cobs (total length - L; usable length - l; uncoated length with corn kernels - lu; diameter at the base - Db, middle - Dm, and top of the corn cobs - Dt; corn cob weight - Cw, grain weight - Gw) were directly influenced by the doses of nitrogen. Regression analysis has facilitated the prediction of grain weight as the main element of productivity under different statistical certainty based on nitrogen doses (R2 = 0.962, pcorn cobs (R2 = 0.985, pcorn cobs (R2 = 0.996, pcorn cobs (R2 = 0.824, pcorn cobs (R2 = 0.807, pcorn kernels (R2 = 0.624, pcorn cobs (R2 = 0.384, p=0.015).

  4. Proof of Concept of an Online EMG-Based Decoding of Hand Postures and Individual Digit Forces for Prosthetic Hand Control.

    Science.gov (United States)

    Gailey, Alycia; Artemiadis, Panagiotis; Santello, Marco

    2017-01-01

    Options currently available to individuals with upper limb loss range from prosthetic hands that can perform many movements, but require more cognitive effort to control, to simpler terminal devices with limited functional abilities. We attempted to address this issue by designing a myoelectric control system to modulate prosthetic hand posture and digit force distribution. We recorded surface electromyographic (EMG) signals from five forearm muscles in eight able-bodied subjects while they modulated hand posture and the flexion force distribution of individual fingers. We used a support vector machine (SVM) and a random forest regression (RFR) to map EMG signal features to hand posture and individual digit forces, respectively. After training, subjects performed grasping tasks and hand gestures while a computer program computed and displayed online feedback of all digit forces, in which digits were flexed, and the magnitude of contact forces. We also used a commercially available prosthetic hand, the i-Limb (Touch Bionics), to provide a practical demonstration of the proposed approach's ability to control hand posture and finger forces. Subjects could control hand pose and force distribution across the fingers during online testing. Decoding success rates ranged from 60% (index finger pointing) to 83-99% for 2-digit grasp and resting state, respectively. Subjects could also modulate finger force distribution. This work provides a proof of concept for the application of SVM and RFR for online control of hand posture and finger force distribution, respectively. Our approach has potential applications for enabling in-hand manipulation with a prosthetic hand.

  5. Life cycle-based water assessment of a hand dishwashing product: opportunities and limitations.

    Science.gov (United States)

    Van Hoof, Gert; Buyle, Bea; Kounina, Anna; Humbert, Sebastien

    2013-10-01

    It is only recently that life cycle-based indicators have been used to evaluate products from a water use impact perspective. The applicability of some of these methods has been primarily demonstrated on agricultural materials or products, because irrigation requirements in food production can be water-intensive. In view of an increasing interest on life cycle-based water indicators from different products, we ran a study on a hand dishwashing product. A number of water assessment methods were applied with the purpose of identifying both product improvement opportunities, as well as understanding the potential for underlying database and methodological improvements. The study covered the entire life cycle of the product and focused on environmental issues related to water use, looking in-depth at inventory, midpoint, and endpoint methods. "Traditional" water emission driven methods, such as freshwater eutrophication, were excluded from the analysis. The use of a single formula with the same global supply chain, manufactured in 1 location was evaluated in 2 countries with different water scarcity conditions. The study shows differences ranging up to 4 orders in magnitude for indicators with similar units associated with different water use types (inventory methods) and different cause-effect chain models (midpoint and endpoint impact categories). No uncertainty information was available on the impact assessment methods, whereas uncertainty from stochastic variability was not available at the time of study. For the majority of the indicators studied, the contribution from the consumer use stage is the most important (>90%), driven by both direct water use (dishwashing process) as well as indirect water use (electricity generation to heat the water). Creating consumer awareness on how the product is used, particularly in water-scarce areas, is the largest improvement opportunity for a hand dishwashing product. However, spatial differentiation in the inventory and

  6. Hand Anatomy

    Science.gov (United States)

    ... Arthritis Thumb Sprains Trigger Finger Tumors Wrist Fracture Hand Safety Fireworks Safety Lawnmower Safety Snowblower safety Pumpkin ... A-Z Videos Infographics Symptom Picker Anatomy About Hand Surgery What is a Hand Surgeon? What is ...

  7. Claw hand

    Science.gov (United States)

    Ulnar nerve palsy - claw hand; Ulnar nerve dysfunction - claw hand; Ulnar claw ... Someone can be born with claw hand (congenital), or they can develop it because of certain disorders, such as nerve injury.

  8. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  9. Bioinformatic and Biometric Methods in Plant Morphology

    Directory of Open Access Journals (Sweden)

    Surangi W. Punyasena

    2014-08-01

    Full Text Available Recent advances in microscopy, imaging, and data analyses have permitted both the greater application of quantitative methods and the collection of large data sets that can be used to investigate plant morphology. This special issue, the first for Applications in Plant Sciences, presents a collection of papers highlighting recent methods in the quantitative study of plant form. These emerging biometric and bioinformatic approaches to plant sciences are critical for better understanding how morphology relates to ecology, physiology, genotype, and evolutionary and phylogenetic history. From microscopic pollen grains and charcoal particles, to macroscopic leaves and whole root systems, the methods presented include automated classification and identification, geometric morphometrics, and skeleton networks, as well as tests of the limits of human assessment. All demonstrate a clear need for these computational and morphometric approaches in order to increase the consistency, objectivity, and throughput of plant morphological studies.

  10. Virtual Control of Prosthetic Hand Based on Grasping Patterns and Estimated Force from Semg

    Directory of Open Access Journals (Sweden)

    Zhu Gao-Ke

    2016-01-01

    Full Text Available Myoelectric prosthetic hands aim to serve upper limb amputees. The myoelectric control of the hand grasp action is a kind of real-time or online method. Thus it is of great necessity to carry on a study of online prosthetic hand electrical control. In this paper, the strategy of simultaneous EMG decoding of grasping patterns and grasping force was realized by controlling a virtual multi-degree-freedom prosthetic hand and a real one-degree-freedom prosthetic hand simultaneously. The former realized the grasping patterns from the recognition of the sEMG pattern. The other implemented the grasping force from sEMG force decoding. The results show that the control method is effective and feasible.

  11. Concise Arm and Hand Rehabilitation Approach in Stroke (CARAS: A practical and evidence-based framework for clinical rehabilitation management

    Directory of Open Access Journals (Sweden)

    Johan A. Franck

    2015-10-01

    Full Text Available The volume of information on new treatment techniques supporting the restoration of arm-hand function (AHF and arm-hand skill performance (ASHP in stroke survivors overwhelms therapists in everyday clinical practice when choosing the appropriate therapy. The Concise Arm and Hand Rehabilitation Approach in Stroke (CARAS is designed for paramedical staff to structure and implement training of AHF and AHSP in stroke survivors. The CARAS is based on four constructs: (a stratification according to the severity of arm–hand impairment (using the Utrecht Arm/Hand -Test [UAT], (b the individual’s rehabilitation goals and concomitant potential rehabilitation outcomes, (c principles of self-efficacy, and (d possibilities to systematically incorporate (new technology and new evidence-based training elements swiftly. The framework encompasses three programs aimed at treating either the severely (UAT 0-1, moderately (UAT 2-3, or mildly (UAT 4-7 impaired arm-hand. Program themes are: taking care of the limb and prevention of complications (Program 1, task-oriented gross motor grip performance (Program 2, and functional AHSP training (Program 3. Each program is preceded and followed by an assessment. Training modularity facilitates rapid interchange/adaptation of sub-elements. Proof-of-principle in clinical rehabilitation has been established. The CARAS facilitates rapid structured design and provision of state-of-the-art AHF and ASHP treatment in stroke patients.

  12. Distinct iris gene expression profiles of primary angle closure glaucoma and primary open angle glaucoma and their interaction with ocular biometric parameters.

    Science.gov (United States)

    Seet, Li-Fong; Narayanaswamy, Arun; Finger, Sharon N; Htoon, Hla M; Nongpiur, Monisha E; Toh, Li Zhen; Ho, Henrietta; Perera, Shamira A; Wong, Tina T

    2016-11-01

    This study aimed to evaluate differences in iris gene expression profiles between primary angle closure glaucoma (PACG) and primary open angle glaucoma (POAG) and their interaction with biometric characteristics. Prospective study. Thirty-five subjects with PACG and thirty-three subjects with POAG who required trabeculectomy were enrolled at the Singapore National Eye Centre, Singapore. Iris specimens, obtained by iridectomy, were analysed by real-time polymerase chain reaction for expression of type I collagen, vascular endothelial growth factor (VEGF)-A, -B and -C, as well as VEGF receptors (VEGFRs) 1 and 2. Anterior segment optical coherence tomography (ASOCT) imaging for biometric parameters, including anterior chamber depth (ACD), anterior chamber volume (ACV) and lens vault (LV), was also performed pre-operatively. Relative mRNA levels between PACG and POAG irises, biometric measurements, discriminant analyses using genes and biometric parameters. COL1A1, VEGFB, VEGFC and VEGFR2 mRNA expression was higher in PACG compared to POAG irises. LV, ACD and ACV were significantly different between the two subgroups. Discriminant analyses based on gene expression, biometric parameters or a combination of both gene expression and biometrics (LV and ACV), correctly classified 94.1%, 85.3% and 94.1% of the original PACG and POAG cases, respectively. The discriminant function combining genes and biometrics demonstrated the highest accuracy in cross-validated classification of the two glaucoma subtypes. Distinct iris gene expression supports the pathophysiological differences that exist between PACG and POAG. Biometric parameters can combine with iris gene expression to more accurately define PACG from POAG. © 2016 The Authors. Clinical & Experimental Ophthalmology published by John Wiley & Sons Australia, Ltd on behalf of Royal Australian and New Zealand College of Ophthalmologists.

  13. Comparison of Standard Culture-Based Method to Culture-Independent Method for Evaluation of Hygiene Effects on the Hand Microbiome.

    Science.gov (United States)

    Zapka, C; Leff, J; Henley, J; Tittl, J; De Nardo, E; Butler, M; Griggs, R; Fierer, N; Edmonds-Wilson, S

    2017-03-28

    Hands play a critical role in the transmission of microbiota on one's own body, between individuals, and on environmental surfaces. Effectively measuring the composition of the hand microbiome is important to hand hygiene science, which has implications for human health. Hand hygiene products are evaluated using standard culture-based methods, but standard test methods for culture-independent microbiome characterization are lacking. We sampled the hands of 50 participants using swab-based and glove-based methods prior to and following four hand hygiene treatments (using a nonantimicrobial hand wash, alcohol-based hand sanitizer [ABHS], a 70% ethanol solution, or tap water). We compared results among culture plate counts, 16S rRNA gene sequencing of DNA extracted directly from hands, and sequencing of DNA extracted from culture plates. Glove-based sampling yielded higher numbers of unique operational taxonomic units (OTUs) but had less diversity in bacterial community composition than swab-based sampling. We detected treatment-induced changes in diversity only by using swab-based samples ( P hand hygiene industry methods and for future hand microbiome studies. On the basis of our results and previously published studies, we propose recommendations for best practices in hand microbiome research. IMPORTANCE The hand microbiome is a critical area of research for diverse fields, such as public health and forensics. The suitability of culture-independent methods for assessing effects of hygiene products on microbiota has not been demonstrated. This is the first controlled laboratory clinical hand study to have compared traditional hand hygiene test methods with newer culture-independent characterization methods typically used by skin microbiologists. This study resulted in recommendations for hand hygiene product testing, development of methods, and future hand skin microbiome research. It also demonstrated the importance of inclusion of skin physiological metadata in

  14. Robotic Mission to Mars: Hands-on, minds-on, web-based learning

    Science.gov (United States)

    Mathers, Naomi; Goktogen, Ali; Rankin, John; Anderson, Marion

    2012-11-01

    Problem-based learning has been demonstrated as an effective methodology for developing analytical skills and critical thinking. The use of scenario-based learning incorporates problem-based learning whilst encouraging students to collaborate with their colleagues and dynamically adapt to their environment. This increased interaction stimulates a deeper understanding and the generation of new knowledge. The Victorian Space Science Education Centre (VSSEC) uses scenario-based learning in its Mission to Mars, Mission to the Orbiting Space Laboratory and Primary Expedition to the M.A.R.S. Base programs. These programs utilize methodologies such as hands-on applications, immersive-learning, integrated technologies, critical thinking and mentoring to engage students in Science, Technology, Engineering and Mathematics (STEM) and highlight potential career paths in science and engineering. The immersive nature of the programs demands specialist environments such as a simulated Mars environment, Mission Control and Space Laboratory, thus restricting these programs to a physical location and limiting student access to the programs. To move beyond these limitations, VSSEC worked with its university partners to develop a web-based mission that delivered the benefits of scenario-based learning within a school environment. The Robotic Mission to Mars allows students to remotely control a real rover, developed by the Australian Centre for Field Robotics (ACFR), on the VSSEC Mars surface. After completing a pre-mission training program and site selection activity, students take on the roles of scientists and engineers in Mission Control to complete a mission and collect data for further analysis. Mission Control is established using software developed by the ACRI Games Technology Lab at La Trobe University using the principles of serious gaming. The software allows students to control the rover, monitor its systems and collect scientific data for analysis. This program encourages

  15. Closing the hand hygiene gap in the postanesthesia care unit: a body-worn alcohol-based dispenser.

    Science.gov (United States)

    Petty, William Clayton

    2013-04-01

    Clinicians who work in the postanesthesia care unit (PACU), operating room (OR), and intensive care unit (ICU) have a greater opportunity to cross-contaminate patients because of high workloads and frequent patient contact events. Much progress has been made to increase hand hygiene compliance with the introduction of alcohol-based wall, bedside, and pocket dispensers. The introduction of body-worn alcohol-based dispensers to anesthesia and ICU providers has been shown to decrease ICU hospital-acquired infections and ventilator-associated pneumonias, and decrease contamination of the anesthesia workplace. Body-worn alcohol-based dispensers are an improvement in ergonomics, especially for those working in high intensity areas. The unit worn on the belt or scrubs waist is readily accessible, can be activated with one hand, and can be a vital tool to close the gap for hand hygiene. Copyright © 2013 American Society of PeriAnesthesia Nurses. Published by Elsevier Inc. All rights reserved.

  16. Reducing gastroenteritis occurrences and their consequences in elementary schools with alcohol-based hand sanitizers.

    Science.gov (United States)

    Prazuck, Thierry; Compte-Nguyen, Géraldine; Pelat, Camille; Sunder, Simon; Blanchon, Thierry

    2010-11-01

    Schools are a source of epidemic seasonal dissemination-in particular gastroenteritis among children and the general population. We assessed the impact of an alcohol-based sanitizer on gastroenteritis and its subsequent consequences. A study was conducted in 2 primary schools over a 17-week period, before and throughout the seasonal gastroenteritis period. The intervention, under strict teacher supervision and in a realistic and long lasting manner, consisted of 1 school rubbing an alcohol-based sanitizer into the hands of the school children. The primary outcome was the proportion of children without any occurrence of gastroenteritis during the study period both in the treated group and the control group, which were 2 separate schools. A Cox proportional hazards model was used to assess the hazard ratio. Secondary outcomes were the number of gastroenteritis episodes, doctor appointments, absenteeism, and working days lost by a parent. Four thousand six hundred fifty-four weekly questionnaires were collected. One hundred fifty-five children presented with at least 1 occurrence of gastroenteritis during the study period: 64 of 259 in the treatment group and 91 of 217 in the control group (χ2 = 16.4, P < 0.0001). The instantaneous risk of primary infection, at any time of the study, for children receiving the treatment was multiplied by 0.52 (95% CI: [0.37,0.71]) compared with children not receiving the treatment. The average number of gastroenteritis episodes was 0.31 in the treatment group and 0.53 in the control group (P < 0.001). Systematic and controlled use of alcohol-based sanitizers during the epidemic season could significantly reduce the incidence of gastroenteritis in primary school children.

  17. A using of biometric methods for the delineation of floral units on the plant

    Directory of Open Access Journals (Sweden)

    Viktoria E. Kharchenko

    2012-03-01

    Full Text Available On the base of the using of biometric analysis of linear dimensions of the leaves, stipules, bracts and bracteoles in the Brassicaceae (Arabidopsis thaliana, Matthiola longipetala, Lobularia maritime, Lamiaceae (Lamium purpureum, Salvia tesquicola and Boraginaceae (Cynoglossum offisinale, Echium vulgare, Nonea pulla, it has found that the linear dimensions of the leaves and bracts are changed in a similar pattern, which is different from the pattern of change of the stipules and bracteole. In this regard, the biometric analysis of the linear dimensions of the leaves on the shoot can be used as an additional criterion for establishing of the boundaries and composition of floral pieces, as well as for the homologation of shoot elements.

  18. Identifying People with Soft-Biometrics at Fleet Week

    Science.gov (United States)

    2013-03-01

    height) that can be learned in real-time and utilized by a humanoid robot in a social setting for person identification. The use of these biometrics is... humanoid robot, Octavia. Interacting with over 200 volunteers as part of more than 100 “identification” games, Octavia averaged a 90% correct...soft biometrics (clothing, complexion, and height) that can be learned in real-time and utilized by a humanoid robot in a social setting for person

  19. Current federal identity management and the dynamic signature biometrics option

    OpenAIRE

    Zanger, Michael S.

    2009-01-01

    Approved for public release, distribution unlimited Although Identity Management (IdM) and biometrics have been engrained in the business practices of private and commercial organizations for decades, the United States Government (USG) and the Department of Defense (DoD) have only truly started to institute a holistic IdM Enterprise within the last decade. More specifically, the DoD has really sharpened the focus on leveraging biometrics since the beginning of the War on Terror. The o...

  20. Direct Problems and Inverse Problems in Biometric Systems

    OpenAIRE

    Mihailescu Marius Iulian

    2013-01-01

    The article purpose is to describe the two sides of biometrics technologies, direct problems and inverse problems. The advance that we face today in field of Information Technology makes Information Security an inseparable part. The authentication has a huge role when we deal about security. The problems that can appear in implementing and developing biometrics systems is raising many problems, and one of the goal of this article is to focus on direct and inverse problems which is a new and c...

  1. An Efficient Human Identification through MultiModal Biometric System

    Directory of Open Access Journals (Sweden)

    K. Meena

    Full Text Available ABSTRACT Human identification is essential for proper functioning of society. Human identification through multimodal biometrics is becoming an emerging trend, and one of the reasons is to improve recognition accuracy. Unimodal biometric systems are affected by various problemssuch as noisy sensor data,non-universality, lack of individuality, lack of invariant representation and susceptibility to circumvention.A unimodal system has limited accuracy. Hence, Multimodal biometric systems by combining more than one biometric feature in different levels are proposed in order to enhance the performance of the system. A supervisor module combines the different opinions or decisions delivered by each subsystem and then make a final decision. In this paper, a multimodal biometrics authentication is proposed by combining face, iris and finger features. Biometric features are extracted by Local Derivative Ternary Pattern (LDTP in Contourlet domain and an extensive evaluation of LDTP is done using Support Vector Machine and Nearest Neighborhood Classifier. The experimental evaluations are performed on a public dataset demonstrating the accuracy of the proposed system compared with the existing systems. It is observed that, the combination of face, fingerprint and iris gives better performance in terms of accuracy, False Acceptance Rate, False Rejection Rate with minimum computation time.

  2. Android Hands

    DEFF Research Database (Denmark)

    Vlachos, Evgenios; Schärfe, Henrik

    2014-01-01

    . On such occasions, android and humanoid hand models should have similar structure, functions, and performance as the human hand. In this paper we present the anatomy, and the key functionalities of the human hand followed by a literature review on android/humanoid hands for grasping and manipulating objects...

  3. Static hand gesture recognition based on finger root-center-angle and length weighted Mahalanobis distance

    Science.gov (United States)

    Chen, Xinghao; Shi, Chenbo; Liu, Bo

    2016-04-01

    Static hand gesture recognition (HGR) has drawn increasing attention in computer vision and human-computer interaction (HCI) recently because of its great potential. However, HGR is a challenging problem due to the variations of gestures. In this paper, we present a new framework for static hand gesture recognition. Firstly, the key joints of the hand, including the palm center, the fingertips and finger roots, are located. Secondly, we propose novel and discriminative features called root-center-angles to alleviate the influence of the variations of gestures. Thirdly, we design a distance metric called finger length weighted Mahalanobis distance (FLWMD) to measure the dissimilarity of the hand gestures. Experiments demonstrate the accuracy, efficiency and robustness of our proposed HGR framework.

  4. Stable and real-time hand gesture recognition based on RGB-D data

    Science.gov (United States)

    Liu, Bo; Wang, Guijin; Chen, Xinghao; He, Bei

    2013-12-01

    Hand gesture recognition has attracted more interest in computer vision and image processing recently. Recent works for hand gesture recognition confronted 2 major problems. The former one is how to detect and extract the hand region from color-confusing background objects. The latter one is the expensive computational cost by considering the kinematic hand model with up to 27 degrees of freedom. This paper proposes a stable and real-time static hand gesture recognition system. Our contributions are listed as follows. First, to deal with color-confusing background objects, we take the RGB-D (RGB-Depth) information into account, where foreground and background objects can be segmented well. Additionally, a coarse-to-fine model is proposed, which utilizes the skin color and helps us extract the hand region robustly and accurately. Second, considering the principal direction of hand region is random, we introduce the principal component analysis (PCA) algorithm to estimate and then compensate the direction. Finally, to avoid the expensive computational cost of traditional optimization, we design a fingertip filter and detect extended fingers via calculating their distances to palm center and curvature easily. Then the number of extended fingers will be reported, which corresponds to the recognition result. Experiments have verified the stability and high-speed of our algorithm. On the data set captured by the depth camera, our algorithm recognizes the 6 pre-defined static hand gestures robustly with average accuracy about 98.0%. Furthermore, the average computational time for each image (with the resolution 640×480) is 37ms, which can be extended to many real-time applications.

  5. Real-time hand gesture recognition based on feature points extraction

    Science.gov (United States)

    Zaghbani, Soumaya; Jaouedi, Neziha; Boujnah, Noureddine; Bouhlel, Mohamed Salim

    2017-03-01

    Tracking moving objects is an area increasingly known in computer vision field. It plays a very important role in human-computer interaction. In this context we have developed a hand tracking and gesture recognition system that allows interaction with the machine in an intuitive and natural way. To ensure the tracking we apply the Kalman filter and detect the optimal points of the hand in order to determine the gesture expressed by user.

  6. BIOMETRIC PARAMETERS OF FIELD GROWN SESAME INFLUENCED BY ARBUSCULAR MYCORRHIZAL INOCULATION, ROCK PHOSPHATE FERTILIZATION AND IRRIGATION

    Directory of Open Access Journals (Sweden)

    V.S. Harikumar

    2017-08-01

    Full Text Available The aim of the study was to assess the effect of inoculation with arbuscular mycorrhizal fungi (AMF and rock phosphate (RP fertilization on biometric parameters and mycorrhizal colonization of field grown sesame under rainfed and irrigated conditions. Inoculation of AMF Funneliformis dimorphicus improved the biometric parameters of the crop such as leaf area (LA, leaf area index (LAI, specific leaf weight (SLW, net assimilation rate (NAR, oil index (OI as well as mycorrhizal colonization (%F in roots. Mycorrhizal inoculation however, did not give any positive response on harvest index (HI. LA, LAI and OI and %F showed a general increment in treatments of no added P (P0, while the other parameters such as SLW and NAR were improved by the application of RP at half the recommended dose (P50. HI did not respond to RP fertilization. Most of the parameters (LA, LAI, NAR, %F showed higher values under rainfed condition than irrigated condition whereas, SLW, HI and OI improved significantly under irrigated condition. Results indicated that the inoculation of AMF to field grown sesame can compensate for 50% of the recommended P fertilizer under a need based irrigation schedule, without affecting the biometric parameters.

  7. Thermographic mapping of the skin surface in biometric evaluation of cellulite treatment effectiveness.

    Science.gov (United States)

    Wilczyński, S; Koprowski, R; Deda, A; Janiczek, M; Kuleczka, N; Błońska-Fajfrowska, B

    2017-02-01

    Cellulite is one of the worst tolerated aesthetic imperfections. Edema that accompanies cellulite causes disorders of blood flow what may be observed as changes in the skin surface temperature. The aim of this paper was to develop a new method based on the analysis and processing of thermal images of the skin for biometric evaluation of severity of cellulite and monitoring its treatment. The observations of the treatment effects were conducted on 10 females (33.4 ± 6.4 years). Thermal images of the volunteers' thighs were captured before starting the therapy (T 0 ). In the following stages: T 1 , T 2 , and T 3 , thermal images were captured 2 weeks after the first, second and third Alidya treatment administration, respectively. Profiled algorithms were developed to determine the mean Grey Level Co-occurrence Matrix (GLCM) contrast in the acquired thermograms. The mean GLCM contrast for the phase T 0 was 70.91, and for the stages T 1 , T 2 , and T 3 : 57.78, 41.80, and 38.53, respectively. The use of proposed method (GLCM contrast) enables biometric evaluation of the effectiveness of cellulite treatment. Traditionally used parameters of infrared analysis such as local points of the maximum and minimum temperature or the median temperatures are not useful in thermal, biometric evaluation of anti-cellulite preparations. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Assessment of transpulmonary absorption of ethanol from alcohol-based hand rub.

    Science.gov (United States)

    Hautemanière, Alexis; Ahmed-Lecheheb, Djihane; Cunat, Lisiane; Hartemann, Philippe

    2013-03-01

    Alcohol-based hand rubs (ABHRs) have been associated with a reduction of nosocomial infections. Despite the worldwide introduction of these products in health care settings, the aim of this study was to assess the transpulmonary absorption of ethanol contains in ABHRs used by health care workers (HCWs) in real conditions of work shift. Twenty-six HCWs of Nancy University Hospital were included. Research consisted in monitoring participants during 4 hours of work shift to assess their exposure to ethanol. The measurement of ethanol vapors in exhaled breath was performed using a class B ethylometer (Alco-Sensor FST). Ethanol concentration in inhaled breath was measured using Gilian pump LFS-113. Concentration of ethanol, acetaldehyde, and acetate in blood and urine samples were determined using gas chromatography with flame ionization detector. Participants were 12% male and 88% female. The mean age was 40 ± 8 years. None of the employees included in the study presented any traces of ethanol or its metabolites in the blood or urine. Ethanol (0.08 ± 0.07 mg/L) was detected in the breath of 10 HCWs at 1 to 2 minutes postexposure. The mean concentration of ethanol in the inhaled air was 46.2 mg/m. Absorption of ethanol vapor from ABHRs among HCWs during their care activities was not detected. Quantification of ethanol fumes inhaled during 4 hours of work shift was below the regulatory limitations of exposure to ethanol. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  9. A prospective randomized comparison of neoprene vs thermoplast hand-based thumb spica splinting for trapeziometacarpal arthrosis

    NARCIS (Netherlands)

    Becker, S. J. E.; Bot, A. G. J.; Curley, S. E.; Jupiter, J. B.; Ring, D.

    2013-01-01

    Objective: In patients with trapeziometacarpal arthrosis, we tested the hypothesis that there is no difference in arm-specific disability 5-15 weeks after prescription of a pre-fabricated neoprene or a custom-made thermoplast hand-based thumb spica splint with the metacarpophalangeal joint included

  10. Left-handed compact MIMO antenna array based on wire spiral resonator for 5-GHz wireless applications

    Science.gov (United States)

    Alqadami, Abdulrahman Shueai Mohsen; Jamlos, Mohd Faizal; Soh, Ping Jack; Rahim, Sharul Kamal Abdul; Narbudowicz, Adam

    2017-01-01

    A compact coplanar waveguide-fed multiple-input multiple-output antenna array based on the left-handed wire loaded spiral resonators (SR) is presented. The proposed antenna consists of a 2 × 2 wire SR with two symmetrical microstrip feed lines, each line exciting a 1 × 2 wire SR. Left-handed metamaterial unit cells are placed on its reverse side and arranged in a 2 × 3 array. A reflection coefficient of less than -16 dB and mutual coupling of less than -28 dB are achieved at 5.15 GHz WLAN band.

  11. Feasibility of caregiver-directed home-based hand-arm bimanual intensive training: a brief report.

    Science.gov (United States)

    Ferre, Claudio L; Brandão, Marina B; Hung, Ya-Ching; Carmel, Jason B; Gordon, Andrew M

    2015-02-01

    To determine feasibility of a home-based, intensive bimanual intervention with children with unilateral spastic cerebral palsy. Eleven children (aged 29-54 months) received 90 hours of home hand-arm bimanual intensive therapy (H-HABIT) provided by their trained caregivers. Parenting stress levels and compliance were monitored using the Parenting Stress Index and daily logs. Quality of bimanual performance and changes in performance/satisfaction of functional goals were assessed using the Assisting Hand Assessment (AHA) and Canadian Occupational Performance Measure (COPM), respectively, at two pretreatment baseline sessions and two posttreatment sessions (immediate and six months). Ten children completed the study with caregivers completing on average 85.6 hours of H-HABIT. Daily logs indicated high caregiver compliance. Stress levels remained stable across the intervention. Children demonstrated significant improvements in the AHA and COPM. H-HABIT is a feasible intervention for improving hand function and merits further investigation in a randomized-control trial.

  12. Depth Camera-Based 3D Hand Gesture Controls with Immersive Tactile Feedback for Natural Mid-Air Gesture Interactions

    Directory of Open Access Journals (Sweden)

    Kwangtaek Kim

    2015-01-01

    Full Text Available Vision-based hand gesture interactions are natural and intuitive when interacting with computers, since we naturally exploit gestures to communicate with other people. However, it is agreed that users suffer from discomfort and fatigue when using gesture-controlled interfaces, due to the lack of physical feedback. To solve the problem, we propose a novel complete solution of a hand gesture control system employing immersive tactile feedback to the user’s hand. For this goal, we first developed a fast and accurate hand-tracking algorithm with a Kinect sensor using the proposed MLBP (modified local binary pattern that can efficiently analyze 3D shapes in depth images. The superiority of our tracking method was verified in terms of tracking accuracy and speed by comparing with existing methods, Natural Interaction Technology for End-user (NITE, 3D Hand Tracker and CamShift. As the second step, a new tactile feedback technology with a piezoelectric actuator has been developed and integrated into the developed hand tracking algorithm, including the DTW (dynamic time warping gesture recognition algorithm for a complete solution of an immersive gesture control system. The quantitative and qualitative evaluations of the integrated system were conducted with human subjects, and the results demonstrate that our gesture control with tactile feedback is a promising technology compared to a vision-based gesture control system that has typically no feedback for the user’s gesture inputs. Our study provides researchers and designers with informative guidelines to develop more natural gesture control systems or immersive user interfaces with haptic feedback.

  13. Depth camera-based 3D hand gesture controls with immersive tactile feedback for natural mid-air gesture interactions.

    Science.gov (United States)

    Kim, Kwangtaek; Kim, Joongrock; Choi, Jaesung; Kim, Junghyun; Lee, Sangyoun

    2015-01-08

    Vision-based hand gesture interactions are natural and intuitive when interacting with computers, since we naturally exploit gestures to communicate with other people. However, it is agreed that users suffer from discomfort and fatigue when using gesture-controlled interfaces, due to the lack of physical feedback. To solve the problem, we propose a novel complete solution of a hand gesture control system employing immersive tactile feedback to the user's hand. For this goal, we first developed a fast and accurate hand-tracking algorithm with a Kinect sensor using the proposed MLBP (modified local binary pattern) that can efficiently analyze 3D shapes in depth images. The superiority of our tracking method was verified in terms of tracking accuracy and speed by comparing with existing methods, Natural Interaction Technology for End-user (NITE), 3D Hand Tracker and CamShift. As the second step, a new tactile feedback technology with a piezoelectric actuator has been developed and integrated into the developed hand tracking algorithm, including the DTW (dynamic time warping) gesture recognition algorithm for a complete solution of an immersive gesture control system. The quantitative and qualitative evaluations of the integrated system were conducted with human subjects, and the results demonstrate that our gesture control with tactile feedback is a promising technology compared to a vision-based gesture control system that has typically no feedback for the user's gesture inputs. Our study provides researchers and designers with informative guidelines to develop more natural gesture control systems or immersive user interfaces with haptic feedback.

  14. Human Motion Energy Harvester for Biometric Data Monitoring

    Science.gov (United States)

    Hoffmann, D.; Folkmer, B.; Manoli, Y.

    2013-12-01

    In this paper we present an energy autonomous sensor system fully integrated into the heel of a shoe for biometric data monitoring. For powering the wireless sensor system a pulse-driven energy harvester was developed, which uses the acceleration-impulses from heel-strike during walking. In preparation of the device development acceleration measurements were carried out. The pulse-driven energy harvester is based on the electromagnetic conversion principle and incorporates a 4×4 coil matrix. A beam fixed at both ends is used for suspending the magnetic circuit. The geometric parameters of coil and magnetic circuit were optimized for maximum power output. For an idealized acceleration pulse with a width of 5 ms and a height of 200 m/s2 an average power output of 0.7 mW was generated using a step frequency of 1 Hz. The functionality of the self-sustained sensor system is demonstrated by measuring the temperature and step-frequency of a walking person and transmitting the data to a base station. We also found that the implementation of the suspension can have a significant impact on the harvester performance reducing the power output.

  15. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  16. The effect of smartphone addiction on hand joints in psoriatic patients: an ultrasound-based study.

    Science.gov (United States)

    Megna, M; Gisonni, P; Napolitano, M; Orabona, G Dell'Aversano; Patruno, C; Ayala, F; Balato, N

    2018-01-01

    Distal interphalangeal (DIP) arthritis is a frequent form of psoriatic arthritis being often linked to nail psoriasis. Modern society is characterized by overuse of smartphones. Indeed, literature has recently focalized on research into smartphone addiction and health-related problems. As smartphone addiction is able to determine overuse and repeated movements of DIP joints and nails, the aim of this study was to evaluate the impact of smartphone use on hand joints of young psoriatic patients. An observational study involving four different groups such as non-smartphone-addicted (SA) psoriatic patients, SA psoriatic patients, non-SA controls and SA controls was performed. Each subject underwent an ultrasound examination of both hands by three independent and blinded to group assignment radiologists. A specific score was used to evaluate the inflammatory state of the analysed joints. The total ultrasound score was statistically significantly higher in SA controls respect to non-SA controls (3.4 vs. 1.4; P < 0.05) as well as in SA psoriasis patients compared to non-SA psoriatic subjects (15.2 vs. 6.7; P < 0.01). Higher mean of ultrasound score was found for left hand in controls (both SA or not) and for right hand in psoriatic subjects (both SA or not), however without reaching statistical significance. Smartphone overuse was found to be linked with higher signs of inflammation of musculoskeletal structures of hands joints in both psoriasis and controls through ultrasound examination. Therefore, smartphone overuse may be a factor which facilitate or speed up the possible development of psoriatic arthritis. © 2017 European Academy of Dermatology and Venereology.

  17. Review analysis of properties for an ideal secure biometric template scheme

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-02-01

    Full Text Available With new advances in technologies, biometrics is becoming emerging technology for verification and authentication of individuals. However, the storage of biometric templates still needs necessary attention since it poses major threats to user...

  18. Biometric security and privacy opportunities & challenges in the big data era

    CERN Document Server

    Al-maadeed, Somaya; Bouridane, Ahmed; Crookes, Prof; Beghdadi, Azeddine

    2017-01-01

    This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.

  19. BIOMETRICS SOCIETY AND THE PROGRESS OF ANIMAL SCIENCE IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Condrea DRAGANESCU

    2014-04-01

    Full Text Available Romanian animal, agricultural and biological sciences were seriously damaged in the period 1948-1964 by the introduction of the Stalinsko- lasenko approach in the field of Genetics and by an empiric-pragmatic approach of agricultural theory. In 1965, it started the reintroduction of the real genetic science and in 1969 a small group of scientists (22, 3 animal scientists, 3 agriculturalists registered in International Biometric Society aiming to change the scientific approach in experimental technique, genetic and animal breeding, ecological vision of animal production, education system. An international Congress of International Biometric Society was held in Romania. Some progress was achieved in all biological fields, but generally it was braked by the routine, by inertia. The number of Romanian agricultural members of Biometric Society decreased, the group disappeared after the year 1990, the biometricians were not present in research and education, but a correct approach is visible in Animal Breeding theory. It is noted that the biometric approach in biological sciences is originated from Darwin and Mendel theory, it was concretized by Galton and Pearson but the origin of Biometric Society (1946 is connected with S. Wright. Some basic scientific works of Quantitative Genetics and Evolution theory are noted.

  20. Development and evaluation of a new alcohol-based surgical hand scrub formulation with persistent antimicrobial characteristics and brushless application.

    Science.gov (United States)

    Hobson, D W; Woller, W; Anderson, L; Guthery, E

    1998-10-01

    Since the introduction in the 1970s of surgical hand scrub formulations that contain 4% chlorhexidine gluconate (CHG), new surgical scrub formulations that have improved efficacy, persistence, or significantly improved use characteristics have not been forthcoming. In addition, the manufacturer's labeling for popular hand scrub products generally requires scrub times in excess of 6 minutes, whereas current practical needs call for products with substantially shorter scrub times. A new alcohol-based surgical scrub formulation, which has ingredients that provide emollient, surfactant, and antimicrobial persistence characteristics to complement the rapid and broad-spectrum antiseptic qualities of alcohol, has been developed in an effort to address these current practical needs. The relative efficacy of a new alcohol-based surgical scrub formulation that contains ingredients that provide surfactant and antimicrobial persistence characteristics was compared with that of commercial 4% CHG and 7.5% povidone iodine (PVPI) formulations with use of human subjects. Hand antimicrobial count sampling was performed by using standardized "glove juice" methodology. The efficacy and persistence results of the new formulation showed statistically significant improvement over both CHG and PVPI at a substantially lessened scrub time (3 minutes). In addition, use of the new formulation without a scrub brush produced results statistically similar to 3-minute applications with either a brush or a sponge. The new alcohol-based formulation demonstrates promise as a new surgical hand scrub formulation with antimicrobial and use characteristics that are significantly improved over current CHG and PVPI formulations. These studies demonstrate the suitability of this formulation for use as a surgical hand scrub and for brushless application.

  1. Effect of controlled irrigation on physiological and biometric characteristics in teak (Tectona grandis seedlings

    Directory of Open Access Journals (Sweden)

    Sneha C.

    2012-08-01

    Full Text Available Effect of controlled irrigation in physiological and biometric characteristics in teak seedlings is monitored at Forestry College in Kerala, India. Six month old seedlings of Teak (Tectona grandis L. f. were raised in polybags. Irrigation was done once in a week. Daily evapotranspiration was calculated and treatments IW/ET=1, IW/ET=0.6, IW/ET=0.3 were irrigated with 100, 60 and 30 per cent of cumulative evapotranspiration. A control without irrigation (IW/ET=0 was also maintained. Physiological as well as biometric observations were carried out at regular intervals. Canopy air temperature difference (CATD was measured using a hand held infrared thermometer and it was observed that seedlings from well watered treatments (IW/ET=1 and 0.6 showed negative CATD whereas treatments IW/ET=0.3 and IW/ET=0 showed positive CATD throughout the growing period. Seedlings in the treatment IW/ET= 0 and 0.3 showed a significant reduction in relative chlorophyll content, seedling height, collar diameter, number of leaves, total dry weight and relative growth rate whereas in IW/ET=1 and 0.6 these parameters were higher and there was no significant difference observed between these two well watered treatment. In the case of root shoot length ratio and root shoot biomass ratio IW/ET=0 was superior over other three treatments.

  2. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available . Such privacy and security risks come in the form of attacks on databases storing biometric data. When biometric data is compromised, the identity of the person is exposed, and it can then be used for any malicious activities. This behavior can lead... in ensuring a harmonized protection of biometric data that is being collected by different organizations for different purposes. Throughout this research work, biometric technologies that improve national security capabilities in access control, identity...

  3. Optical cryptography with biometrics for multi-depth objects.

    Science.gov (United States)

    Yan, Aimin; Wei, Yang; Hu, Zhijuan; Zhang, Jingtao; Tsang, Peter Wai Ming; Poon, Ting-Chung

    2017-10-11

    We propose an optical cryptosystem for encrypting images of multi-depth objects based on the combination of optical heterodyne technique and fingerprint keys. Optical heterodyning requires two optical beams to be mixed. For encryption, each optical beam is modulated by an optical mask containing either the fingerprint of the person who is sending, or receiving the image. The pair of optical masks are taken as the encryption keys. Subsequently, the two beams are used to scan over a multi-depth 3-D object to obtain an encrypted hologram. During the decryption process, each sectional image of the 3-D object is recovered by convolving its encrypted hologram (through numerical computation) with the encrypted hologram of a pinhole image that is positioned at the same depth as the sectional image. Our proposed method has three major advantages. First, the lost-key situation can be avoided with the use of fingerprints as the encryption keys. Second, the method can be applied to encrypt 3-D images for subsequent decrypted sectional images. Third, since optical heterodyning scanning is employed to encrypt a 3-D object, the optical system is incoherent, resulting in negligible amount of speckle noise upon decryption. To the best of our knowledge, this is the first time optical cryptography of 3-D object images has been demonstrated in an incoherent optical system with biometric keys.

  4. Thermal imaging as a biometrics approach to facial signature authentication.

    Science.gov (United States)

    Guzman, A M; Goryawala, M; Wang, Jin; Barreto, A; Andrian, J; Rishe, N; Adjouadi, M

    2013-01-01

    A new thermal imaging framework with unique feature extraction and similarity measurements for face recognition is presented. The research premise is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The proposed algorithm is fully integrated and consolidates the critical steps of feature extraction through the use of morphological operators, registration using the Linear Image Registration Tool and matching through unique similarity measures designed for this task. The novel approach at developing a thermal signature template using four images taken at various instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric matching process as the authentication process relied only on consistent thermal features. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using the similarity measures showed an average accuracy of 88.46% for skeletonized signatures and 90.39% for anisotropically diffused signatures. The highly accurate results obtained in the matching process clearly demonstrate the ability of the thermal infrared system to extend in application to other thermal imaging based systems. Empirical results applying this approach to an existing database of thermal images proves this assertion.

  5. Haptic-Based Neurorehabilitation in Poststroke Patients: A Feasibility Prospective Multicentre Trial for Robotics Hand Rehabilitation

    OpenAIRE

    Andrea Turolla; Omar A. Daud Albasini; Roberto Oboe; Michela Agostini; Paolo Tonin; Stefano Paolucci; Giorgio Sandrini; Annalena Venneri; Lamberto Piron

    2013-01-01

    Background. Haptic robots allow the exploitation of known motor learning mechanisms, representing a valuable option for motor treatment after stroke. The aim of this feasibility multicentre study was to test the clinical efficacy of a haptic prototype, for the recovery of hand function after stroke. Methods. A prospective pilot clinical trial was planned on 15 consecutive patients enrolled in 3 rehabilitation centre in Italy. All the framework features of the haptic robot (e.g., control loop,...

  6. Surgical hand antisepsis in veterinary practice: evaluation of soap scrubs and alcohol based rub techniques.

    Science.gov (United States)

    Verwilghen, Denis R; Mainil, Jacques; Mastrocicco, Emilie; Hamaide, Annick; Detilleux, Johann; van Galen, Gaby; Serteyn, Didier; Grulke, Sigrid

    2011-12-01

    Recent studies have shown that hydro-alcoholic solutions are more efficient than traditional medicated soaps in the pre-surgical hand antisepsis of human surgeons but there is little veterinary literature on the subject. The aim of this study was to compare the efficiency of medicated soaps and a hydro-alcoholic solution prior to surgery using an in-use testing method in a veterinary setting. A preliminary trial was performed that compared the mean log(10) number of bacterial colony forming units (CFU) and the reduction factors (RF) between two 5-min hand-scrubbing sessions using different soaps, namely, povidone iodine (PVP) and chlorhexidine gluconate (CHX), and the 1.5-min application of a hydro-alcoholic rub. A clinical in-use trial was then used to compare the hydro-alcoholic rub and CHX in a surgical setting. Sampling was performed using finger printing on agar plates. The hydro-alcoholic rub and CHX had a similar immediate effect, although the sustained effect was significantly better for the hydro-alcoholic rub, while PVP had a significantly lower immediate and sustained effect. The hydro-alcoholic rub showed good efficiency in the clinical trial and could be considered as a useful alternative method for veterinary surgical hand antisepsis. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. Viewpoint Integration for Hand-Based Recognition of Social Interactions from a First-Person View.

    Science.gov (United States)

    Bambach, Sven; Crandall, David J; Yu, Chen

    2015-11-01

    Wearable devices are becoming part of everyday life, from first-person cameras (GoPro, Google Glass), to smart watches (Apple Watch), to activity trackers (FitBit). These devices are often equipped with advanced sensors that gather data about the wearer and the environment. These sensors enable new ways of recognizing and analyzing the wearer's everyday personal activities, which could be used for intelligent human-computer interfaces and other applications. We explore one possible application by investigating how egocentric video data collected from head-mounted cameras can be used to recognize social activities between two interacting partners (e.g. playing chess or cards). In particular, we demonstrate that just the positions and poses of hands within the first-person view are highly informative for activity recognition, and present a computer vision approach that detects hands to automatically estimate activities. While hand pose detection is imperfect, we show that combining evidence across first-person views from the two social partners significantly improves activity recognition accuracy. This result highlights how integrating weak but complimentary sources of evidence from social partners engaged in the same task can help to recognize the nature of their interaction.

  8. Nurses' perceptions of the benefits and adverse effects of hand disinfection: alcohol-based hand rubs vs. hygienic handwashing: a multicentre questionnaire study with additional patch testing by the German Contact Dermatitis Research Group.

    Science.gov (United States)

    Stutz, N; Becker, D; Jappe, U; John, S M; Ladwig, A; Spornraft-Ragaller, P; Uter, W; Löffler, H

    2009-03-01

    Nurses have a high risk of developing hand eczema due to hand disinfection procedures. To investigate the perception of nurses regarding the adverse effects of hand washing (HW) and alcoholic disinfection (ADI), and to obtain data on the prevalence of hand dermatitis and sensitization to alcohols and alcohol-based hand rubs (ABHRs). A self-administered questionnaire survey, carried out as a pilot study (PS), followed by a modified multicentre study (MC) in five hospitals. Patch tests to ethanol (80%), 1-propanol (60%), 2-propanol (70%) and ABHRs were performed in a subsample. The majority (PS 60.1%; MC 69.5%) of nurses considered ADI to be more damaging than HW. Mostly, ADI and HW were suspected to have irritant effects (ADI 79.2%/52.1%; HW 65.5%/36.2%) compared with an allergenic potential (ADI 10.4%/5.8%; HW 7.8%/3.9%). The prevalence of hand dermatitis in the MC was 13.4% by self-diagnosis and 22.4% by symptom-based questions. In 50 tested individuals no sensitization and only two irritant reactions to alcohols and three single-positive reactions to ABHRs were observed, none of the latter related to alcohols. Although ADI is known to cause less skin irritation than HW, nurses perceive ADI as more damaging, resulting in: (i) a low compliance with ADI and (ii) a higher prevalence of hand dermatitis because the more deleterious HW is preferred. This may result in an increase in occupational disease and nosocomial infections. Educational programmes should promote ADI as a procedure with good efficiency and skin tolerability to reduce the prevalence of hand eczema in nurses and to enhance compliance with hand hygiene standards.

  9. Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Molina, G.; Kevenaar, T.A.M.; Veldhuis, Raymond N.J.; Jonker, Willem

    2008-01-01

    In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic

  10. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Garcia Molina, Gary; Breebaart, Jeroen; Veldhuis, Raymond N.J.; Kevenaar, Tom A.M.; Jonker, Willem

    In recent years, the protection of biometric data has gained increased interest from the scientific community. Methods such as the fuzzy commitment scheme, helper-data system, fuzzy extractors, fuzzy vault, and cancelable biometrics have been proposed for protecting biometric data. Most of these

  11. Perfect Match: Biometrics and Body Patterning in a Networked World

    Directory of Open Access Journals (Sweden)

    Gillian Fuller

    2003-01-01

    Full Text Available Bodies are increasingly becoming collectively integrated into informational processes which are open to biotechnical forms of regulation. Biometrics, the use of body measurements such as retina scanning, face recognition and fingerprinting is now being uncontroversially introduced throughout the world under the aegis of security and efficient traffic management. Fields that once molded the individual through bodily confinement and observation are dispersing and converging into the regimes of logistics and control. This paper looks at the operations of biometrics to consider the biopolitical ramifications of body measurement as power is made operational by controlling movement via the haptic techniques of information architecture rather than the more familiar modes of discipline and panoptical vision machines. Biometrics is the perfect control for the networked individual as we divide across infinite planes and dimensions, reconfiguring endlessly to become pattern matches in expanding databases of everyday life.

  12. New surveillance technologies and their publics: A case of biometrics.

    Science.gov (United States)

    Martin, Aaron K; Donovan, Kevin P

    2015-10-01

    Before a newly-elected government abandoned the project in 2010, for at least eight years the British state actively sought to introduce a mandatory national identification scheme for which the science and technology of biometrics was central. Throughout the effort, government representatives attempted to portray biometrics as a technology that was easily understandable and readily accepted by the public. However, neither task was straightforward. Instead, particular publics emerged that showed biometric technology was rarely well understood and often disagreeable. In contrast to some traditional conceptualizations of the relationship between public understanding and science, it was often those entities that best understood the technology that found it least acceptable, rather than those populations that lacked knowledge. This paper analyzes the discourses that pervaded the case in order to untangle how various publics are formed and exhibit differing, conflicting understandings of a novel technology. © The Author(s) 2014.

  13. Impact of environmental factors on biometric matching during human decomposition

    Energy Technology Data Exchange (ETDEWEB)

    Bolme, David S [ORNL; Tokola, Ryan A [ORNL; Boehnen, Chris Bensing [ORNL; Saul, Tiffany B [ORNL; Sauerwein, Kelly A [ORNL; Steadman, Dawnie W [ORNL

    2016-01-01

    Automatic recognition systems are a valuable tool for identifying unknown deceased individuals. Immediately af- ter death fingerprint and face biometric samples are easy to collect using standard sensors and cameras and can be easily matched to anti-mortem biometric samples. Even though post-mortem fingerprints and faces have been used for decades, there are no studies that track these biomet- rics through the later stages of decomposition to determine the length of time the biometrics remain viable. This paper discusses a multimodal dataset of fingerprints, faces, and irises from 14 human cadavers that decomposed outdoors under natural conditions. Results include predictive models relating time and temperature, measured as Accumulated Degree Days (ADD), and season (winter, spring, summer) to the predicted probably of automatic verification using a commercial algorithm.

  14. On humanitarian refugee biometrics and new forms of intervention

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    biometric refugee data, has affected the relationship between UNHCR, donor states, host states and refugees, the article shows how UNHCR's trialling of new biometric technologies, combined with actual and potential data-sharing practices, has advanced the technology's performance as well as its...... capacity in combination with current debates about new forms of intervention. Finally, these insights are combined into a framework through which the last part of the article engages critically with this development of humanitarian refugee biometrics by posing the following question: how does an approach...... to technology that takes seriously the idea of matter as capable of agentic capacity enhance our appreciation of the ways in which these humanitarian technology may contribute to the emergence of new forms of intervention. Through an analysis of how the emergence of a new type of data, namely digitalised...

  15. Musculoskeletal model-based control interface mimics physiologic hand dynamics during path tracing task

    Science.gov (United States)

    Crouch, Dustin L.; (Helen Huang, He

    2017-06-01

    Objective. We investigated the feasibility of a novel, customizable, simplified EMG-driven musculoskeletal model for estimating coordinated hand and wrist motions during a real-time path tracing task. Approach. A two-degree-of-freedom computational musculoskeletal model was implemented for real-time EMG-driven control of a stick figure hand displayed on a computer screen. After 5-10 minutes of undirected practice, subjects were given three attempts to trace 10 straight paths, one at a time, with the fingertip of the virtual hand. Able-bodied subjects completed the task on two separate test days. Main results. Across subjects and test days, there was a significant linear relationship between log-transformed measures of accuracy and speed (Pearson’s r  =  0.25, p  amputee subject could coordinate movement between the wrist and MCP joints, but favored metacarpophalangeal joint motion more highly than able-bodied subjects in 8 of 10 trials. For able-bodied subjects, tracing accuracy was lower at the extremes of the model’s range of motion, though there was no apparent relationship between tracing accuracy and fingertip location for the amputee. Our result suggests that, unlike able-bodied subjects, the amputee’s motor control patterns were not accustomed to the multi-joint dynamics of the wrist and hand, possibly as a result of post-amputation cortical plasticity, disuse, or sensory deficits. Significance. To our knowledge, our study is one of very few that have demonstrated the real-time simultaneous control of multi-joint movements, especially wrist and finger movements, using an EMG-driven musculoskeletal model, which differs from the many data-driven algorithms that dominate the literature on EMG-driven prosthesis control. Real-time control was achieved with very little training and simple, quick (~15 s) calibration. Thus, our model is potentially a practical and effective control platform for multifunctional myoelectric prostheses that could

  16. Multi-subject/daily-life activity EMG-based control of mechanical hands

    Directory of Open Access Journals (Sweden)

    Fiorilla Angelo

    2009-11-01

    Full Text Available Abstract Background Forearm surface electromyography (EMG has been in use since the Sixties to feed-forward control active hand prostheses in a more and more refined way. Recent research shows that it can be used to control even a dexterous polyarticulate hand prosthesis such as Touch Bionics's i-LIMB, as well as a multifingered, multi-degree-of-freedom mechanical hand such as the DLR II. In this paper we extend previous work and investigate the robustness of such fine control possibilities, in two ways: firstly, we conduct an analysis on data obtained from 10 healthy subjects, trying to assess the general applicability of the technique; secondly, we compare the baseline controlled condition (arm relaxed and still on a table with a "Daily-Life Activity" (DLA condition in which subjects walk, raise their hands and arms, sit down and stand up, etc., as an experimental proxy of what a patient is supposed to do in real life. We also propose a cross-subject model analysis, i.e., training a model on a subject and testing it on another one. The use of pre-trained models could be useful in shortening the time required by the subject/patient to become proficient in using the hand. Results A standard machine learning technique was able to achieve a real-time grip posture classification rate of about 97% in the baseline condition and 95% in the DLA condition; and an average correlation to the target of about 0.93 (0.90 while reconstructing the required force. Cross-subject analysis is encouraging although not definitive in its present state. Conclusion Performance figures obtained here are in the same order of magnitude of those obtained in previous work about healthy subjects in controlled conditions and/or amputees, which lets us claim that this technique can be used by reasonably any subject, and in DLA situations. Use of previously trained models is not fully assessed here, but more recent work indicates it is a promising way ahead.

  17. Hand Function in a Population-Based Sample of Young Children with Unilateral or Bilateral Cerebral Palsy.

    Science.gov (United States)

    Klevberg, Gunvor L; Østensjø, Sigrid; Krumlinde-Sundholm, Lena; Elkjær, Sonja; Jahnsen, Reidun B

    2017-10-20

    To describe aspects of hand function in a population-based sample of young children with clinical signs of unilateral or bilateral cerebral palsy (CP). A cross-sectional study with data from national CP registers in Norway. Manual ability was classified with the Manual Ability Classification System (MACS) or Mini-MACS. Hand use in bimanual activities was measured with the Assisting Hand Assessment (AHA) for unilateral CP or the newly developed Both Hands Assessment (BoHA) for bilateral CP. From 202 children, 128 (57 females) were included (Mini-MACS/MACS levels I-V, mean age 30.4 months; SD = 12.1). Manual abilities were distributed across levels I-III in unilateral CP and levels I-V in bilateral CP. Variations in AHA and BoHA units were large. One-way ANOVA revealed associations between higher AHA or BoHA units and Mini-MACS/MACS levels of higher ability (p CP, children with bilateral CP showed greater variation in Mini-MACS/MACS levels, and both sub-groups showed large variations in AHA or BoHA units. The classifications and assessments used in this study are useful to differentiate young children's ability levels. Such information is important to tailor upper limb interventions to the specific needs of children with CP.

  18. Assessment of exposure to ethanol vapors released during use of Alcohol-Based Hand Rubs by healthcare workers.

    Science.gov (United States)

    Hautemanière, Alexis; Cunat, Lisiane; Ahmed-Lecheheb, Djihane; Hajjard, Farah; Gerardin, Fabien; Morele, Yves; Hartemann, Philippe

    2013-02-01

    Despite the increasing use of Alcohol-Based Hand Rub solutions, few studies have quantified the concentrations of inhaled ethanol. The aim of this study was to assess ethanol exposure during hygienic and surgical hand disinfection practices. Ethanol concentrations were measured at the nose level of a wooden dummy and human volunteers. Two systems were used in parallel to determine short-term ethanol vapor exposures: activated charcoal tubes followed by gas chromatography analysis and direct reading on a photoionization detector (PID). Exposure was assessed for 4 different sequences (N=10) reproducing hand rubs for simple surgery, nursing care, intensive care and surgical scrub. The ethanol concentrations measured were of a similar order between the dummy and volunteers. The concentrations obtained by PID were higher than the gas chromatography values for the simple care (45%) and nursing care (27%) sequences and reflected specific exposure peaks of ethanol, whereas ethanol concentrations were continuously high for intensive care (440 mg m(-3)) or surgical scrub (650 mg m(-3)). Ethanol concentrations were similar for these two exposure assessment methods and demonstrated a relationship between handled doses and inhaled doses. However, the ethanol vapors released during hand disinfection were safe for the healthcare workers. Copyright © 2012 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  19. Nasal biometrics and nasofacial proportion in Hausas and Yorubas using Akinlolu-Raji image-processing algorithm

    Directory of Open Access Journals (Sweden)

    Akinlolu Abdulazeez Adelaja

    2016-01-01

    Full Text Available Background: Nasal biometrics is vital to facial analyses. This study evaluated nasal biometrics in Hausas and Yorubas of Nigeria. Materials and Methods: Hausas (150 males and 150 females, aged 18-36 years and Yorubas (150 males and 150 females, aged 15-33 years were selected as subjects with informed consents and when established as Hausas or Yorubas by parents and grandparents. Height, body weight and cephalometric parameters (evaluated on three-dimensional facial photographs were measured on subjects. The novel Akinlolu-Raji image-processing algorithm was developed using modified row method of computer programming. Nasal root width, nose height, nose width, nasal bridge length, nasal tip protrusion, nasal index, facial width and nasofacial proportion computed from readings of Akinlolu-Raji image-processing algorithm were analyzed using Z-test (P ≤ 0.05 of 2010 Microsoft Excel statistical software. Results: Computed nasal biometrics showed statistically nonsignificant higher values (P > 0.05 in males of Hausas (100% and Yorubas (80% compared to their female counterparts. In addition, results showed nonsignificant higher values (P > 0.05 in 80% of nasal biometrics in Hausas compared to Yorubas in both sexes. Based on classifications of nose types from nasal index, Hausas have the platyrrhine nose type while Yorubas have the mesorrhine nose type. Nasofacial proportion was lower in Hausa males compared to females, but of same values in Yoruba males and females. In addition, nasofacial proportions were lower in Hausas compared to Yorubas in both sexes. Conclusions: Sexual dimorphism of nasal biometrics exists between sexes of Hausas and Yorubas. Furthermore, Hausas and Yorubas are of similar nasal sizes.

  20. Comparison of Standard Culture-Based Method to Culture-Independent Method for Evaluation of Hygiene Effects on the Hand Microbiome

    Directory of Open Access Journals (Sweden)

    C. Zapka

    2017-03-01

    Full Text Available Hands play a critical role in the transmission of microbiota on one’s own body, between individuals, and on environmental surfaces. Effectively measuring the composition of the hand microbiome is important to hand hygiene science, which has implications for human health. Hand hygiene products are evaluated using standard culture-based methods, but standard test methods for culture-independent microbiome characterization are lacking. We sampled the hands of 50 participants using swab-based and glove-based methods prior to and following four hand hygiene treatments (using a nonantimicrobial hand wash, alcohol-based hand sanitizer [ABHS], a 70% ethanol solution, or tap water. We compared results among culture plate counts, 16S rRNA gene sequencing of DNA extracted directly from hands, and sequencing of DNA extracted from culture plates. Glove-based sampling yielded higher numbers of unique operational taxonomic units (OTUs but had less diversity in bacterial community composition than swab-based sampling. We detected treatment-induced changes in diversity only by using swab-based samples (P < 0.001; we were unable to detect changes with glove-based samples. Bacterial cell counts significantly decreased with use of the ABHS (P < 0.05 and ethanol control (P < 0.05. Skin hydration at baseline correlated with bacterial abundances, bacterial community composition, pH, and redness across subjects. The importance of the method choice was substantial. These findings are important to ensure improvement of hand hygiene industry methods and for future hand microbiome studies. On the basis of our results and previously published studies, we propose recommendations for best practices in hand microbiome research.